Hacking the most commonly used tools

The Cyber Security Centre του Ηνωμένου Βασιλείου και οι δυτικοευρωπαίοι φίλοι τους κυκλοφόρησαν σήμερα μια έκθεση που επικεντρώνεται στα πιο συχνά χρησιμοποιούμενα εργαλεία hacking.

The study presents five classes of available hacking tools widely used by criminals, spies and hacktivists worldwide. Your list below will not surprise those involved in penetration testing but is valuable to the public who wants the security of their systems.hacking

PDF lists some of the tools most likely to be used in targeted networks.

Remote Access Trojans (RATs): "invisible" for planting backdoors and exfiltrating data
Web Shells: scripts planted on servers to provide remote administrator control
Mimikatz: It intercepts passwords and other credentials stored on
PowerShell Empire: This framework allows hackers to enter sensitive systems
Locating tools and and tools of destruction: Utilities used to hide the location of a hacker.
Of course, they are also popular penetration-testing kits.

Often these tools are not inherently malicious and can be used legitimately for penetration testing that aims to detect points. But they can also be used for malicious network hacking. The NCSC reports that the parallel use of the above tools can bring impressive results, but also make them more difficult to detect.

"Many are used in combination with each other, posing a huge challenge for the network's defender," says GCHQ.

The NCSC states that some simple steps could greatly help to prevent possible attacks. Basic defenses include two or multiple agent authentication, network partitioning, and many more that you can read in the PDF below.

https://www.ncsc.gov.uk

__________________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).