Sniffing and Spoofing
Secretly accessing any unauthorized data over network is sniffing. Hiding real identity and creating fake identity and use it for any illegal or unauthorized work is spoofing. IP spoofing and MAC spoofing are two famous and mostly used attacks. Some of the tools are:
- Wireshark
- Bettercap
- Ettercap
- Hamster
- Driftnet
- responder
- macchanger
The most used tool is Wireshark. Go to “Applications” then in “Sniffing and Spoofing”, you will find these tools.
Kali Linux Tools
Kali Linux is a Linux based operating system, mostly used in penetration testing. Kali.org has recently released its new update with some extra functionalities. There are different types of tools that are present in Kali Linux to perform different operations.
Types of tools in Kali Linux
- Information Gathering
- Vulnerability Analysis
- Web Application Analysis
- Database Assessment
- Password Attacks
- Wireless Attacks
- Reverse Engineering
- Exploitation Tools
- Sniffing and Spoofing
- Post Exploitation
- Forensics
- Reporting Tools
- Social Engineering Tools