List Of Popular Operating Systems Used By Hackers On Daily Basis

I do not know much about hacking, even in my dreams. Lol!

But sometimes I take out my time to browse about anything. I do this because I think I should have some limited knowledge about any technological process that I know could help me someday, since I use the internet a lot. For example, as a website owner I think I should know something about HTML and CSS (at least), that’s why I browse little on them sometimes. I may not come up to be a website coder, but having such uncommon knowledge will help me a lot.

Sometime ago I learnt how to create viruses that could crash a computer, just for fun. I also learnt how to hack into a password protected computer without loosing it’s files. I will make a post on this in the future. I’ve come across websites that upload tutorials to make some little things here and there happen, and I have tried some of what they teach out of curiosity and to see if they really work. Knowledge like that will help me know when people might be trying to get into my online accounts.

The list I make here is quite interesting, maybe there are some of these applications you may not have heard of before.

However, it is always difficult to make this type of “Top” lists since (as far as I know) there are no official statistics to back it up, and everyone has his own likes and preferences. You can argue the reasons why the list you found other places is better than this one without any worry. But I have planned my selections well and know that it is going to tell you something good.

Kali Linux which will be featured here, for instance, has been very popular for the huge list of tools that are available on the site, and for appearing in the series of Mr. Robot. I would say that Kali is a distribution par excellence and is widely used.

Let’s see what you think about this list. I put them in categories so that you can easily know what a particular Operating System is related to.

Pentesting

1. Kali Linux

Without a doubt this is the most famous operating system used for pentesting. From the creators of BackTrack, it is a distribution based on Debian and is available for many different platforms such as VMware, Arm, etc.

2. Parrot Security OS

This operating system is based on Debian GNU/Linux mixed with Frozen box OS and Kali Linux and, with this combination, provides an excellent experience for intrusion tests and security tests. It has many features such as custom anti-forensic tools, GPG, etc.

3. Arch Linux

Arch Linux is the minimalist system par excellence. It follows the KISS (Keep it Simple and Short) principle . Arch Linux uses its Pacman package manager, which combines simple binary packages with an easy-to-use package compilation system. There is also BlackArch that can be used independently or installed on the base system and comes with many pre-installed tools.

4. BackBox

BackBox is a Linux distribution based on Ubuntu. It can work easily in a low performance device and has been developed specifically for intrusion testing and security audits. The new version has interesting features that include forensic analysis, documentation and reporting and reverse engineering.

5. Samurai Web Testing Framework

Samurai Web Testing Framework is a live distro that has been preconfigured to function as a web pentesting test environment. It includes many essential tools such as WebScarab, rat proxy, w3af, Burp Suite and BeEF.

6. Knoppix STD

If you are completely noob in Linux this is the best OP to start with. It is a collection of hundreds, if not thousands, of open source security tools. The best thing about Knoppix is that it is meant to be used by both novice and security professionals.

7. Pentoo

Pentoo is based on Gentoo Linux and is a pentesting distro that uses Enlightenment E17 as a desktop. It works on 32 and 64 bits. It includes drivers to inject packets for wifi, software for cracking by GPU and numerous tools.

8. WiFiSlax

WifiSlax is an excellent distro for audit and security based on Slackware. It includes numerous port and vulnerability scanners, exploit design tools, network traffic sniffers, forensic analysis tools and, above all, wireless network audit (hence its name). In fact it incorporates a large number of drivers for various Wi-Fi cards that are not officially supported in the Linux kernel.

9. GnackTrack

GnackTrack is basically a combination of pentesting tools and the Linux Gnome desktop. Gnacktrack is both Live CD and installable, and is based on Ubuntu. Following the backtrack philosophy, Gnacktrack comes with multiple tools that are useful to make an effective pentest.

10. NodeZero

NodeZero was considered as one of the most practical operating systems for pentesting. It is based on Ubuntu and is well known for including the THC IPV6 toolkit with tools like alive6, detect-new-ip6, dnsdict6, two-new-ip6, fake-advertise6, fake-mipv6, fake_mld6, fake_router6, implementation6, implementation6d, parasite6, recon6, redirect, rsmurf6, sendpees6, smurf6, toobig6 and trace6.

11. Wifiway

The “sister minus” of WiFiSlax, is designed and designed for the security audit of WiFi, Bluetooth and RFID networks. It includes a long list of security tools and wireless auditing ready to be used, specialized in wireless auditing, in addition to adding a series of useful launchers.

Networks

12. Security Onion

Security Onion is designed to detect intrusions and monitor network security. It is based on Xubuntu LTS. Bring tools such as the Wireshark sniffer and intrusion detection software such as Suricata together.

13. Network Security ToolKit

This operating system is based on Fedora and works on both 32-bit and 64-bit platforms. It comes in the form of Live Cd so if we want it is not necessary to install it. The main reason for the development of NST was to provide the security administrator and the network administrator with a complete set of Open Source Network Security Tools.

Privacy and Anonymity

14. Tails

Tails starts from a live-DVD, USB or SD card. Tails runs completely inside the RAM, which means that once the computer is turned off, all traces of activity are cleaned. In addition, Tails promotes anonymity by routing all traffic through the Tor network and uses a variety of encryption tools.

15. Qubes OS

Qubes OS uses the Xen Hypervisor to run a series of virtual machines, separating ‘personal’ life from ‘work’, ‘Internet’ and so on for security reasons. This means that if you accidentally download malware on the your machine, for example, personal files will not be compromised.

16. Whonix

Whonix is designed to run inside a virtual machine. This provides another layer of protection, since malware attacks are contained in the virtual machine. As an added benefit, all user traffic is automatically configured to be sent through the Tor network.

17. Ipredia OS

Like the Tails operating system, the main attraction of Ipredia is that all Internet traffic is redirected to protect its anonymity. Ipredia however uses the I2P network. It also reconfigures a great variety of software for anonymity. Users also have access to “eepsites” (sites hosted anonymously using special domains ending in .i2p).

18. Discreete Linux

It is the successor of Ubuntu Privacy Remix. Store the data in RAM or on a USB memory. It can be run in Live mode, and it also allows you to store some of its settings in an encrypted Cryptobox. Another interesting feature is that kernel modules can only be installed if they have been digitally signed by the Discreete Linux team.

19. Subgraph OS

Subgraph is a “superfortified” distro. It adds to the kernel a series of security improvements and creates virtual “boxes” around applications with certain risk such as web browsers. It includes a custom firewall that also routes all outgoing connections through the Tor network. Encryption of your file system is mandatory.

20. TENS

TENS (Trusted End Node Security) has been designed by the United States Air Force and is approved by the NSA (National Security Agency). The public version of TENS is specifically designed to run in Live mode, which means that any malware is removed when it is turned off. It includes a minimum set of applications, but there is also a ‘Public Deluxe’ version that comes with Adobe Reader and LibreOffice. All versions include a customizable firewall, and it is also worth noting that this operating system supports login through Smart Cards.

21. Kodachi

Linux Kodachi is a Debian-based operating system with a light XFCE desktop that claims to be as secure, anti-forensic and anonymous as possible, while being very easy to use.

Forensic

22. CAINE

CAINE means Computer Aided Investigative Environment and is one of the most complete Linux distributions for forensic analysis. This distribution works like Live DVD and does not touch absolutely any data of the hard disk where it is started.

23. DEFT

DEFT is the acronym for Digital Evidence & Forensic Toolkit. It is a live CD for forensic analysis based on Linux distribution Xubuntu. It is designed to meet the needs of system administrators, police, investigators and forensic computer specialists.

Hacking I would say is not easy and that is why it requires top OPs like the ones I listed above. If you want to learn hacking I think you should consider looking into some of them. Choose the ones your type of work may require.

Do you know of any good operating system commonly used by hackers that I forgot to include here? Share it in the comment box below and also share the post with your friends.

Spread the love

Harti HK

Harti, jocular and mean at the same time... I use the internet a lot and technology freaks me. Everyday I try to learn new things as regards technology and things that are related to it. I don't talk much, maybe this is not true anyway. I wanted to create a platform where I can discuss what I have learned over the years with people, and that's how techsfreak.com came about. My posts are from personal experience, with thorough research. "Internet is the real world." #Go to 'Hire Me' page if you want me to do something for you. #Use the icons at the top/down to follow the blog on social networks to get first-hand updates.

27 thoughts on “List Of Popular Operating Systems Used By Hackers On Daily Basis

  • May 7, 2019 at 6:02 am
    Permalink

    Cyborg Linux
    Matriux
    Weakerth4n
    Which of the above listed hacking Linux distros have you tried? Want to suggest any distro that we missed? Share what you think in the comment section.

    Reply
  • April 26, 2019 at 7:47 am
    Permalink

    What i do not realize is actually how you’re now not actually much more neatly-preferred than you might be now.
    You’re very intelligent. You recognize therefore significantly with regards to this subject, made
    me in my opinion believe it from a lot of various angles.
    Its like women and men aren’t fascinated until it’s one thing to accomplish with
    Lady gaga! Your own stuffs great. At all times care
    for it up!

    Reply
  • April 25, 2019 at 9:05 am
    Permalink

    I have joined your rss feed and look forward to seeking more of your wonderful post.
    Also, I have shared your web site in my social networks!

    Reply
    • April 25, 2019 at 12:54 pm
      Permalink

      Thanks, Victoria.

      Reply
  • April 11, 2019 at 5:59 pm
    Permalink

    Hello! Someone in my Myspace group shared this website with us so I came to give it a look.
    I’m definitely enjoying the information. I’m book-marking and will be tweeting this to my followers!
    Terrific blog and fantastic design.

    Reply
  • March 26, 2019 at 1:13 am
    Permalink

    Hello there! I could have sworn I’ve been to this website before but after reading through some of the post I realized it’s
    new to me. Anyhow, I’m definitely glad I found it and I’ll be book-marking
    and checking back often!

    Reply
  • March 8, 2019 at 9:57 pm
    Permalink

    The my fantastic satisfaction to consider your site also to appreciate your own outstanding submit right here. I prefer which greatly. I am aware that you put a lot attention for those articles, as these make sense and are very useful

    Reply
    • March 9, 2019 at 12:56 am
      Permalink

      Thank you for your comment, Bettina.

      Reply
  • March 6, 2019 at 2:02 pm
    Permalink

    I always spent my half an hour to read this web site’s articles
    or reviews every day along with a cup of coffee.

    Reply
  • March 5, 2019 at 5:01 am
    Permalink

    Excellent beat ! I wish to apprentice at the same time as you amend your site, how can i subscribe for a blog web site? The account aided me a acceptable deal. I had been a little bit familiar of this your broadcast offered vibrant clear idea

    Reply
  • March 4, 2019 at 6:29 am
    Permalink

    Great blog here! Additionally your web site a lot up very fast!
    What web host are you the use of? Can I am getting your affiliate link for
    your host? I wish my website loaded up as quickly as yours lol

    Reply
    • March 4, 2019 at 7:29 am
      Permalink

      Hi,SEO
      I am happy you liked the articles on my blog and the design and the loading-time. Actually I’m using Namecheap hosting, but I think maybe the theme I am using contributes to the experience.

      Feel free to contact me if you have more questions to ask.

      Reply
  • February 27, 2019 at 7:19 am
    Permalink

    I have recently started a web site, the info you offer on this website has helped me tremendously. Thanks for all of your time & work.

    Reply
    • February 27, 2019 at 6:46 pm
      Permalink

      Thanks for your comment. I am happy you liked my blog articles.

      Reply
  • February 26, 2019 at 5:47 pm
    Permalink

    Hello.This post was extremely motivating, particularly because I was searching for thoughts on this subject last Saturday.

    Reply
    • February 26, 2019 at 10:42 pm
      Permalink

      Hi Mireya. I am happy you liked my post.

      Reply
  • February 20, 2019 at 6:30 pm
    Permalink

    This is very interesting, You are a very skilled blogger. I have joined your rss feed and look forward to seeking more of your wonderful post. Also, I’ve shared your web site in my social networks!

    Reply
    • February 20, 2019 at 7:15 pm
      Permalink

      Thanks, Willetta. I really appreciate your efforts.

      Reply
  • February 6, 2019 at 1:12 am
    Permalink

    Hello.This post was extremely interesting, especially because I was browsing for thoughts on this subject last Thursday.

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. Notify me of followup comments via e-mail. You can also subscribe without commenting.

Copyright © 2018, Techsfreak. All rights reserved. Want to copy a post from here? Don't forget to link back to the blog.