Joint report on publicly available hacking tools

report ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Download.9707f7cfb011873c42d284fb1469de73.svg) Download / Print article PDF ##### ShareCopied to clipboard ##### Share![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)##### Facebook![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)##### Linkedin![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)##### X![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)##### Copy LinkCopied to clipboard ##### Share![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)##### Facebook![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)##### Linkedin![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)##### X![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)##### Copy LinkJoint report on publicly available hacking tools================================================How to limit the effectiveness of tools commonly used by malicious actors. Invalid DateTime This report is a collaboration based on research provided by the cyber security authorities of five nations: Australia, Canada, New Zealand, the UK and USA.In it we highlight the use of five publicly-available tools, observed in recent cyber incidents around the world. To aid the work of network defenders and systems administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network. *** ** * ** ***Downloads———[![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/default-ncsc.42adfc545b6c2f00406d4db323739cdd.svg)* pdf* 560 KB#### Joint report on publicly available hacking tools (NCSC).pdfJoint report on publicly available hacking tools (NCSC).pdf](https://www.ncsc.gov.uk/files/Joint report on publicly available hacking tools (NCSC).pdf) Topics——[Vulnerabilities](https://www.ncsc.gov.uk/section/advice-guidance/all-topics?topics=Vulnerabilities)| ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Chevron_blue_up-CA.0731190020f3afd1faf8227c16c32bfd.svg) | Back to top | ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Download.9707f7cfb011873c42d284fb1469de73.svg) | Download / Print article PDF || ##### Share|| Copied to clipboard || ##### Share|| ![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)|| ##### Facebook|| ![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)|| ##### Linkedin|| ![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)|| ##### X|| ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)|| ##### Copy Link|| Copied to clipboard || ##### Share|| ![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)|| ##### Facebook|| ![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)|| ##### Linkedin|| ![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)|| ##### X|| ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)|| ##### Copy Link|| * || ##### Published|| * 11 October 2018| *|| ##### Written For|| * [Public sector](/section/advice-guidance/public-sector)| * [Large organisations](/section/advice-guidance/large-organisations)| * [Cyber security professionals](/section/advice-guidance/cyber-security-professionals)| * || ##### Published|| * 11 October 2018| *|| ##### Written For|| * [Public sector](/section/advice-guidance/public-sector)| * [Large organisations](/section/advice-guidance/large-organisations)* [Cyber security professionals](/section/advice-guidance/cyber-security-professionals) ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Chevron_blue_up-CA.0731190020f3afd1faf8227c16c32bfd.svg) Back to top

Related Tags:
NAICS: 55 – Management Of Companies And Enterprises

NAICS: 921 – Executive

Legislative

Other General Government Support

NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 92 – Public Administration

Blog: NCSC Reports

Guidance and Blog-post

Software Discovery: Security Software Discovery

Software Discovery

System Time Discovery

Associated Indicators: