Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom Dell Technologies World Digital Experience 2020 HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

Black Hat 2014: 10 Cool Hacking Tools To Check Out

These hacking tools demonstrated at the 2014 Black Hat conference could intercept VoIP calls, capture and identify malware or simply Rickroll your neighbor's Chromecast-connected television.

1   2   3   ... 11 Next

photo

Hacking Tools Bolster Security When Used Ethically

The hacking tools demonstrated at the Black Hat 2014 conference could help penetration testers uncover weaknesses in VoIP communications, conduct phishing attacks to support end-user security awareness training or better secure Amazon Web Services instances. Many of the tools demonstrated during the 2014 Black Hat USA Briefings or Arsenal tool showcase are open source, side projects conducted by ethical hackers from solution providers, consultancies and security vendors to make their jobs more efficient. It's a labor of love, one security industry veteran and penetration tester told CRN.

The tools uncover software vulnerabilities and take advantage of configuration weaknesses that otherwise may not be addressed by businesses or repaired by software makers. Here are 10 tools in various stages of development worth checking out.

 
 
1   2   3   ... 11 Next

sponsored resources