Anonymous hackers and cybercriminals uses various hacking tools to attack their targets. They will use DDoS tools and SQL injection tools to hack potential websites. The hackers will also use ‘cracked’ vulnerability scanners which will allow them to perform vulnerability audits on the domains that they want to target.
The cybercrime tools and Anonymous hacking tools are used to deface, takedown or infect a domain. Take a look at the following list of cybercrime tools which are used by Anonymous hackers and Cybercriminals.
HOIC and LOIC
The LOIC attack tool uses crafted TCP and UDP packets to initiate a DDoS attack on the selected domain.
- Assasin DoS
- GoodBye DoS v3.0
- GoodBye DoS v5.0
- TeV DoS
- SSL DoS (Advance Denial of Service Attack tool)
- BFF DoS
- Death PING
- Anonymous DoSer
- Cain & Abel
Cracked vulnerability scanners
Cybercriminals are using hacked vulnerability scanners to scan their victims. They will use the cracked vulnerability scanner from Acunetix which can be found on various Torrent websites.
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software, user can perform back-end database fingerprinting, retrieve DBMS login names and password hashes, dump tables and columns, fetch data from the database, execute SQL statements against the server, and even access the underlying file system and execute operating system shell commands.
The popular Darkcomet RAT is being used by Anonymous hackers and cybercriminals to steal personal information from the infected devices. The main functions of the DarkComet RAT allow the hackers to take full control over the infected device. This software allows everybody (possibly a hacker, company owner, security consultant, etc.) to capture in full streaming the desktop and the video from the webcam. It can listen in on the microphone, can grab the passwords and can download and manage files. And much more. This actions can be executed remotely on a single computer or on several computer at the same time.
The AndroRAT is an remote administration tool which is made for Android devices. The administration tool can be used for various purposes and can be loaded with various plugins to make it an effective administration tool.
The Blackshades RAT uses tools called “spreaders” to infect other computers by using instant messages or links on social websites which appear to come from the victims’ friends and contacts. It contains a “keylogger,” which allows users to record their victims’ keystrokes and gain access to account numbers and passwords. The software also has a tool called “file hijacker,” which allows the users to encrypt their victims’ computer files and then demand payment to unlock them.