fbpx

7 Best Security Tools In Ubuntu

Ubuntu is a computer operating system that is based on Linux/GNU, it is a free and open source operating system a free community developed it. Ubuntu is available and can be use for both desktop and server. It is easy to install and use both via flash drive or via compact disk.


Security is the main concern of our blog, so in this article we will talk about the security tools that are available on ubuntu, to install this tool open terminal Applications->Accessories->Terminal

Wireshark – Network Traffic Analyzer
A sniffer is a tool that used to capture the ingoing and outgoing traffic from a wire on a network, it it also called a packet analyser. To get Wireshark on ubuntu type:
sudo apt-get install wireshark

Nessus – Remote network security auditor
Nessus is a world class active vulnerability scanner, nessus is used for multi task such as configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. To install Nessus on ubuntu type on terminal:
sudo apt-get install nessus

Nmap – The Network Mapper
Nmap or network mapper is a world class tool to perform network exploration and security auditing, it is a open source and freely available. Administrator also find it useful on network inventory and monitoring host on the network. It can finger print the operating system running on the desired IP. To get Nmap on ubuntu type:
sudo apt-get install nmap 
Kismet – Wireless 802.11b monitoring tool
Kismet is a wireless network detector, sniffer and intrusion detection, it is work on data link layer of OSI model. To get Kismet on ubuntu type:
sudo apt-get install kismet

Netcat – TCP/IP swiss army knife 
Netcat normally known as swiss army knife, it is used for multi purpose like monitoring of inbond and outbond traffic of TCP and UDP, DNS forward and reverse checking, port scanning etc. To get netcat on ubuntu type:
sudo apt-get install netcat 

John the Ripper

John the Ripper is a free and open source password cracker tool, it offers both brute force and dictionary attack. It is used by the administrator to find out the weak passwords. To install john in ubuntu type.

sudo apt-get install john  
p { margin-bottom: 0.08in; }h1 { margin-bottom: 0.08in; }h1.western { font-family: “Liberation Serif”,serif; }h1.cjk { font-family: “DejaVu Sans”; }h1.ctl { font-family: “Lohit Hindi”; }

p { margin-bottom: 0.08in; }h1 { margin-bottom: 0.08in; }h1.western { font-family: “Liberation Serif”,serif; }h1.cjk { font-family: “DejaVu Sans”; }h1.ctl { font-family: “Lohit Hind

Snort – Flexible Network Intrusion Detection System

Snort is network intrusion detection system, we have previously shared a article on intrusion detection click here. To install snort on ubuntu type:
sudo apt-get install snort 

Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...