The 5 operating systems used by hackers and security technicians

As we have seen in how hackers do in the show Mr Robot we understand that the good ones certainly do not use a Windows PC to do their operations and intrusions, but Linux systems with special command line tools that are not easy to understand for those who are not expert.
Out of curiosity, if you want to know what type of PC the best hackers use, we see this list of 5 operating systems based on Linu x, which are equipped with some of the main programs for scanning and intrusion into computer networks, which also include tools used by technicians to do safety and recovery tests .
1) Kali Linux is certainly the most popular operating system for hacking networks and looking for open ports and security holes within a protected network.
Kali Linux, formerly known as Backtrack, includes all network testing tools, and to maintain online privacy.
Kali Linux is pre-installed with over 300 penetration-testing programs, including Armitage (a graphical tool used for cyber attacks), Nmap (popular port scanner program), Wireshark (a traffic analyzer on the network), John the Ripper (a program to find out passwords), Aircrack-ng (the most famous tool to catch the password of a protected wifi network) and many others.
Kali Linux can be used on any PC as a Live CD without installation, although a computer with a compatible network card may be required for network operations.
Kali Linux is also an operating system used for forensic computing, to recover deleted data from computers.
In Mr. Robot, the Kali Linux logo appears in the background in episode 5 of the first series.
With Kali Linux we have seen how easy it is to crack a WPA / WPA 2 wifi network
2) Pentoo
This is one of the best hacker operating systems available as Live CD, inside a USB stick, to be tried and used on a computer without having to install it.
Pentoo is available in 32-bit and 64-bit versions which is significantly better and faster.
Based on Linux Gentoo, it allows you to inject packets over wifi networks, to use cracking software and tools to do penetration tests and security assessments.
3) Parrot Security OS is a Debian Linux based operating system that includes many of Kali Linux tools with the aim of providing a test tool for cyber and network security.
This system offers many tools for analyzing computer systems and forensic and scientific police use to recover deleted traces and files and force encryption keys.
It also allows you to surf and work anonymously.
The project is certified to work on machines that only have 265MB of RAM and is suitable for 32-bit (i386) and 64bit (amd64) computers.
4) Network Security Toolkit (NST) is another popular operating system for making security tests and that can be used as a Live CD by starting it directly from the computer without installing anything.
5) BackBox is a Linux distribution for testing security and network penetration, based on Ubuntu and which includes many analysis tools and to create an environment that protects privacy.
BackBox is designed to be fast, easy to use and provide a minimal yet complete desktop environment.
Among the operating systems for hackers, it is the easiest one to use even for inexperienced people.
This system is also an excellent free solution for monitoring individual network devices in a company.
Interesting curiosity, Backbox was born from an all-Italian project
READ ALSO: Safe, anonymous Linux systems to use the computer without traces

Leave Your Comment

Please enter your comment!
Please enter your name here