• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

William Bailey

Ethical Hacking

MIS 5211.701 ■ Fall 2021 ■ William Bailey
  • Home
  • INSTRUCTOR
  • SYLLABUS
  • Gradebook

Week 05 – Open Source vs Commercial

October 4, 2021 by William Bailey 8 Comments

During this week, we talked about some additional scanning products used in Ethical Hacking.  While many are open source,  we also mentioned that there are some products that are commercial, and require a paid license.

During your trial of Kali, so far, have you found any interesting tools that you want to spend more time with?

While not disclosing your employer’s name, are you aware of tools that your employer currently uses?

Week Five Slide Handouts

Filed Under: Week 05: System and User Enumeration Tagged With:

Reader Interactions

Comments

  1. Eugene Angelo Tartaglione says

    October 5, 2021 at 9:59 am

    From paid programs from work I have only used RAPID7 and Splunk. I think both were interesting and useful tools, with the proprietary licenses obtained, I as able to use these tools on test systems to play around with. For tools I want to play with more on Kali, I think I would like to play around with the Fern WIFI cracker tool more.

    Log in to Reply
  2. Antonio Cozza says

    October 5, 2021 at 2:45 pm

    As I have not done too much wi-fi hacking, I would be interested in learning more about using and gaining experience with a tool like Aircrack-ng as that appears to be commonly used for wi-fi scanning and cracking. I also plan to get more experience with Maltego. In my own practice, I have frequently used hydra, dirb/DirBuster, WinPEAS, SQLMap, and John the Ripper.

    Log in to Reply
    • Dhaval Patel says

      November 22, 2021 at 6:46 pm

      Going over the theory and practical application of Wi-Fi hacking would be interesting to learn. I too am not all that familiar with the process so seeing how wifi cracking works would be interesting.

      Log in to Reply
  3. Dhaval Patel says

    November 3, 2021 at 10:48 am

    It would be interesting to attempt a brute force attack using the Hydra tool. We go over brute force in theory, but to actually conduct it would be a great learning experience. I am not aware of any security tools my organization uses as I am not in a security role in my organization.

    Log in to Reply
  4. Tal Eidenzon says

    November 21, 2021 at 1:57 pm

    I am very interested in DLP programs. Though it is not exactly a “hacking” tool, identifying fingerprints of certain types of data and understanding how these tools are used by companies to map user behavior to protect data loss, can be used to outsmart these tools during penetration tests.

    My company had a major ransomware attack not long ago, so after the incident, they went ahead and more than tripled the number of tools that they are using. Some of the vendors are Forcepoint, Tenable, and Proofpoint.

    Log in to Reply
  5. Krish Damany says

    December 5, 2021 at 1:25 pm

    In my day-to-day work, I use many paid programs. As I work in a SOC, many different clients have many different programs that they use for incident response and alert management. One of the main programs I use is Splunk. I can use Splunk to view activity on the client’s network that may be suspicious and use that information to reach out to a user and ask if what they are doing is for a business purpose or not. Similarly, another program used in client environments is QRadar, which does most of the same things as Splunk. I have not tried any tools that specifically deals with Wi-Fi hacking, but I would certainly be interested in working with them in my free time on an isolated network that I control.

    Log in to Reply
  6. Andrew Nguyen says

    December 5, 2021 at 3:04 pm

    While exploring Kali Linux, one of the tools that I would like to spend more time with would be Aircrack-ng. Wifi hacking has always been super interesting to me, and I would love to find out more about how it works and what you can do with it.

    Some of the tools that my company uses is BurpSuite for viewing internet traffic.

    Log in to Reply
  7. Patrick Jurgelewicz says

    December 6, 2021 at 3:44 pm

    Unfortunately I’m not yet working in the field so I cannot give an example of an employer’s commercial scanning tools, but as Dhaval mentioned above, I also have former class experience in working with Hydra. Although Hydra goes further than just scanning, it is a fun tool to use to try to find login vulnerabilities as it tries to brute force crack passwords using common rules and techniques. I’d like to spend more time using similar tools that allow for finding more vulnerabilities within a system.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (1)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (2)
  • Week 04: Vulnerability Scanning (1)
  • Week 05: System and User Enumeration (1)
  • Week 06: Metasploit (1)
  • Week 08: Malware (1)
  • Week 09: Web Application Security (1)
  • Week 10: Web Application Hacking (1)
  • Week 11: Cloud Computing & Virtualization (2)
  • Week 12: Wireless (2)
  • Week 14: Review of all topics (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in