Thursday, April 29, 2010

How To Abort The Mistaken Shutdown Operation In Windows

0 comments

You’ve mistakenly pressed shutdown button on your pc or you mistakenly choose restart
Read More...
                                 

Wednesday, April 28, 2010

Hping - Active Network Security Tool

0 comments
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts. A subset of the stuff you can do using hping:
  • Firewall testing
  • Advanced port scanning
  • Network testing, using different protocols, TOS, fragmentation
  • Manual path MTU discovery
  • Advanced traceroute, under all the supported protocols
  • Remote OS fingerprinting
  • Remote uptime guessing
  • TCP/IP stacks auditing
  • hping can also be useful to students that are learning TCP/IP.
Hping works on the following unix-like systems: Linux, FreeBSD, NetBSD, OpenBSD, Solaris, MacOs X, Windows.

Download NetStumbler 0.4.0 Build 554 - Detect Wireless Local Area

0 comments
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
  • Verify that your network is set up the way you intended.
  • Find locations with poor coverage in your WLAN.
  • Detect other networks that may be causing interference on your network.
  • Detect unauthorized “rogue” access points in your workplace.
  • Help aim directional antennas for long-haul WLAN links.
  • Use it recreationally for WarDriving.

Tuesday, April 27, 2010

Kismet-802.11 layer2 wireless network detector

0 comments
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).

Cain and Abel Freeware download and review - password recovery

0 comments
Cain and Abel is a password recovery tool that enables network administrators to test network security, or home users to recover a variety of stored network passwords. The program reports sniffing and recovery of most popular protocols, including FTP, SMTP, POP3, HTTP, mySQL, ICQ, Telnet and others. It can also recover passwords hidden behind asterisk (***), stored in VNC profiles, SQL Server Enterprise Manager, Remote Desktop connections and wireless connections. Other features include LSA Secrets Dumper, Protected Storage password revealer, network enumeration, VoIP filtering and more. Probably one of the most complete network password recovery/security tools you can find. Cain and Abel is intended for network administrators or advanced users. (--- NOTE: Expect your antivirus software to alert you of a password cracking or hacking tool when installing this software! ---)

LCP 5.04: Download LCP 5.04 - Windows Account Passwords Auditing

0 comments
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Windows operating systems keep their passwords into an encrypted form called "hashes". Passwords cannot be retrieved directly from hashes. To recover passwords it is necessary to compute hashes by possible passwords and compare them to the existing hashes. Password auditing includes check of possible ways to retrieve user accounts information. Result of password recovery is passwords in case-sensitive form.
There are several ways to obtain password hashes, depending on their location and existing access. Password hashes can be obtained from SAM file or its backup, directly from local or remote computer registry, from registry or Active Directory on local or remote computer by means of DLL injection, from a network sniffer.

Monday, April 26, 2010

Download PuTTY - a free SSH and telnet client for Windows

0 comments
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4×0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers.

Here are the PuTTY files themselves:
  • PuTTY (the Telnet and SSH client itself)
  • PSCP (an SCP client, i.e. command-line secure file copy)
  • PSFTP (an SFTP client, i.e. general file transfer sessions much like FTP)
  • PuTTYtel (a Telnet-only client)
  • Plink (a command-line interface to the PuTTY back ends)
  • Pageant (an SSH authentication agent for PuTTY, PSCP and Plink)
  • PuTTYgen (an RSA and DSA key generation utility

Eraser 6.0.7.1893 (Free Advanced Security Tool)

0 comments
Department of Defence and Solid-State Memory and are based on Peter Gutmann’s paper Secure Deletion of the one defined in the National Industrial Security Program Operating Manual of Data from the hard drive. Eraser The patterns used for overwriting are selected completely to remove sensitive data from your own overwriting methods.Eraser Other methods include the U.S. Eraser is an advanced security tool for Windows that allows you effectively to remove magnetic remnants from Magnetic and overwriting with carefully selected patterns. With Eraser You can also define your hard drive by overwriting Eraser several times with pseudorandom data.
Eraser Features :
Eraser works with Windows XP, Windows Vista, Windows Server 2003 and Windows Server 2008.
Windows 98, ME, NT, 2000 can still be used with version 5.7!.
Eraser works with any drive that works with Windows.
Eraser Secure drive erasure methods are supported out of the box.
Erases files or folders and their previous deleted counterparts.
Eraser Works with an extremely customisable Scheduler

Yersinia Is A Network Tool - Free download

0 comments
Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.
Currently, there are some network protocols implemented, but others are coming (tell us which one is your preferred). Attacks for the following network protocols are implemented (but of course you are free for implementing new ones):
  • Spanning Tree Protocol (STP)
  • Cisco Discovery Protocol (CDP)
  • Dynamic Trunking Protocol (DTP)
  • Dynamic Host Configuration Protocol (DHCP)
  • Hot Standby Router Protocol (HSRP)
  • IEEE 802.1Q
  • IEEE 802.1X
  • Inter-Switch Link Protocol (ISL)
  • VLAN Trunking Protocol (VTP)

Free Download Wireshark Latest Full version

0 comments
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.

Thursday, April 22, 2010

Security Database Tools Watch - pofv2.0.8 Finger Printing Tool

0 comments
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.

Super Scan - Freeware Network Scanner

0 comments
SuperScan is a powerful TCP port scanner, that includes a variety of additional networking tools like ping, traceroute, HTTP HEAD, WHOIS and more. It uses multi-threaded and asynchronous techniques resulting in extremely fast and versatile scanning. You can perform ping scans and port scans using any IP range or specify a text file to extract addresses from. Other features include TCP SYN scanning, UDP scanning, HTML reports, built-in port description database, Windows host enumeration, banner grabbing and more.

Wednesday, April 21, 2010

Nikto - Web Server Scanner

0 comments
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs, checks for outdated versions of over 950 servers, and version specific problems on over 260 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated

John The Ripprer Password Cracker

0 comments
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches

Nessus Remote Security Scannaer

0 comments
The Nessus® vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.

Download eMule 0.49c Build 2/0.50a Final Download

0 comments
The first thing that we need to use the P2P method is a client that gives us an interface to connect to the network, where we can find the files that we want. From a wide variety of options, we can safely say that eMule is the most famous and used of all of them

Tuesday, April 20, 2010

Advanced Port Scanner 1.3 (free) -Small, Fast, Robust & Easy-To-use

0 comments


What is Advanced Port Scanner?

Advanced Port Scanner is a small, fast, robust and easy-to-use port scanner for Win32 platform. It uses a multithread technique, so on fast machines you can scan ports very fast. Also, it contains descriptions for common ports, and can perform scans on predefined port ranges.



Nmap-free Securitryt Scanner For Network Exploration & Securitry...

0 comments
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
  .                                                                                                                                     

Followers

 

A2HACK | ONE STOP OF HACKERS. Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com