Popular Information security tools


Popular Information security tools

Reading Time: 2 minutes

Can you imagine peeping into your network and

  • seeing the traffic come in and go
  • see the applications on the net that are trying to access various software on your system,
  • and understand the weaknesses in your system and more?

All this and more can be done by various tools that are available to study the systems. Tools in the Information security domain help us to analyze and understand the network traffic in a deeper way. There are many tools constantly appearing and it is good to keep with the new technologies and changes. 

Here is a brief list of some of the popular Information security tools:

  • Metasploit

        ‘Metasploit’ is a popular pen testing framework primarily designed to hack into systems and test them before the hackers can penetrate them and cause damages. It is available for the Windows, Linux and macOS operating system. It was originally written in Perl and then it was rewritten in Ruby. It is currently owned by Boston based company Rapid7. It has an open source version as well as commercial version.

        ‘Wireshark is a network protocol analyzer and packet sniffer and was formerly known as ‘β€˜Ethereal’. It is freely available for the Windows, Linux,macOS, FreeBSD, NetBSD operating systems. Wireshark enables you to read and analyze the traffic packets and not alter it in any way.

Here are a few features of Wireshark:

  • “Deep inspection of hundreds of protocols
  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis”(Source: https://www.wireshark.org)

For more on Wireshark, read more here.

       ‘Nessus’ is a vulnerability scanner available from Tenable, Inc. It is available for the Windows, Linux and macOS platforms. It is primarily used to detect and identify vulnerabilities and stay ahead of the hackers. It has been trusted by more than 27,000 organizations and is one of the most widely used vulnerability scanners.

On an average, when a new vulnerability is disclosed, a new plugin is released within 24 hours of its disclosure. There have been more than 100 zero day vulnerabilities discovered in the past 3 years by means of the Nessus scanner. For more on the Nessus scanner, visit this link.

         Aircrack is a tool that is used to assess Wi-Fi security. It consists of a tool for detector, packet sniffer, cracker and analysis tools.

        Since weak passwords are still the easiest way to hack into a system, ‘John the Ripper’ is a tool to detect just that. This tool detects weak passwords and is available as a free and Open source version as well as a commercial version. It is available for Windows, macOS, DOS, Unix, BeOS and OpenVMS.  For more information on John the Ripper, visit this link.

We have seen a just a brief list of the different tools in the Information security domain. Stay tuned for more technical posts!

This is the seventh post for #MyFriendAlexa by @Blogchatter.  I am taking my blog to the next level with #MyFriendAlexa and #Blogchatter.

About the author

Jayanthi administrator

20 Comments so far

PratibhaPosted on12:05 pm - Sep 26, 2019

Technology was never my best friend! I still struggle with it! #myepicareads #MyFriendAlexa

KinshooPosted on12:47 pm - Sep 26, 2019

Thank you for the informative list. Privacy breach and access to personal information has become a serious issue.

Vashi BaloriaPosted on7:53 pm - Sep 26, 2019

This holds a lot of information im no good at but i must be aware of! Im glad i stopped by, hopeful of learning more

Surbhi PrapannaPosted on11:07 pm - Sep 26, 2019

I am not much a techie person but it seems these are great security tools and you had shared great details about each. #Surbhireads #Myfriendalexa

MatheikalPosted on7:45 am - Sep 27, 2019

Technology becomes complex and challenging. I prefer to manage with the minimum. Thanks for the information here.

Anahita IraniPosted on10:07 am - Sep 27, 2019

I am technology challenged yet constantly upgrading my skills. This article helped me lots. Happy Alexa

abhijitPosted on10:59 am - Sep 27, 2019

An informative post. But very specialised post.

Gunjan UpadhyayPosted on11:54 am - Sep 27, 2019

Indeed an informative post, This article helped me update my knowledge, thanks for sharing
#TuggunMommyReads #MyFriendAlexa #BlogChatter

ShaliniPosted on12:37 pm - Sep 27, 2019

Reminds me of the good ol’ tech days of my life! Great info!

Harjeet KaurPosted on9:26 pm - Sep 27, 2019

I am technically challenged! I feel dizzy like seeing Taare Zameen par πŸ™ But I understand that with the invention of every new software there has to be a new security system in place. #wordsmithkaurreads #MyFriendAlexa #BlogChatter

Anwesha GuhaPosted on12:33 pm - Sep 28, 2019

Thanks for this comprehensive post on security tools. Loved reading it.

Anurag SinghPosted on10:38 pm - Sep 28, 2019

Though i don’t understand a bit
But it seems very informative post for others

What I Like is the writing style

Amrit kaurPosted on10:44 pm - Sep 28, 2019

You have brought together some great security tools to be safe.

DishaPosted on1:46 am - Sep 30, 2019

We should be aware of the risks associated with the rampant use of technology and these tools looks promising to keep you safe to some extent.

Neha JainPosted on5:23 pm - Sep 30, 2019

Thanks for sharing the details it’s really informative, sharing with my husband as he reads a lot about it too

Manisha GargPosted on6:16 pm - Sep 30, 2019

Tech is something which I am not very hand ons, your post is simple and easy to understand.

MeenalSonalPosted on10:38 pm - Sep 30, 2019

Thanks for sharing such a detailed post.

Paresh GodhwaniPosted on10:54 pm - Sep 30, 2019

These might be popular tools but I haven’t heard of any. In this world, where security is so important I am being careless.

Leave a Reply