Basic Hacking Tools

What's My IP:
(page loaded) date and time: Friday, 21-Jan-2022 02:51:46 GMT
browser & OS: CCBot/2.0 (
JavaScript status:

No black magic tricks here just basic information obtained with Server Side Includes. Basically the web routes data from one location to another using an IP address. To make things easier to understand an IP address might have a machine name or domain name related to your ISP. However doing reverse DNS lookup using <!--#echo var="REMOTE_HOST" --> of an “IP address” might not give accurate results, because a proxy might be in use.

Too often it seems so called experts on FOX and other infotainment network outlets stereotype “hackers” and sensationalize “hacking,” so my goal with this part of my site is to put the risks into prospective and show people a few simple tricks of the trade.

First off a “hacker” is someone who plays with technology for enjoyment but the term has become synonymous with “cracker,” a person that performs an illegal act. So ya ask should ya be are worried about crackers? Well I’d say if you use windows ya have a greater chance of being a target. To find out how secure or unsecure you are, perform an internet connection security analysis (of commonly probed ports). If ya want a computer without spyware and virus (or virii, as some would prefer) BS common with windows and just plain works get a Mac and hack proof it!

BTW if ya have a question then read my Hacking FAQ's else try the graffiti wall to post a question or share a comment about stuff like hacking WiFi. PS if ya want to know the big secret of hacking, it’s RTFM!

Domain Lookup Enter a domain (for example COM or CH which is short Switzerland), and you can get the name of the country for which that domain is associated.
eMail Dossie Validate and investigate eMail addresses (for example USER@HOSTNAME).
Finger If you can pull a Finger, (for example USER@HOSTNAME) this will tell you various information about that account.
IP Location IP Address Locator Tool (for example, will return a map dynamically generated using the U.S. Census Bureau's TIGER Mapping Service.
IP Targeting Target the IP host in Latitude/Longitude (for example Micro$oft.COM), will return Lat, Lon: (47.675, -122.117), useful if you want to nuke the evil empire.
MAC Address MAC address Short for Media Access Control address, a hardware address that uniquely identifies each node of a network (for example "apple" or "allied" or "00:A0:40" or " 00:80:C7").
man man formats and displays the on-line (UNIX) manual pages. If you specify section, man only looks in that section of the manual.
NMAP NMAP is a utility for port scanning large networks (for example APPLE.COM).
NSLookup If the domain name has been activated (for example APPLE.COM), it will return a numerical value such as
PING The ping utility sends a packet to the specified host (for example APPLE.COM) and waits for a reply. The host address and round-trip times for each pair of packets are displayed.
Profile Using Quantcast its possible to profile what kind of audience a website attracts, just enter a website (for example APPLE.COM) to check out demograpic info.
Port Number The Internet Storm Center gathers more than 3,000,000 intrusion detection log entries every day and providing authoritative data on the types of attacks that are being mounted against computer ports (for example 80 or 19).
Reverse DNS Type in an IP address (for example to find out the DNS or the Domain Name Server.
Traceroute Traceroute tracks the path taken by packets as they travel from source (the default is the San Diego Super Computer Center) to destination (for example APPLE.COM).
Traffic Rank The traffic rank (for example APPLE.COM) is based on aggregated historical traffic data from millions of Alexa Toolbar users and is a combined measure of page views and users (reach.)
Uptime Report a site’s (for example APPLE.COM) operating system, web server, and netblock owner together with, if available, a graphical view of the time since last reboot for each of the computers serving the site.
Whois Whois, can determine whether the domain name you desire is already in use (for example APPLE.COM); in addition you can learn who administers a particular site; and you can view a list of a site’s name servers.

IP Calculator takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. PHP Subnet Calculator - to install, just move PHP Subnet Calculator SubnetCalc.php into the webroot of a php capable webserver.

Use IP & CIDR Netmask:
Or IP & Netmask:
Or IP & Wildcard Mask:
IP & Mask or CIDR

At Toorcon 2003 (Information Security Conference) a talk was given on utilities people in the know seem to find most useful. So FYI here a rough list of the top 20 hacking tools. FYI has a list of top 75 Security Tools.

Nessus The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
Ethereal Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
Snort Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.
Netcat Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol
TCPdump TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.
Hping Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).
DNSiff DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).
GFI LANguard GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil's advocate alerting you to security vulnerabilities.
Ettercap Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.
Nikto Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.
John the Ripper John the Ripper is a fast password cracker, currently available for many flavors of Unix.
OpenSSH OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.
TripWire Tripwire is a tool that can be used for data and program integrity assurance.
Kismet Kismet is an 802.11 wireless network sniffer - this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.
NetFilter NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.
IP Filter IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.
pf OpenBSD Packet Filter
fport fport identifys all open TCP/IP and UDP ports and maps them to the owning application.
SAINT SAINT network vulnerability assessment scanner detects vulnerabilities in your network's security before they can be exploited.
OpenPGP OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.

Internet Storm Center Status by is an attempt to collect data about cracker activity from all over the internet. The data is cataloged and summarized, which enables trends to be discovered. The site also postes a Survival Time, which is the average time between attacks on various networks.

Internet Status

HackerWatch - World Internet Traffic Map lets you report and share information that helps identify, combat, and prevent the spread of Internet threats and unwanted network traffic.

Akamai monitors global Internet conditions around the clock. With this real-time data it is possible to identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density).

A “Proxy” is an application that breaks the connection between sender and receiver, thus protecting your internet privacy (to some degree) while you are surfing. Enjoy the proxy gateway list(1) and list(2). If you’re curious, try Test Page for Web Anonymzing Services to test the various proxies yourself. Note as of 11/19/2001 those suffering from corporate oppression and Muslims in Saudi Arabia, UAE, etc. looking for porn better have alternative plans, because Safeweb turns off free service.

URL (for example APPLE.COM)
Anonymizer proxify

The University of Toronto's Internet Censorship Explorer permits anyone with a Web browser to test the limits of certain national and organizational Internet-blocking schemes. Users simply enter a target URL and a country into a search field on the Censorship Explorer's website. The software then scans the ports of available servers in that country, looking for open ones.

If you’re interested in anonymous surfing (i.e. the phaster proxy gateway), and wondering is someone watching your every move, then you may also know eMail is not private (it is like sending a postcard that leaves a trail). So here is a list of free eMail services, some of which include a measure of security. B.T.W. if you have any browser privacy issues, I have Netscape Navigator secrets and tips on how to secure Internet Explorer (concepts presented here apply to all browsers).

Phaster computer security resources search includes: exploits/bugs, internet security tools, guides to ethical hacking, encryption, network security documentation, hacks, cracks, phreaking stuff, etc.


Select an ALT News Group - Google Powered

Serials 2000 and serials & keys are clearinghouses of serial numbers for thousands of commercial and shareware programs that allows a user to check out disabled features of demo programs and reinstall software you may have misplaced the keys for like Windows 98, Windows ME, etc. Cyxla has gathered together a nice default password database of all mayor hardware and software manufacturers such as 3com, Celplex,Cajun ,Cisco, Lotus Domino, Shiva, Cisco, Avaya, microsoft, meridian, shiva, siemens.

If you’re a hacker or just curious, ya might want to check out CyberLaw an educational service focusing on legal issues concerning computer technology. CyberLex reports legal developments touching the computer industry and is distributed monthly throughout the United States. The Cyberlaw Encyclopedia is a large nexus on legal matters pertaining to cyberspace.

Buzz words like “Hacker” are used by the media, politicians, corporations and government agencies for so called (dis)information warfare (IW). B.T.W. looking for info on: anthrax, Bin Laden, Bush, etc?

 Center for Secure Information Systems
 Federation of American Scientists: DoctrineLINK
 i2 Inc. - visual investigative analysis software
 Joint Vision - how the U.S. military can exploit advanced technologies
 Psychological Operations/Warfare

The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections. The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.

BTW another site I found interesting is TeleGeography which has an innovative approach to cartography and distills complex data sets into attractive maps showing various patterns like the world's Internet backbone architecture scaled by aggregate capacity and international telephone traffic statistics converted into a route-flow diagram.

Internet Status

Many factors such as: your modem speed, phone line quality (unless you are connecting with an ISDN line or a cable modem), computer hardware (processor speed, cache, etc.), and web traffic jams affect how fast you connect to the internet and how fast web pages load on your computer. The following links will test your internet connection speed.

Your browser has JavaScript turned off.
To use the internet connection speed tests, turn JavaScript on in your browser preferences.

Internet Explorer users: Preferences > Web Content > Enable Scripting
Netscape Navigator users: Preferences > Advanced > Enable JavaScript - speedtest - speed test
 Bandwidth Speed Test
 Golden Hill Free Web JavaScript Bandwidth Test

WiFi is an open-standard technology that enables wireless connectivity between laptops and local area networks and until reciently, wireless local area networks have been just another grass roots hobbyist technology. FYI a WiFi protocol analyzer can help you plan and secure your network even if you don't use WiFi...

Since this “Hacked” page seems to have international appeal, try these computer-based translation systems (it might be good for a laugh or two).


Since you have read this far, do ya think terrorism will end when rm -fr /bin/laden/? You can use the graffiti wall to post your own opinion on that question or use it to share your own bytes of hacking knowledge with others.

News & Weather | Search Engines | Stock Quotes | Chat & eMail | Travel Info
Phone Directory & Road Maps | Encyclopedia | Hacking Tools | Shopping | Add URL | Home