This is a Cool Collection of Top Ten
Linux Hacking Tools.
1. nmap – Nmap (“Network Mapper”) is a free open source utility for network exploration or security
auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine
what hosts are available on the network, what services (application name and
version) those hosts are offering, what operating systems (and OS versions)
they are running, what type of packet filters/firewalls are in use, and dozens
of other characteristics. Nmap runs on most types of computers and both console
and graphical versions are available.
2. Nikto – Nikto is an Open Source (GPL) web server scanner which performs
comprehensive tests against web servers for multiple items, including over 3200
potentially dangerous files/CGIs, versions on over 625 servers, and version
specific problems on over 230 servers. Scan items and plugins are frequently
updated and can be automatically updated (if desired).
3. THC-Amap – Amap is a next-generation tool for assistingnetwork
penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.
4. Ethereal – Ethereal is used by network professionals around the
world for troubleshooting, analysis, software and protocol development, and
education. It has all of the standard features you would expect in a protocol
analyzer, and several features not seen in any other product.
5. THC-Hydra – Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login
cracker which supports numerous protocols to attack. New modules are easy to
add, beside that, it is flexible and very fast.
6. Metasploit Framework – The Metasploit Framework is an advanced
open-source platform for developing, testing, and using exploit code. This
project initially started off as a portable network game and has evolved into a
powerful tool for penetration testing, exploit development, and vulnerability
research.
7. John the Ripper – John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect
weak Unix passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
8. Nessus – Nessus is the world’s most popular vulnerability scanner
used in over 75,000 organisations world-wide. Many of the world’s largest
organisations are realising significant cost savings by using Nessus to audit
business-critical enterprise devices and applications.
9. IRPAS – Internetwork Routing Protocol
Attack Suite – Routing protocols are by definition protocols, which are
used by routers to communicate with each other about ways to deliver routed
protocols, such as IP. While many improvements have been done to the host
security since the early days of the Internet, the core of this network still
uses unauthenticated services for critical communication.
10.
Rainbowcrack – RainbowCrack is a
general propose implementation of Philippe Oechslin’s faster time-memory
trade-off technique. In short, the RainbowCrack tool is a hash cracker. A
traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex
password in this way. The idea of time-memory trade-off is to do all cracking
time computation in advance and store the result in files so called “rainbow
table”.
No comments:
Post a Comment