Chapter 1: Footprinting
FerretSoft http://www.ferretsoft.com
traceroute ftp://ftp.ee.lbl.gov/traceroute.tar.gz
VisualRoute http://www.visualroute.com
NeoTrace http://www.neotrace.com/
snort http://www.snort.org/
Chapter 2: Scanning
Legion 2.1 from Rhino9 http://www.nmrc.org/files/snt/
SolarWinds http://www.solarwinds.net
WS_Ping ProPack http://www.ipswitch.com
NetScanTools http://www.nwpsw.com
icmpenum, from http://www.nmrc.org/files/sunix/icmpenum-1.1.1.tgz
Simple Nomad
Genius version 3.1 http://www.indiesoft.com/
Network ICE
Scanlog http://www.openwall.com/scanlogd
Ippl
1.4.10 http://pltplp.net/ippl/
udp_scan
SATAN, http://wwdsilx.wwdsi.com
now called SAINT
netcat or
nc http://www.atstake.com/research/tools/nc11nt.zip
nmap. Nmap http://www.insecure.org/nmap
NetScanTools http://www.nwpsw.com
Pro 2000
SuperScan, from http://www.foundstone.com/rdlabs/
Foundstone termsofuse.php?filename=superscan.exe
WinScan,
Prosolve http://www.prosolve.com
Windows
UDP http://ntsecurity.nu
Port Scanner
IpEye http://ntsecurity.nu
Tcp_scan http://wwdsilx.wwdsi.com/saint/
scanlogd http://www.openwall.com/scanlogd/
Psionic Logcheck http://www.psionic.com/abacus/logcheck/
ZoneAlarm http://www.zonelabs.com/
Tiny
Software http://www.tinysoftware.com
Firewall and
Security Products
Cheops http://www.marko.net/cheops/
Chapter 3: Enumeration
Resource Kit
ActiveState Perl http://www.activestate.com
distribution for Windows
DumpSec http://www.somarsoft.com
Legion
from the Rhino9 http://packetstorm.securify.com/groups/rhino9/legion.zip
group
NetBIOS Auditing Tool http://www.hackingexposed.com
getmac and
netdom ftp://ftp.microsoft.com/bussys/winnt/winnt-public/reskit/
netviewx http://www.ibt.ku.dk/jesper/NTtools/
Winfo http://www.ntsecurity.nu
IP Network Browser http://www.solarwinds.net
sid2user
and http://www.chem.msu.su:8080/~rudnyi/NT/
sid.txt
user2sid
GetAcct http://www.securityfriday.com/
Samba http://www.samba.org
Sam Spade
from http://samspade.org/ssw/
Blighty Design
Chapter 4: Hacking
Windows 95/98, ME, and Windows XP
AntiVirus eXpert http://www.centralcommand.com/
Trojan Defense http://www.multimania.com/ilikeit/tds2.htm
Suite
SSBypass http://www.amecisco.com/ssbypass.htm
Unhide http://www.webdon.com
pwltool http://www.webdon.com
Elcomsoft's Advanced Zip http://www.lostpassword.com
Password Recovery
NTInfoScan http://packetstormsecurity.org/NT/audit/
NTLast and
VisualLast http://www.foundstone.com
from Foundstone, Inc.
DumpEvt
from http://www.somarsoft.com
Somarsoft
Centrax http://www.cybersafe.com/
CyberCop
Server http://www.nai.com/
Desktop
Sentry http://www.foundstone.com
Intruder
Alert http://enterprisesecurity.symantec.com/products
Kane
Security Monitor http://www.securitydynamics.com/
RealSecure http://www.iss.net
Tripwire
for NT http://www.tripwiresecurity.com/
L0phtcrack http://www.l0pht.com
John the Ripper http://www.openwall.com/john/
Soon NTRK
tool ftp://ftp.microsoft.com/bussys/winnt/
winnt-public/reskit/
Fsniff http://www.foundstone.com
Secure
Shell http://www.ssh.com/download
Pretty Good Privacy http://www.nai.com
Service
Controller a ftp://ftp.microsoft.com/bussys/winnt/
winnt-public/reskit/
NTRK tool
NetBus http://www.netbus.org
Back
Orifice http://www.cultdeadcow.com/tools/
Back
Orifice 2000 http://sourceforge.net/projects/bo2k/
rkill.exe
NTRK ftp://ftp.microsoft.com/bussys/winnt/winnt-public/reskit/
Fport from
Foundstone http://www.foundstone.com
Windows
NT/2000 http://www.rootkit.com
acquired its own rootkit
Tripwire http://www.tripwire.com
BinText for
Windows http://www.foundstone.com
from Robin Keir
UltraEdit32
for Windows http://www.ultraedit.com
NTRK’s
auditpol ftp://ftp.microsoft.com/bussys/winnt/
winnt-public/reskit
Forensic Toolkit
Chapter 6: Hacking
Windows 2000/Windows Whistler Server
eLiTeWrap http://www.holodeck.f9.co.uk/elitewrap/
Remote from the NTRK ftp://ftp.microsoft.com/bussys/winnt/
winnt-public/reskit/
Chapter 7: Novell
NetWare Hacking
Dsmaint DS411P.EXE http://support.novell.com/servlet/filedownload/pub/ds411p.exe
Chapter 8: Hacking
Unix/Linux
nessus http://www.nessus.org
TeeNet http://www.phenoelit.de/tn/
One Time
Passwords ftp://ftp.gbnet.net/pub/security/nrl-opie/
In Everything
Secure
Remote Password http://www-cs-students.stanford.edu/~tjw/srp/
Open SSH http://www.openssh.org/
Hellkit and other shellcode http://teso.scene.at/releases.php3
creation tools
StackGuard from Immunix http://immunix.org
TCP
Wrappers and xinetd http://www.synack.net/xinetd/
Saint Jude http://prdownloads.sourceforge.net/stjude/
Smap and
smapd http://www.tis.com/research/software/
Qmail http://www.qmail.org
Postifx http://www.postfix.com/
Bastille http://www.bastille-linux.org/
arpredirect on twister, part http://www.monkey.org/~dugsong/dsniff/
of the dsniff package
Secure Shell http://www.ssh.com/download/
Secure
syslog from http://www.core-sdi.com/english/freesoft.html
Core Labs
Solaris Loadable http://packetstormsecurity.org/groups/thc/slkm-1.0.html
Kernel Modules
Chapter 9: Dial-up,
PBX, Voicemail, and VPN
THC-Scan http://www.infowar.co.uk/thc/
PhoneSweep http://www.sandstorm.net
Sandstorm Enterprise
Telesweep http://www.securelogix.com
Chapter 10: Network
Devices
Hobbit http://www.avian.org
Palm Pilot by the http://www.l0pht.com~kingpin/cisco.zip
L0pht's Dr. Mudge
Cisco decryptor http://www.solarwinds.net
linsniff http://www.rootshell.com/
solsniff http://www.rootshell.com/
snmpsniff
from Nuno Leitao http://nuno.leitao@convex.pt
Snort http://www.snort.org
Ethereal http://www.ethereal.com/
Chapter 11: Firewalls
BindView EMS/NOSadmin http://www.bindview.com
4.x & 5.x v6
Hidden Object Locator http://www.netwarefiles.com/utils/hobjloc.zip
port scan detection http://www.enteract.com/~lspitz/intrusion.html
(paper on the tool)
(paper on the tool)
Wietse Venema’s TCP ftp://coast.cs.purdue.edu/pub/tools/unix/netutils/tcp_wrappers
Wrappers program
Chapter 12: Denial of
Service (DoS) Attacks
DDOSPing http://www.foundstone.com
Zombie Zapper http://razor.bindview.com
find_ddos http://www.nipc.gov
WinTrinoo by the Bindview http://razor.bindview.com
Razor team
Chapter 13: Remote
Control Insecurities
SnadBoy http://www.snadboy.com
SnifferPro http://www.nai.com
Virtual
Network Computing http://www.uk.research.att.com/vnc
TSProbe http://www.hammerofgod.com
TSProbe.exe http://www.hammerofgod.com
TSEnum.exe http://www.hammerofgod.com
Chapter 14: Advanced
Techniques
Juggernaut http://www.packetfactory.net/
remote.exe
NT Resource Kit ftp://ftp.microsoft.com/bussys/winnt/ winnt-public/reskit/
BackOfficer Friendly http://www.nfr.net/products/bof/
The Cleaner http://www.moosoft.com/cleaner.html
DumpEvt) http://www.somarsoft.com
Image MASSter http://www.ics-iq.com
OmniClone line http://www.logicube.com
Drive Image http://www.powerquest.com
FlashClone http://www.ics-iq.com
ImageCast http://www.innovativesoftware.com
Norton Ghost http://www.symantec.com
RapiDeploy http://www.altiris.com
VMWare http://www.vmware.com
SecondChance http://www.powerquest.com
Chapter 15: Web Hacking
Teleport Pro for NT http://www.tenmax.com
whisker by http://www.wiretrip.net/rfp/
Rain.forest.puppy
hk.exe from Todd Sabin http://www.nmrc.org
iishack http://www.technotronic.com
SSLProxy http://www.kuix.de/sslproxy/
SSLdump http://www.rtfm.com/ssldump/
Chapter 16: Hacking the
Internet User
SpyNet/PeepNet http://www.packetstormsecurity.com/
Cookie Pal from http://www.kburra.com/cpal.html
Kookaburra Software
passdump by janker http://www.hackersclub.com/km/files/hfiles/
Wrapster, by Octavian http://download.cnet.com
Finjan's SurfinGate http://www.finjan.com
technology
No comments:
Post a Comment