Most used cybercrime tools

Anonymous hackers and cybercriminals uses various hacking tools to attack their targets. They will use DDoS tools and SQL injection tools to hack potential websites. The hackers will also use ‘cracked’ vulnerability scanners which will allow them to perform vulnerability audits on the domains that they want to target.

Cybercrime tools

The cybercrime tools and Anonymous hacking tools are used to deface, takedown or infect a domain. Take a look at the following list of cybercrime tools which are used by Anonymous hackers and Cybercriminals.

HOIC and LOIC

Lets start with the Anonymous HOIC and LOIC DDoS tools. The LOIC and HOIC tools are a open source network stressing tool which is capable of performing denial-of-service attacks. The Low Orbit Ion Cannon is being used by Anonymous hackers to initiate various DDoS attacks on websites. The LOIC tool is written in c-sharp and it is developed by the Preatox Technologies company. The Anonymous hackers created another version of the LOIC, which allows hackers to initiate DDoS attacks via websites that host the JavaScript version of LOIC, titled ‘JS LOIC’.

The LOIC attack tool uses crafted TCP and UDP packets to initiate a DDoS attack on the selected domain.

  1. Assasin DoS
  2. GoodBye DoS v3.0
  3. GoodBye DoS v5.0
  4. ByteDoS
  5. TeV DoS
  6. SSL DoS (Advance Denial of Service Attack tool)
  7. BFF DoS
  8. Death PING
  9. DoSHTTP
  10. Anonymous DoSer
  11. Cain & Abel
  12. Nikto

Cracked vulnerability scanners

Cybercriminals are using hacked vulnerability scanners to scan their victims. They will use the cracked vulnerability scanner from Acunetix which can be found on various Torrent websites.

Havij

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software, user can perform back-end database fingerprinting, retrieve DBMS login names and password hashes, dump tables and columns, fetch data from the database, execute SQL statements against the server, and even access the underlying file system and execute operating system shell commands.

Darkcomet RAT

The popular Darkcomet RAT is being used by Anonymous hackers and cybercriminals to steal personal information from the infected devices. The main functions of the DarkComet RAT allow the hackers to take full control over the infected device. This software allows everybody (possibly a hacker, company owner, security consultant, etc.) to capture in full streaming the desktop and the video from the webcam. It can listen in on the microphone, can grab the passwords and can download and manage files. And much more. This actions can be executed remotely on a single computer or on several computer at the same time. 

Andro RAT

The AndroRAT is an remote administration tool which is made for Android devices. The administration tool can be used for various purposes and can be loaded with various plugins to make it an effective administration tool.

Blackshades RAT

The Blackshades RAT uses tools called “spreaders” to infect other computers by using instant messages or links on social websites which appear to come from the victims’ friends and contacts. It contains a “keylogger,” which allows users to record their victims’ keystrokes and gain access to account numbers and passwords. The software also has a tool called  “file hijacker,” which allows the users to encrypt their victims’ computer files and then demand payment to unlock them.

Founder of Cyberwarzone.com.