100 likes | 206 Views
Top 1010 Hacking Tools. Knowledge!. milw0rm.org OWASP.org governmentsecurity.org packetstormsecurity.org securiteam.com -A few of these sites are considered “Archive” sites, but many of these older (exploitable) software suites are still in production environments. Reverse Engineering.
E N D
Knowledge! • milw0rm.org • OWASP.org • governmentsecurity.org • packetstormsecurity.org • securiteam.com -A few of these sites are considered “Archive” sites, but many of these older (exploitable) software suites are still in production environments
Reverse Engineering • Spices.net • Ollydbg • Trillix -Useful for decompiling entry-point software (custom secure tunnels) -Often poorly designed, leaving weaknesses easily accessible to the code-savvy
Cracking/Bruting/Dict. Attacks • Ophcrack -A livecd, based on a linux distro, which allows the system to use as much resources as possible for bruteforcing. • John the Ripper -DES, DDR1 & DDR2, Kerberos AFS, MD5, Blowfish, Windows LM • Wordlists (plain-text.info)
Fuzzing/Stressing • WSFuzzer • neuroFUZZ -Used to provide “random data” (“fuzz”) to web applications, in order to determine the handling of such information. • QEngine -Can be utilized to perform monotonous tasks at a blazing speed, often resulting in a fail-open mode
Injection • Sqlninja -Uses carefully crafted SQL injection methods to fully expose the structure and entries of a MSSQL database • SQL power injector -Automates the process of crafting sql injection queries, simplifies blind SQL injection • Learn the various languages -just enough to learn how to craft queries
Mirroring|gnirorriM • Wget • Xenu (lol) -Able to download entire structures of websites directly. -If target has not properly enabled security, server-side scripts (php) often come down as well.
Forensic Exploration • PMDump&TestDisk -Allows dumping of an active process' memory to a file without interrupting the process. • Photorec -Recovery of “lost” files, supporting almost all filesystem types, able to piece broken sectors together into known filetypes
MITM/Spoofing • dsniff • Ettercap -Easily manage MITM, allowing you to become an AP or DHCP server. • Karma -Used in “Evil Twin” MITM attacks, which allow all responses sent from external web apps to be sent you the target, as well as the “Evil Twin” (you).