Catalog / Ethical Hacking Tools Cheatsheet
Ethical Hacking Tools Cheatsheet
A comprehensive cheat sheet covering essential tools used in ethical hacking, their functionalities, and common use cases. This serves as a quick reference for penetration testers and security professionals.
Reconnaissance Tools
Network Scanning
Nmap (Network Mapper) |
A versatile tool for network discovery and security auditing. It can identify hosts, services, operating systems, and firewall rules. Usage: |
Zenmap |
The GUI version of Nmap, providing a user-friendly interface for complex scans and visualizing network topologies. Usage: Launch Zenmap and configure scan profiles. |
Masscan |
A high-speed port scanner designed for scanning large networks quickly. Usage: |
Netdiscover |
An active/passive ARP reconnaissance tool. Usage: |
Hping3 |
A command-line packet analyzer/assembler. Usage: |
Vulnerability Scanning
Nessus |
A comprehensive vulnerability scanner that identifies security flaws, missing patches, and malware. Usage: Configure scan policies and target IPs via the Nessus web interface. |
OpenVAS |
An open-source vulnerability scanner that performs comprehensive security assessments. Usage: Set up scan targets and schedules via the OpenVAS web interface. |
Nikto |
A web server scanner which performs comprehensive tests against web servers for multiple items, including dangerous files/CGIs, outdated server software and other problems. Usage: |
Web Reconnaissance
Dirbuster |
A Java application used to brute-force directories and files on web servers. Usage: Configure the target URL and wordlist in Dirbuster’s GUI. |
Wappalyzer |
A browser extension that identifies technologies used on a website. Usage: Install the Wappalyzer extension and visit the target website. |
WhatWeb |
A website fingerprinting tool that identifies technologies and CMS versions. Usage: |
Exploitation Tools
Exploitation Frameworks
Metasploit |
A powerful framework for developing and executing exploit code against a remote target. Usage: |
Armitage |
A GUI front-end for Metasploit, simplifying exploit selection and management. Usage: Launch Armitage and connect to a Metasploit instance. |
Core Impact |
A commercial penetration testing tool that automates vulnerability assessment and exploitation. Usage: Configure targets and run automated assessments via the Core Impact GUI. |
Web Application Exploitation
Burp Suite |
An integrated platform for performing security testing of web applications. Usage: Configure Burp Suite as a proxy and intercept web traffic to analyze and modify requests. |
OWASP ZAP |
A free, open-source web application security scanner. Usage: Configure ZAP as a proxy and use automated or manual testing features. |
SQLMap |
An automated SQL injection tool that detects and exploits SQL injection vulnerabilities. Usage: |
Password Cracking
John the Ripper |
A fast password cracker that supports multiple hash types. Usage: |
Hashcat |
An advanced password recovery tool with GPU acceleration. Usage: |
Post-Exploitation Tools
Privilege Escalation
LinEnum.sh |
A script to enumerate information from Linux systems for privilege escalation. Usage: Transfer the script to the target, make it executable, and run it. |
Windows Exploit Suggester (wes.py) |
A Python script to suggest potential exploits for Windows systems based on patch levels. Usage: Run the script against systeminfo output. |
Data Extraction
Mimikatz |
A tool to extract plaintext passwords, hash, PIN codes and kerberos tickets from memory. Usage: Load Mimikatz module in Metasploit or run directly on the target. |
PowerShell Empire |
A post-exploitation framework for PowerShell, enabling data exfiltration and persistence. Usage: Set up Empire server and agents on the target. |
Maintaining Access
Reverse Shells |
Establish a reverse shell for persistent access. Example: |
Cron Jobs |
Schedule tasks for persistent access. Usage: |
Wireless Hacking Tools
Wireless Reconnaissance
Aircrack-ng Suite |
A complete suite of tools for wireless network assessment. Tools: |
Kismet |
A wireless network detector, sniffer, and intrusion detection system. Usage: Run Kismet to passively collect wireless network data. |
Wireless Exploitation
Aireplay-ng |
Used to inject packets, useful for deauthenticating clients or generating traffic. Usage: |
Aircrack-ng |
Used to crack WEP and WPA/WPA2-PSK keys. Usage: |
Bluetooth Hacking
Bluelog |
Discovers Bluetooth devices. Usage: Run Bluelog to scan for nearby Bluetooth devices. |
Bluesnarfer |
Exploits Bluetooth vulnerabilities to access data. Usage: Bluesnarfer target_MAC |