This is a Cool Collection of Top Ten Linux Hacking Tools.
1. nmap  – Nmap (“Network Mapper”) is a free open source utility for network  exploration or security auditing. It was designed to rapidly scan large  networks, although it works fine against single hosts. Nmap uses raw IP  packets in novel ways to determine what hosts are available on the  network, what services (application name and version) those hosts are  offering, what operating systems (and OS versions) they are running,  what type of packet filters/firewalls are in use, and dozens of other  characteristics. Nmap runs on most types of computers and both console  and graphical versions are available.
2. Nikto  – Nikto is an Open Source (GPL) web server scanner which performs  comprehensive tests against web servers for multiple items, including  over 3200 potentially dangerous files/CGIs, versions on over 625  servers, and version specific problems on over 230 servers. Scan items  and plugins are frequently updated and can be automatically updated (if  desired).
3. THC-Amap  – Amap is a next-generation tool for assistingnetwork penetration  testing. It performs fast and reliable application protocol detection,  independant on the TCP/UDP port they are being bound to.
4. Ethereal  – Ethereal is used by network professionals around the world for  troubleshooting, analysis, software and protocol development, and  education. It has all of the standard features you would expect in a  protocol analyzer, and several features not seen in any other product.
5. THC-Hydra  – Number one of the biggest security holes are passwords, as every  password security study shows. Hydra is a parallized login cracker which  supports numerous protocols to attack. New modules are easy to add,  beside that, it is flexible and very fast.
6. Metasploit Framework  – The Metasploit Framework is an advanced open-source platform for  developing, testing, and using exploit code. This project initially  started off as a portable network game and has evolved into a powerful  tool for penetration testing, exploit development, and vulnerability  research.
7. John the Ripper  – John the Ripper is a fast password cracker, currently available for  many flavors of Unix (11 are officially supported, not counting  different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary  purpose is to detect weak Unix passwords. Besides several crypt(3)  password hash types most commonly found on various Unix flavors,  supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM  hashes, plus several more with contributed patches.
8. Nessus  – Nessus is the world’s most popular vulnerability scanner used in over  75,000 organisations world-wide. Many of the world’s largest  organisations are realising significant cost savings by using Nessus to  audit business-critical enterprise devices and applications.
9. IRPAS – Internetwork Routing Protocol Attack Suite  – Routing protocols are by definition protocols, which are used by  routers to communicate with each other about ways to deliver routed  protocols, such as IP. While many improvements have been done to the  host security since the early days of the Internet, the core of this  network still uses unauthenticated services for critical communication.
10. Rainbowcrack  – RainbowCrack is a general propose implementation of Philippe  Oechslin’s faster time-memory trade-off technique. In short, the  RainbowCrack tool is a hash cracker. A traditional brute force cracker  try all possible plaintexts one by one in cracking time. It is time  consuming to break complex password in this way. The idea of time-memory  trade-off is to do all cracking time computation in advance and store  the result in files so called “rainbow table”.
 
 
Tidak ada komentar:
Posting Komentar
Setelah membaca artikel di atas.
Apa komentar anda ??