Florida State University Hacking Tools for Cyber Security Summary

User Generated

pncgnvagheag

Writing

Florida State University

Description

Need to write a brief summary on hacking tools. The hacking tools chosen are: Wireshark and The Harvester.

They are both information gathering tools. Quick reference guide can be found here: https://tools.kali.org/tools-listing

Should include:

When the hacking tool was invented

Explanation on what they do and how a hacker would use it

Pros and cons to the tool


Double spaced, 12 pt arial font

Length should be about two pages for each tool (4 total)

References

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

1

Summary On Hacking Tools
Student's Name
Name of Institution
Course
Instructor
Date

2

Summary On Hacking Tools
Professionals within the data security realm work increasingly to prevent hacking
using the ideal devices similar to those used by hackers to access organizational
systems. To effectually comprehend one's system's susceptibilities, one must view it the
same manner the attacker perceives it. This implies that attackers use similar analytical
lenses to search via the networks and systems. While the names might remain the
same, the tools' operations and effectiveness are rapidly changing with time since new
defense and attacking mechanisms utilized to attack the organizational systems
emerge. The greatest challenge allied with data protection is being up-to-date with the
ideal defense tool due to an upsurge in technological advancements. The paper would
critically summarize two hacking tools (Wireshark and the Harvester), describing their
invention history. It would further explain their roles in hacking and the pros as well as
cons aligned with them.
The Harvester Hacking Tool
Hacking tools entail computer programs and some scripts which aid one find and
exploit weaknesses within computer networks, servers, and web applications. Some of
the hacking tools include Harvester and Wireshark (Engebretson, 2013). The Harvester
is a hacking tool used to gather e-mail accounts, virtual hosts, subdomain names,
banners, and employee names from diverse public sources, including search engines.
Therefore, the device is intended to assist penetration testers during the penetration
test's early phases to comprehend the Internet's client footprint. The Harvester was
developed in python to collect information such as e-mails, and others from various
computer databases, including SHODAN and PGP key servers. The hacking tool is

3

essential for people in organizations who need to know what attackers might see
regarding the company. The Harvester is a by default device in Kali Linux, and so one
needs to update the hacking tool.
The Harvester tool was invented by the programmer Christian Martorella in the
1960s. This data-gathering program was primarily created for Edge-Security. It ...


Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags