Intrusion Detection Systems Niche-specific hacker tools

Top Ten Hacking Tools of 2016Linux Pentesting (Hacking) Distros

This is our recommended list of “Intrusion Detection” hacker tools that a professional pentester (penetration tester), ethical hacker, digital forensics or cybersecurity enthusiast should know how to use effectively. We regularly update this list so please let us know if there is a hacking tool you’d like us to add!

Five most common uses for Intrusion Detection Systems (IDS)

  • Discover unusual network activity by examining logs.
  • Discover changes made to key system files.
  • Discover, monitor and track installed software.
  • Examine network connections a host makes.
  • Discover and establish and type of tampering or obfuscation (through using an HIDS tools).