1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.

2. Nessus Remote Security Scanner
Nessus is the world’s most popular vundra vulnerability scanner used
in over 75,000 organizations world-wide. Many of the world’s largest
organizations are realizing significant cost savings by using Nessus to
audit business-critical enterprise devices and applications.
3. John the Ripper
John
the Ripper is a fast password cracker, currently available for many
flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to
detect weak Unix passwords. Besides several crypt(3) password hash
types most commonly found on various Unix flavors, supported out of the
box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several
more with contributed patches.
4. Nikto

Nikto
is a good CGI scanner, there are some other tools that go well with
Nikto (focus on http fingerprinting or Google hacking/info gathering
etc, another article for just those).
5. SuperScan

If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
7. Wireshark (Formely Ethereal)

Works
great on both Linux and Windows (with a GUI), easy to use and can
reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
8. Yersinia
Yersinia
is a network tool designed to take advantage of some weakeness in
different Layer 2 protocols. It pretends to be a solid framework for
analyzing and testing the deployed networks and systems. Currently, the
following network protocols are implemented: Spanning Tree Protocol
(STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP),
Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol
(HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking
Protocol (VTP).
The best Layer 2 kit there is.
9. Eraser

An
excellent tool for keeping your data really safe, if you’ve deleted
it..make sure it’s really gone, you don’t want it hanging around to bite
you in the ass.
PuTTY
is a free implementation of Telnet and SSH for Win32 and Unix
platforms, along with an xterm terminal emulator. A must have for any
h4x0r wanting to telnet or SSH from Windows without having to use the
crappy default MS command line clients.
0 comments:
Post a Comment