350 likes | 719 Views
Partial List of Tools. CD/USB Security (UBCD4Win, BackTrack, Hacksaw, U3 Security tools)What is on your network (Dude, Cain, SuperScanner, Getif) Discover Bandwidth hogs (Wireshark, Dude, Qcheck)Find current security issues (Nessus, MBSA, Cain Metasploit, BackTrack)Password Recovery (Cain, UBCD
E N D
1. Budget Crunch? Free Tools for Securing and Improving Your Network Ernest Staats erstaats@gcasda.org MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-Net+, Network+, Server+, A+
Resources available @ http://www.es-es.net
2. Partial List of Tools CD/USB Security (UBCD4Win, BackTrack, Hacksaw, U3 Security tools)
What is on your network (Dude, Cain, SuperScanner, Getif)
Discover Bandwidth hogs (Wireshark, Dude, Qcheck)
Find current security issues (Nessus, MBSA, Cain Metasploit, BackTrack)
Password Recovery (Cain, UBCD4Win, BackTrack, John the Ripper)
Application and Data Base Tools (SQL recon, Metasploit , HPing2, N-Stealth, N-Stealth, Absinthe)
Encryption Software (True Crypt, Dekart, Windows)
Tools that link to online resources so you can secure your network
Tools that are fun (as time permits)
Tools that link to online resources so you can secure your network
Tools that are fun (as time permits)
3. There is no one Swiss Army knife when it comes to security:
Determine your needs
Restoring Deleted files
File Shredding
Network analysis
Encryption
Filtering
Find the right tools
Use the correct tool for the job
4. Open DNS--
Another layer to block proxies and adult sites; http://www.opendns.com/
Ccleaner
Removes unused files and other software that slows down your PC; http://www.ccleaner.com/
PC Decrapifier
The PC Decrapifier will uninstall many of the common trial ware and annoyances found on new PCs. Free for personal use and 20$ per tech who will use it; http://tinyurl.com/28r8ko
File Shredder
A fast, safe and reliable tool to shred company files; http://www.fileshredder.org/
The Dude
Auto network discovery, link monitoring, and notifications supports SNMP, ICMP, DNS and TCP monitoring; http://tinyurl.com/mulky
WinAudit
Audits Windows® based computers. Just about every aspect of computer inventory is examined. Also can automate inventory administration at the network level; http://tinyurl.com/27pk6t
Soft Perfect Network Scanner
A multi-threaded IP, SNMP and NetBIOS scanner. Very easy to use; http://tinyurl.com/2kzpss
SyncBack
File Backup software; http://tinyurl.com/fmtel Open DNS
Ccleaner It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. http://www.ccleaner.com/
PC Decrapifier The PC Decrapifier will uninstall many of the common trialware and annoyances found on many of the PCs from big name OEMs free for personal use 20$ per tech who will use it http://pcdecrapifier.com/features
File Shredder File Shredder has been developed as fast, safe and reliable tool to shred company files. http://www.fileshredder.org/
The Dude The Dude is auto network discovery and layout discovers any type or brand of device, device, Link monitoring, and notifications supports SNMP, ICMP, DNS and TCP monitoring for devices that support it http://www.mikrotik.com/thedude.php
WinAudit is a software program that audits Windows® based personal computers. Just about every aspect of computer inventory is examined. You can e-mail it to your technical support or even post the audit to a database for archiving. When used in conjunction with its command line functionality, you can automate inventory administration at the network level http://www.pxserver.com/WinAudit.htm
SoftPerfect™ Network Scanner A multi-threaded IP, SNMP and NetBIOS scanner. The program pings computers, scans for listening TCP ports and displays which types of resources are shared on the network (including system and hidden). In addition, it allows you to mount shared resources as network drives, browse them using Windows Explorer, filter the results list and more
Open DNS
Ccleaner It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. http://www.ccleaner.com/
PC Decrapifier The PC Decrapifier will uninstall many of the common trialware and annoyances found on many of the PCs from big name OEMs free for personal use 20$ per tech who will use it http://pcdecrapifier.com/features
File Shredder File Shredder has been developed as fast, safe and reliable tool to shred company files. http://www.fileshredder.org/
The Dude The Dude is auto network discovery and layout discovers any type or brand of device, device, Link monitoring, and notifications supports SNMP, ICMP, DNS and TCP monitoring for devices that support it http://www.mikrotik.com/thedude.php
WinAudit is a software program that audits Windows® based personal computers. Just about every aspect of computer inventory is examined. You can e-mail it to your technical support or even post the audit to a database for archiving. When used in conjunction with its command line functionality, you can automate inventory administration at the network level http://www.pxserver.com/WinAudit.htm
SoftPerfect™ Network Scanner A multi-threaded IP, SNMP and NetBIOS scanner. The program pings computers, scans for listening TCP ports and displays which types of resources are shared on the network (including system and hidden). In addition, it allows you to mount shared resources as network drives, browse them using Windows Explorer, filter the results list and more
5. Dude Screen Shot
6. Aidia 32
System information, diagnostics and benchmarking for Win32 platforms. Screen shots, remote control, AIDA32 will extract details of all components of the PC. You can display information print it or save it to a .. XML, HTML or CSV.
http://tinyurl.com/2j9ro8
SuperScan 4
Network Scanner finds open ports (I prefer version 3) http://tinyurl.com/2z42uy
Nmap
Scanning and Foot printing http://tinyurl.com/3dfk7v
Cain and Abel
the “Swiss Army knife” Cracks passwords, VOIP, and so much more
http://tinyurl.com/53vmz
Wire Shark
http://tinyurl.com/yclvno
Autoruns
shows the programs that run during system boot up or login
http://tinyurl.com/3adktf
Iron Geek
Step by step security training http://tinyurl.com/bzvwx
Three finger salute (CTR+ALT+DEL)
Default Password List
http://tinyurl.com/39teob
Nessus
Great system wide vulnerability scanner http://tinyurl.com/3ydrfu
The Google Hacking Database (GHDB)
http://tinyurl.com/2mxe2h
7.
Phishing Protection
We operate PhishTank.com, the world's most trusted source of phishing data. We integrate that data into an intelligence feed on our DNS servers to keep everyone on your network safe from phony sites trying to steal personal information.
Domain Blocking
You want to secure your network and have control over what resolves. We give you that control by providing the tools to block any website or DNS zone on the Internet, all through an easy-to-use interface.
Adult Site Blocking
Safeguard your kids, protect your students, or limit your corporate liability by blocking adult websites. Our adult site blocking solution can be deployed in minutes and provides granular levels of blocking. Did we mention it's completely free?
Web Proxy Blocking
Prevent people on your network from bypassing the access restrictions you put in place. Blocking Web proxies helps ensure your network remains secure.
8. Cain and Abel
It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
Cain and Abel
It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
10. Wireshark
Packet sniffer used to find passwords and other important network errors going across network
SSL Passwords are often sent in clear text before logging on
http://tinyurl.com/yclvno
Metasploit
Hacking/networking security made easy
http://www.metasploit.com/
BackTrack or UBCD4WIN Boot CD
Cleaning infected PC’s or ultimate hacking environment. Will run from USB
http://tinyurl.com/2y2jdj
http://tinyurl.com/38cgd5
Read notify
“Registered” email
http://www.readnotify.com/
Virtual Machine
For pen testing
http://tinyurl.com/2qhs2e http://www.virtualiron.com/
11. Wireshark Screen Shot
12. Bart PE or UBCD4WIN
http://www.bartpe.com
http://www.ubcd4win.com
UBCD
hardware testing including BIOS; HD cloning, recovery, destruction tools, ram testing, and so much more
http://www.ultimatebootcd.com/download.html
Back Track
one of the more powerful cracking network auditing packages
http://www.remoteexploit.org
KNOPPIX
recover/repair dead systems and several security tools
http://www.knoppix.net/ What is AUSTRUMI?
AUSTRUMI is a business card size (50MB) bootable Live CD Linux distribution. Imagine the ability to boot your favorite Linux distribution whether you are at home, at school or at work..
X-window
enlightenment - windows manager
Graphic
gimageview - image browser
gimp - Image Manipulation Program
inkscape - SVG editor
Office
gcalctool - graphical calculator
abiword - word processor
gnumeric - spreadsheet editor
stardict - dictionary
bluefish - html editor
gv - a PostScript and PDF previewer
Network
nmap - network scaner
ettercap - sniffer/interceptor/logger for LAN
vqcc-gtk - quickChat/Vypress Chat
ant - sending tool of TCP/IP packets
hydra - login cracker
LinNeighborhood - samba client
tsclient - frontend for rdesktop and vncviewer
telnet - telnet client
gputty - ssh client
mtr - traceroute
Internet
firefox - WWW browser
uebimiau - web mail
linuxdcpp - P2P DC client
xchat - IRC client
linphone - IP telefonija
gitmail - mail client
apache - web server
vsftpd - ftp server
xmail - mail server
Multimedia
mplayer - movie player
simplecdrx - CD creation and audio manipulation program
sweep - audio editor and live playback toolsweep
Games
ltris - classic 'Tetris' clone
atomix - logical game
xboard:phalanx - chess
gnomine - variation of minesweeper
gtkballs - clone of well-known DOS game "Lines"
icebreaker - clasic 'Xonix' clone
Other
emelfm2 - file manager
rxvt - color VT102 terminal emulator
htop - task manager
mc - The Midnight Commander
qemu - processor emulator
xproc - system information
partimage - partition imaging utility
voarti - firewall/router
gtkfind - graphical file finding program
turma - search (and replace) text
xfdiff4 - graphical diff frontend
hexedit - shows/modify a file both in ASCII and in hexadecimal
Trinity Rescue Kit, designed to recover/repair dead Windows systems (also Linux).
http://trinityhome.org/Home/index.php?wpid=28&front_id=12
Trinity Rescue Kit 3.1 or TRK 3.1 is a 100% free CD bootable Linux distribution (live cd) aimed specifically at offline operations for Windows and Linux systems such as rescue, repair, password resets and cloning, with the ability to update itself . It has custom tools to easily recover data such as deleted files, clone Windows installations over the network, perform antivirus sweeps with 2 different antivirus products, reset windows passwords, read AND write on NTFS partitions, edit partition layout and much much more.Trinity Rescue Kit 3.1 is the evolved version of 3.0 and a complete rewrite of version 1.1 and the unfinished 2.0. It ‘s mostly based on Mandrake 10.2 (Mandriva 2005) binaries and heavily adapted startup scripts.Although it requires a bit more startup time than version 1.1, it still is a fast booter(39 seconds compared to 31 in TRK 1.1 on a Compaq Evo D51s, 2.4Ghz) , recognizing even more hardware than ever.It now also has a feature for automatic proxy detection and custom startup environment adaptations. An administrator can configure his LAN (using DHCP and a webserver) so TRK3 can taken advantage of that, making it even more powerful.Apart from that, you can have any computer run a specific script from a local folder (f.i. to run maintenance and backups in batch)Where Trinity Rescue Kit 1.1 is looking at around 120.000 downloads so far (and who knows how many CDRs got burned), TRK 3.1 claims to be the most complete, fast to use toolkit when it comes to performing offline rescueing on both Windows and Linux.
KNOPPIX is a bootable Live system on CD or DVD, consisting of a representative collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a productive Linux system for the desktop, educational CD, rescue system, or adapted and used as a platform for commercial software product demos. It is not necessary to install anything on a hard disk. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it (over 8GB on the DVD "Maxi" edition).
Linux-Kernel 2.4.x and 2.6.x
KDE as the standard desktop with K Office and the Konqueror WWW-browser konqueror
X Multimedia System (xmms) an MPEG-video, MP3, Ogg Vorbis Audio player and xine
Internet connection software kppp,pppoeconf (DSL) and isdn-config
Gnu Image Manipulation Program (GIMP)
utilities for data recovery and system repairs, even for other operating systems
network and security analysis tools for network administrators
OpenOffice(TM), the GPL-developed version of the well-known StarOffice(TM) office suite
many programming languages, development tools (including kdevelop) and libraries for developers
in total more than 900 installed software packages with over 2000 executable user programs, utilities, and games
What is AUSTRUMI?
AUSTRUMI is a business card size (50MB) bootable Live CD Linux distribution. Imagine the ability to boot your favorite Linux distribution whether you are at home, at school or at work..
X-window
enlightenment - windows manager
Graphic
gimageview - image browser
gimp - Image Manipulation Program
inkscape - SVG editor
Office
gcalctool - graphical calculator
abiword - word processor
gnumeric - spreadsheet editor
stardict - dictionary
bluefish - html editor
gv - a PostScript and PDF previewer
Network
nmap - network scaner
ettercap - sniffer/interceptor/logger for LAN
vqcc-gtk - quickChat/Vypress Chat
ant - sending tool of TCP/IP packets
hydra - login cracker
LinNeighborhood - samba client
tsclient - frontend for rdesktop and vncviewer
telnet - telnet client
gputty - ssh client
mtr - traceroute
Internet
firefox - WWW browser
uebimiau - web mail
linuxdcpp - P2P DC client
xchat - IRC client
linphone - IP telefonija
gitmail - mail client
apache - web server
vsftpd - ftp server
xmail - mail server
Multimedia
mplayer - movie player
simplecdrx - CD creation and audio manipulation program
sweep - audio editor and live playback toolsweep
Games
ltris - classic 'Tetris' clone
atomix - logical game
xboard:phalanx - chess
gnomine - variation of minesweeper
gtkballs - clone of well-known DOS game "Lines"
icebreaker - clasic 'Xonix' clone
Other
emelfm2 - file manager
rxvt - color VT102 terminal emulator
htop - task manager
mc - The Midnight Commander
qemu - processor emulator
xproc - system information
partimage - partition imaging utility
voarti - firewall/router
gtkfind - graphical file finding program
turma - search (and replace) text
xfdiff4 - graphical diff frontend
hexedit - shows/modify a file both in ASCII and in hexadecimal
Trinity Rescue Kit, designed to recover/repair dead Windows systems (also Linux).
http://trinityhome.org/Home/index.php?wpid=28&front_id=12
Trinity Rescue Kit 3.1 or TRK 3.1 is a 100% free CD bootable Linux distribution (live cd) aimed specifically at offline operations for Windows and Linux systems such as rescue, repair, password resets and cloning, with the ability to update itself . It has custom tools to easily recover data such as deleted files, clone Windows installations over the network, perform antivirus sweeps with 2 different antivirus products, reset windows passwords, read AND write on NTFS partitions, edit partition layout and much much more.Trinity Rescue Kit 3.1 is the evolved version of 3.0 and a complete rewrite of version 1.1 and the unfinished 2.0. It ‘s mostly based on Mandrake 10.2 (Mandriva 2005) binaries and heavily adapted startup scripts.Although it requires a bit more startup time than version 1.1, it still is a fast booter(39 seconds compared to 31 in TRK 1.1 on a Compaq Evo D51s, 2.4Ghz) , recognizing even more hardware than ever.It now also has a feature for automatic proxy detection and custom startup environment adaptations. An administrator can configure his LAN (using DHCP and a webserver) so TRK3 can taken advantage of that, making it even more powerful.Apart from that, you can have any computer run a specific script from a local folder (f.i. to run maintenance and backups in batch)Where Trinity Rescue Kit 1.1 is looking at around 120.000 downloads so far (and who knows how many CDRs got burned), TRK 3.1 claims to be the most complete, fast to use toolkit when it comes to performing offline rescueing on both Windows and Linux.
KNOPPIX is a bootable Live system on CD or DVD, consisting of a representative collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a productive Linux system for the desktop, educational CD, rescue system, or adapted and used as a platform for commercial software product demos. It is not necessary to install anything on a hard disk. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it (over 8GB on the DVD "Maxi" edition).
Linux-Kernel 2.4.x and 2.6.x
KDE as the standard desktop with K Office and the Konqueror WWW-browser konqueror
X Multimedia System (xmms) an MPEG-video, MP3, Ogg Vorbis Audio player and xine
Internet connection software kppp,pppoeconf (DSL) and isdn-config
Gnu Image Manipulation Program (GIMP)
utilities for data recovery and system repairs, even for other operating systems
network and security analysis tools for network administrators
OpenOffice(TM), the GPL-developed version of the well-known StarOffice(TM) office suite
many programming languages, development tools (including kdevelop) and libraries for developers
in total more than 900 installed software packages with over 2000 executable user programs, utilities, and games
15. DNS-stuff and DNS-reports
http://www.dnsstuff.com
http://www.dnsreports.com
Are you blacklisted?
Test your e-mail system
Check your HTML code for errors
WINHTTrack
For offline testing
http://tinyurl.com/2qukbx
Open DNS
http://www.opendns.com/
Firewall checkers
www.firewallcheck.com
Security Space
http://tinyurl.com/cbsr
16. Nessus
Vulnerability scanners
http://www.nessus.org
Snort
IDS - intrusion detection system
http://www.snort.org
Metasploit Framework
Vulnerability exploitation tools
Use with great caution and have permission
http://tinyurl.com/3d57vu
MBSA Microsoft Baseline Security Analyzer (MBSA)
Used to determine their security state and specific remediation guidance
http://tinyurl.com/39vfhe Metasploit www.metasploit.org A great tool to exploit those Windows-based vulnerabilities that other tools findMetasploit www.metasploit.org A great tool to exploit those Windows-based vulnerabilities that other tools find
17. Fgdump
Mass password auditing for Windows
http://tinyurl.com/2c7hf4
Cain and Abel
Password cracker and so much more….
http://tinyurl.com/dlvva
John The Ripper
Password crackers
http://tinyurl.com/26kt7p
RainbowCrack
An Innovative Password Hash Cracker tool that makes use of a large-scale time-memory trade-off.
http://tinyurl.com/ysfgtx Cain and Abel
It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
RainbowCrack : An Innovative Password Hash CrackerThe RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finishedCain and Abel
It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
RainbowCrack : An Innovative Password Hash CrackerThe RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished
18. Windows Password recovery - Can retrieve forgotten admin and users' passwords in minutes. Safest possible option, does not write anything to hard drive.
Offline NT Password & Registry Editor - A great boot CD/Floppy that can reset the local administrator's password.
John the Ripper - Good boot floppy with cracking capabilities.
Emergency Boot CD - Bootable CD, intended for system recovery in the case of software or hardware faults.
Austrumi - Bootable CD for recovering passwords and other cool tools.
NetBIOS Auditing Tool (NAT) www.cotse.com/tools/netbios.htm Neat tool for cracking passwords on Windows network shares
NetBIOS Auditing Tool (NAT) www.cotse.com/tools/netbios.htm Neat tool for cracking passwords on Windows network shares
19. MS Baseline Analyzer
http://tinyurl.com/27obrz
The Dude
Great for mapping and analyzing traffic
http://tinyurl.com/2kzejg
Getif
Network SNMP discovery and exploit tool
http://tinyurl.com/23uhdo ]
SoftPerfect Network Scanner
http://www.softperfect.com/
Enumerate Windows Shares
Start – Run - \\IP\C$ Login is administrator Password Start – Run \\(server name or IP)
Enumerate Windows Directory
LDAP query – Dump Accounts and Groups on a 2000/2003 Server Tool is on the Windows 2000/2003 Server CD (LDP.EXE)
Enumerate Windows Shares
Start – Run - \\IP\C$
Login is administrator
Password
Start – Run \\(server name or IP)
Enumerate Windows Directory
LDAP query – Dump Accounts and Groups on a 2000/2003 Server
Tool is on the Windows 2000/2003 Server CD (LDP.EXE)
The Dude
http://www.mikrotik.com/thedude.php
The Dude is a visual and easy to use network monitoring and management system designed to represent network structure in one or more crosslinked graphical diagrams, allowing you to draw (includes automatic network discovery tool) and monitor your network however complicated it might be. The Dude is capable of monitoring particular services run on the network hosts, and alerting you about any changes in their status. It can read statistics from the device monitored and show you graphs of the monitored values, allows you to test and connect to the devices easily, and provides some very basic RouterOS configuration tools
Getif is an excellent SNMP tool that allows you to collect and graph information from SNMP devices.
Enumerate Windows Shares
Start – Run - \\IP\C$
Login is administrator
Password
Start – Run \\(server name or IP)
Enumerate Windows Directory
LDAP query – Dump Accounts and Groups on a 2000/2003 Server
Tool is on the Windows 2000/2003 Server CD (LDP.EXE)
The Dude
http://www.mikrotik.com/thedude.php
The Dude is a visual and easy to use network monitoring and management system designed to represent network structure in one or more crosslinked graphical diagrams, allowing you to draw (includes automatic network discovery tool) and monitor your network however complicated it might be. The Dude is capable of monitoring particular services run on the network hosts, and alerting you about any changes in their status. It can read statistics from the device monitored and show you graphs of the monitored values, allows you to test and connect to the devices easily, and provides some very basic RouterOS configuration tools
Getif is an excellent SNMP tool that allows you to collect and graph information from SNMP devices.
20. HPing2
Packet assembler/analyzer
http://www.hping.org
Netcat
TCP/IP Swiss Army Knife
http://tinyurl.com/2r4fx9
TCPDump for Linux or Windump for Windows
packet sniffers
http://www.tcpdump.org and http://tinyurl.com/2gkvqq
LanSpy
local, Domain, NetBios, Global and local users, policy settings and much more
http://www.lantricks.com/
Qcheck
Checks network response time, throughput, and streaming performance
http://tinyurl.com/3csl3l
SoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP scanner with a modern interface and several advanced features. It is intended for both system administrators and users who are interested in computer security. The program pings computers, scans for listening TCP ports and shows what types of resources are shared on the network (including system and hidden).
Hping2 : A network probing utility like ping on steroidsThis handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies
LanSpy —Network security scanner, which gets: Domain and NetBios names, MAC address, Server information, Domain and Domain controller information, Remote control, Time, Discs, Transports, Users, Global and local users groups, Policy settings, Shared resources, Sessions, Open files, Services, Registry and Event log information.
SoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP scanner with a modern interface and several advanced features. It is intended for both system administrators and users who are interested in computer security. The program pings computers, scans for listening TCP ports and shows what types of resources are shared on the network (including system and hidden).
Hping2 : A network probing utility like ping on steroidsThis handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies
LanSpy —Network security scanner, which gets: Domain and NetBios names, MAC address, Server information, Domain and Domain controller information, Remote control, Time, Discs, Transports, Users, Global and local users groups, Policy settings, Shared resources, Sessions, Open files, Services, Registry and Event log information.
21. Zero Assumption
Digital Image rescue
http:// http://tinyurl.com/372643
Restoration File Recovery
http://tinyurl.com/2ymm46
Free Undelete
http://tinyurl.com/2tp2zd
Effective File Search
Find data inside of files or data bases
http://tinyurl.com/ynojg6 Zero Assumption Digital Image Recovery
ZA Digital Image Recovery recovers Canon .CR2 files as TIFF. To open recovered files, Jeff used Photoshop CS "Open With" feature, which allows to specify image format override.
http://www.z-a-recovery.com/digital-image-recovery.htm
http://www.z-a-recovery.com/digital-image-recovery.htm
Restoration
Restoration is an easy to use and straight forward tool to undelete files that were removed from the recycle bin or directly deleted from within Windows, and we were also able to recover photos from a Flash card that had been formatted. Upon start, you can scan for all files that may be recovered and also limit the results by entering a search term or extension. In addition
http://www.snapfiles.com/get/restoration.html
Free undelete
http://www.pc-facile.com/download/recupero_eliminazione_dati/drive_rescue/
Effective File SearchEffective File Search (EFS) is a powerful but easy to use search tool. Search any files on your computer or local network with this effective software. EFS is a real replacement for the Windows Search utility. You can save a lot of time with this excellent file search tool.
Great text searching tool for finding files on local drives and server shares -- simply search for text such as "password", "SSN", etc. to find sensitive information that's not properly secured Zero Assumption Digital Image Recovery
ZA Digital Image Recovery recovers Canon .CR2 files as TIFF. To open recovered files, Jeff used Photoshop CS "Open With" feature, which allows to specify image format override.
http://www.z-a-recovery.com/digital-image-recovery.htm
http://www.z-a-recovery.com/digital-image-recovery.htm
Restoration
Restoration is an easy to use and straight forward tool to undelete files that were removed from the recycle bin or directly deleted from within Windows, and we were also able to recover photos from a Flash card that had been formatted. Upon start, you can scan for all files that may be recovered and also limit the results by entering a search term or extension. In addition
http://www.snapfiles.com/get/restoration.html
Free undelete
http://www.pc-facile.com/download/recupero_eliminazione_dati/drive_rescue/
Effective File SearchEffective File Search (EFS) is a powerful but easy to use search tool. Search any files on your computer or local network with this effective software. EFS is a real replacement for the Windows Search utility. You can save a lot of time with this excellent file search tool.
Great text searching tool for finding files on local drives and server shares -- simply search for text such as "password", "SSN", etc. to find sensitive information that's not properly secured
22. Windows and Office Key finder/Encrypting
Win KeyFinder (also encrypts the keys)
http://www.winkeyfinder.tk/
ProduKey (also finds SQL server key)
http://www.nirsoft.net
Secure Delete software
Secure Delete
http://tinyurl.com/27p8uh
File Shredder
has been developed as a fast, safe and reliable tool to shred company files
http://www.fileshredder.org/
DUMPSEC
Dump all of the registry and share permissions
http://www.somarsoft.com/
Win Finger Print
Scans for Windows shares, enumerates usernames, groups, sids and much more
http://tinyurl.com/2jeyto Winfingerprin thttp://winfingerprint.sourceforge.net Windows enumeration tool that can ferret out patch levels, NetBIOS information, user information, and more
Winfingerprin thttp://winfingerprint.sourceforge.net Windows enumeration tool that can ferret out patch levels, NetBIOS information, user information, and more
23. N-Stealth
An effective HTTP/Web application Security Scanner
http://tinyurl.com/32owl7
WINHTTrack
Website copier
http://tinyurl.com/ypmdq2
SQLRecon
Performs both active and passive scans of your network in order to identify all of the SQL Server/MSDE installations
http://tinyurl.com/3bgj44
More SQL Tools http://tinyurl.com/3bgj44
Absinthe
Tool that automates the process of downloading the schema & contents of a database that is vulnerable to Blind SQL Injection
http://tinyurl.com/34catv
WebInspect- SpyDynamics
15 day trial against your web/application servers
http://tinyurl.com/359dsv SQLRecon performs both active and passive scans of your network in order to identify all of the SQL Server/MSDE installations in your enterprise.
Due to the proliferation of personal firewalls, inconsistent network library configurations, and multiple-instance support, SQL Server installations are becoming increasingly difficult to discover, assess, and maintain. SQLRecon is designed to remedy this problem by combining all known means of SQL Server/MSDE discovery into a single tool which can be used to ferret-out servers you never knew existed on your network so you can properly secure them.
FEATURES
* Multi-threaded scanning engine * 6 Active scanning techniques * 2 Stealth scanning techniques * IP Range scanning * IP List scanning * Export results as XML or text file * Export IP list for use in future scans (i.e. Passive to Active) * ICMP check to increase scan speed * Debug mode to allow for greater scan visibility * Allows alternate credentials * Custom source port for UDP packets for firewall evasion SQLRecon performs both active and passive scans of your network in order to identify all of the SQL Server/MSDE installations in your enterprise.
Due to the proliferation of personal firewalls, inconsistent network library configurations, and multiple-instance support, SQL Server installations are becoming increasingly difficult to discover, assess, and maintain. SQLRecon is designed to remedy this problem by combining all known means of SQL Server/MSDE discovery into a single tool which can be used to ferret-out servers you never knew existed on your network so you can properly secure them.
FEATURES
* Multi-threaded scanning engine * 6 Active scanning techniques * 2 Stealth scanning techniques * IP Range scanning * IP List scanning * Export results as XML or text file * Export IP list for use in future scans (i.e. Passive to Active) * ICMP check to increase scan speed * Debug mode to allow for greater scan visibility * Allows alternate credentials * Custom source port for UDP packets for firewall evasion
24. Hard drive or Jump Drives
True Crypt for cross platform encryption with lots of options
http://tinyurl.com/2ovdtm
Dekart its free version is very simple to use paid version has more options
http://tinyurl.com/2z6uv2
http://www.dekart.com/
Email or messaging
PGP for encrypting email
http://tinyurl.com/2w4g9q
25. Aircrack
The fastest available WEP/WPA cracking tool
A suite of tools for 802.11a/b/g WEP and WPA cracking
Can recover a 40 through 512-bit WEP or WPA 1 or 2
The suite includes
airodump (an 802.11 packet capture program)
aireplay (an 802.11 packet injection program)
aircrack (static WEP and WPA-PSK cracking)
airdecap (decrypts WEP/WPA capture files)
http://tinyurl.com/2xzyu6
Net Stumbler
Finds wireless networks
http://wwww.netstumbler.com
Kismet
Wireless tools or packet sniffers
http://wwww.kismetwireless.net
Qcheck
Determine real application speeds in WIFI networks
http://tinyurl.com/3csl3l
The fastest available WEP/WPA cracking toolAircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap
(decrypts WEP/WPA capture files).
The fastest available WEP/WPA cracking toolAircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap
(decrypts WEP/WPA capture files).
The fastest available WEP/WPA cracking toolAircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap
(decrypts WEP/WPA capture filesThe fastest available WEP/WPA cracking toolAircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap
(decrypts WEP/WPA capture files).
The fastest available WEP/WPA cracking toolAircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap
(decrypts WEP/WPA capture files).
The fastest available WEP/WPA cracking toolAircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap
(decrypts WEP/WPA capture files
26. Xen for Linux
http://tinyurl.com/2pbmp4
VM server or VM workstation
for booting Part Pe ISO’s or Remote Exploit
http://tinyurl.com/7gqmw
MS Virtual Server
slower but very easy to use
http://tinyurl.com/33mhln
MS Virtual PC
http://tinyurl.com/2jr7a7
Virtual Iron
http://virtualiron.com
VM’s can be used to run auditing applications that typically would require a dedicated server
27. Analyzers
Network monitors
Traffic Generators
Network Scanners
IDS
Network Utilities
Network Clients
Secure Clients
SNMP
Web
Auditing Tools
Password revealers
System Tools
Supplementary tools (Dos prompt, Unix shell, etc..)
http://tinyurl.com/yttny6
28. Access all stored passwords on a windows computer
[System info] [Dump SAM] [Dump Product Keys] [Dump LSA secrets (IE PWs)] [Dump Network PW] [Dump messenger PW] [Dump URL History]
Available at http://tinyurl.com/2kwqgp
Plug U3 Drive in any windows XP/2000/2003 computer
Wait about 1 minute
Eject Drive
Go to run on the start menu, then type x:\Documents\logfiles (x = flash drive letter) then press enter
Look at username and passwords or start cracking hashed windows passwords
29. The Sleuth Kit and Autopsy Browser
Open source digital investigation tools (digital forensic tools)
http://www.sleuthkit.org/
Boot CD
UBCD4WIN
http://www.ubcd4win.com
BACKTRACK
http://www.remote-exploit.org/
Disclaimer
Be very careful when it comes to doing any forensic work as you can end up in Jail
30. SyncBack
http://tinyurl.com/29elte Secure
Encrypt a zip file with a 256-bit AES encryption
Copy Open Files (XP/2003)
Compression
You can compress an unlimited size, and an unlimited number of files. (Paid)
Performance & Throttling
limit bandwidth usage, (Paid)
FTP and Email
Backup or sync files with an FTP server. Auto email the results of your backup
Overview PPT on my web site
http://www.es-es.net/
31. WinSCP
wraps a friendly GUI interface around the command-line switches needed to copy files between Windows and Unix/Linux
http://tinyurl.com/yvywqu
Nagios
Highly configurable, flexible network resource monitoring tool.
http://www.nagios.org/
EventSentry
Allows you to consolidate and monitor event logs in real-time, as well as monitor performance, disk space, services, processes and software/hardware installations on servers and workstations.
Additional features include temperature & humidity monitoring, motion/smoke/water detection, process, logon and print tracking for audit purposes
http://tinyurl.com/2g64sy
WSUS
Administrators can fully manage the distribution of updates that are released through Microsoft Update to computers in their network.
http://tinyurl.com/22anrz
32. Network Tools Misc. SyncToy
Used for copying, moving, and synchronizing different directories http://tinyurl.com/3b3wrd
PsTools
manage remote systems as well as the local one http://tinyurl.com/2xq8nu
FoundStone
Hack Pack: a collection of several hacking/security tools http://tinyurl.com/22bap7
22 Essential Mac utilities
http://tinyurl.com/2er2je
33. Resources are available at
Files and suggestions
http://www.es-es.net/9.html
Security and Information Assurance Links
http://www.es-es.net/6.html
PPT for this and VM Security
http://www.es-es.net/3.html
Best Step by Step Security Videos Free
http://www.irongeek.com
Build a slipstream Windows install CD at http://tinyurl.com/4n7y5
34. YouSendit
Send large files for free up to 100mb
www.yousendit.com
Odeo
Setup your own free podcast
www.odeo.com
Tiny URL
Make long URL’s short and easy to remember
http://tinyurl.com/
35. Qcheck, the network troubleshooting utility from Ixia, slices, dices, and checks network response time, throughput, and streaming performance. It even runs anywhere-to-anywhere traceroute!
Qcheck provides a more realistic assessment of network performance. While Ping tracks the response time of ICMP (Internet Control Message Protocol) messages, Qcheck sends real application flows across the network to test connectivity and performance. When Qcheck tests network response time, it determines how well real client/server applications will perform on the network. In addition, Qcheck tests network throughput, which is a more appropriate measurement than response time for determining how well an FTP or similar application will perform.
Qcheck tests can determine whether a network can support multimedia traffic. Qcheck can test a network link using the application flows generated by streaming multimedia applications. Qcheck will determine at what rate streaming traffic is received and how much packet loss is occurring.
Qcheck can test network performance between any two computers in your network once they have Performance Endpoints installed. With Ping, a user is limited to testing the network connectivity between his or her own computer and another computer. A Qcheck user can test network performance between any two workstations on his or her network, regardless of their location, once a Performance Endpoint is installed.
Qcheck supports multiple protocols. Unlike Ping, Qcheck supports the variety of protocols that are present in most network environments. Qcheck can test the performance of TCP, UDP, SPX, and IPX networks.
Qcheck provides diagnostic information about end systems. Qcheck gives you a glimpse into a computer that may identify whether that particular computer is causing a network performance problem. Reports from Qcheck indicate an endpoint computer's physical memory, operating system levels, and (for streaming tests) CPU utilization, useful indicators of network performance.
Qcheck's traceroute tests collect information about network hops and hop latency between endpoints. Traceroute information helps locate network problems down to the level of a specific router.