Thursday, April 29, 2010
Wednesday, April 28, 2010
Hping - Active Network Security Tool
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts. A subset of the stuff you can do using hping:
While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts. A subset of the stuff you can do using hping:
- Firewall testing
- Advanced port scanning
- Network testing, using different protocols, TOS, fragmentation
- Manual path MTU discovery
- Advanced traceroute, under all the supported protocols
- Remote OS fingerprinting
- Remote uptime guessing
- TCP/IP stacks auditing
- hping can also be useful to students that are learning TCP/IP.
Download NetStumbler 0.4.0 Build 554 - Detect Wireless Local Area
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
- Verify that your network is set up the way you intended.
- Find locations with poor coverage in your WLAN.
- Detect other networks that may be causing interference on your network.
- Detect unauthorized “rogue” access points in your workplace.
- Help aim directional antennas for long-haul WLAN links.
- Use it recreationally for WarDriving.
Tuesday, April 27, 2010
Kismet-802.11 layer2 wireless network detector
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
Cain and Abel Freeware download and review - password recovery
Cain and Abel is a password recovery tool that enables network administrators to test network security, or home users to recover a variety of stored network passwords. The program reports sniffing and recovery of most popular protocols, including FTP, SMTP, POP3, HTTP, mySQL, ICQ, Telnet and others. It can also recover passwords hidden behind asterisk (***), stored in VNC profiles, SQL Server Enterprise Manager, Remote Desktop connections and wireless connections. Other features include LSA Secrets Dumper, Protected Storage password revealer, network enumeration, VoIP filtering and more. Probably one of the most complete network password recovery/security tools you can find. Cain and Abel is intended for network administrators or advanced users. (--- NOTE: Expect your antivirus software to alert you of a password cracking or hacking tool when installing this software! ---)
LCP 5.04: Download LCP 5.04 - Windows Account Passwords Auditing
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Windows operating systems keep their passwords into an encrypted form called "hashes". Passwords cannot be retrieved directly from hashes. To recover passwords it is necessary to compute hashes by possible passwords and compare them to the existing hashes. Password auditing includes check of possible ways to retrieve user accounts information. Result of password recovery is passwords in case-sensitive form.
There are several ways to obtain password hashes, depending on their location and existing access. Password hashes can be obtained from SAM file or its backup, directly from local or remote computer registry, from registry or Active Directory on local or remote computer by means of DLL injection, from a network sniffer.
There are several ways to obtain password hashes, depending on their location and existing access. Password hashes can be obtained from SAM file or its backup, directly from local or remote computer registry, from registry or Active Directory on local or remote computer by means of DLL injection, from a network sniffer.
Monday, April 26, 2010
Download PuTTY - a free SSH and telnet client for Windows
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4×0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers.
Here are the PuTTY files themselves:
Here are the PuTTY files themselves:
- PuTTY (the Telnet and SSH client itself)
- PSCP (an SCP client, i.e. command-line secure file copy)
- PSFTP (an SFTP client, i.e. general file transfer sessions much like FTP)
- PuTTYtel (a Telnet-only client)
- Plink (a command-line interface to the PuTTY back ends)
- Pageant (an SSH authentication agent for PuTTY, PSCP and Plink)
- PuTTYgen (an RSA and DSA key generation utility
Eraser 6.0.7.1893 (Free Advanced Security Tool)
Department of Defence and Solid-State Memory and are based on Peter Gutmann’s paper Secure Deletion of the one defined in the National Industrial Security Program Operating Manual of Data from the hard drive. Eraser The patterns used for overwriting are selected completely to remove sensitive data from your own overwriting methods.Eraser Other methods include the U.S. Eraser is an advanced security tool for Windows that allows you effectively to remove magnetic remnants from Magnetic and overwriting with carefully selected patterns. With Eraser You can also define your hard drive by overwriting Eraser several times with pseudorandom data.
Eraser Features :
Eraser works with Windows XP, Windows Vista, Windows Server 2003 and Windows Server 2008.
Windows 98, ME, NT, 2000 can still be used with version 5.7!.
Eraser works with any drive that works with Windows.
Eraser Secure drive erasure methods are supported out of the box.
Erases files or folders and their previous deleted counterparts.
Eraser Works with an extremely customisable Scheduler
Eraser Features :
Eraser works with Windows XP, Windows Vista, Windows Server 2003 and Windows Server 2008.
Windows 98, ME, NT, 2000 can still be used with version 5.7!.
Eraser works with any drive that works with Windows.
Eraser Secure drive erasure methods are supported out of the box.
Erases files or folders and their previous deleted counterparts.
Eraser Works with an extremely customisable Scheduler
Yersinia Is A Network Tool - Free download
Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.
Currently, there are some network protocols implemented, but others are coming (tell us which one is your preferred). Attacks for the following network protocols are implemented (but of course you are free for implementing new ones):
Currently, there are some network protocols implemented, but others are coming (tell us which one is your preferred). Attacks for the following network protocols are implemented (but of course you are free for implementing new ones):
- Spanning Tree Protocol (STP)
- Cisco Discovery Protocol (CDP)
- Dynamic Trunking Protocol (DTP)
- Dynamic Host Configuration Protocol (DHCP)
- Hot Standby Router Protocol (HSRP)
- IEEE 802.1Q
- IEEE 802.1X
- Inter-Switch Link Protocol (ISL)
- VLAN Trunking Protocol (VTP)
Free Download Wireshark Latest Full version
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Thursday, April 22, 2010
Security Database Tools Watch - pofv2.0.8 Finger Printing Tool
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
Super Scan - Freeware Network Scanner
SuperScan is a powerful TCP port scanner, that includes a variety of additional networking tools like ping, traceroute, HTTP HEAD, WHOIS and more. It uses multi-threaded and asynchronous techniques resulting in extremely fast and versatile scanning. You can perform ping scans and port scans using any IP range or specify a text file to extract addresses from. Other features include TCP SYN scanning, UDP scanning, HTML reports, built-in port description database, Windows host enumeration, banner grabbing and more.
Wednesday, April 21, 2010
Nikto - Web Server Scanner
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs, checks for outdated versions of over 950 servers, and version specific problems on over 260 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated
John The Ripprer Password Cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches
Nessus Remote Security Scannaer
The Nessus® vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.
Download eMule 0.49c Build 2/0.50a Final Download
The first thing that we need to use the P2P method is a client that gives us an interface to connect to the network, where we can find the files that we want. From a wide variety of options, we can safely say that eMule is the most famous and used of all of them
Tuesday, April 20, 2010
Advanced Port Scanner 1.3 (free) -Small, Fast, Robust & Easy-To-use
What is Advanced Port Scanner?
Advanced Port Scanner is a small, fast, robust and easy-to-use port scanner for Win32 platform. It uses a multithread technique, so on fast machines you can scan ports very fast. Also, it contains descriptions for common ports, and can perform scans on predefined port ranges.
Nmap-free Securitryt Scanner For Network Exploration & Securitry...
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
.
.
Subscribe to:
Posts (Atom)