100% found this document useful (1 vote)
304 views6 pages

Ethical Hacking Tools:: 1.samspade Samspade Is A Simple Tool Which Provides Us Information About A Particular Host

This document discusses several ethical hacking tools: 1) SamSpade provides host information. 2) Email tracker finds the server emails came from using message headers. 3) Visual Route depicts the message path. 4) War dialing scans phone numbers to find modems but is now illegal. 5) Pingers use ICMP packets for scanning. 6) Port scanning identifies open ports on systems or networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
304 views6 pages

Ethical Hacking Tools:: 1.samspade Samspade Is A Simple Tool Which Provides Us Information About A Particular Host

This document discusses several ethical hacking tools: 1) SamSpade provides host information. 2) Email tracker finds the server emails came from using message headers. 3) Visual Route depicts the message path. 4) War dialing scans phone numbers to find modems but is now illegal. 5) Pingers use ICMP packets for scanning. 6) Port scanning identifies open ports on systems or networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

ETHICAL HACKING TOOLS:

1.SAMSPADE
Samspade is a simple tool which
provides us information about a
particular host
2.EMAIL TRACKER

Email tracker is a software which helps us to


find from which server does the mail actually
came from. Every message we receive will
have a header associated with it.
3.Visual Route

It will also depict the path though which the


message came to our system.
4.WAR DIALING
• The war dialers is a hacking tool which is now
illegal and easier to find out.
• War dialing is the practice of dialing all the
phone numbers in a range in order to find
those that will answer with a modem.

5. PINGERS

Pingers and yet another category of scanning


tools which makes use of the Internet Control
Message Protocol(ICMP) packets for scanning
6.Port Scanning

A port scan is a method used by hackers


to determine what ports are open or in
use on a system or network.

You might also like