Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

Black Hat 2014: 10 Cool Hacking Tools To Check Out

These hacking tools demonstrated at the 2014 Black Hat conference could intercept VoIP calls, capture and identify malware or simply Rickroll your neighbor's Chromecast-connected television.

1   2   3   ... 11 Next

photo

Hacking Tools Bolster Security When Used Ethically

The hacking tools demonstrated at the Black Hat 2014 conference could help penetration testers uncover weaknesses in VoIP communications, conduct phishing attacks to support end-user security awareness training or better secure Amazon Web Services instances. Many of the tools demonstrated during the 2014 Black Hat USA Briefings or Arsenal tool showcase are open source, side projects conducted by ethical hackers from solution providers, consultancies and security vendors to make their jobs more efficient. It's a labor of love, one security industry veteran and penetration tester told CRN.

The tools uncover software vulnerabilities and take advantage of configuration weaknesses that otherwise may not be addressed by businesses or repaired by software makers. Here are 10 tools in various stages of development worth checking out.

 
 
1   2   3   ... 11 Next

sponsored resources