Security Tools for the Evil Genius.

So this is not a countdown on which is the best one, but is a one which tells, which of the software are best in their own area.
  • Wireshark

Wireshark is an open source packet analyzer program developed by Wireshark and is a cross platform application. Used for network troubleshooting, analysis and communication protocaol development.

Wireshark is a very similar to tcpdump, but has a graphical user interface, plus some great filtering options.
The features supported by Wireshark are
-from the wire data capture
-live data capturing from Ethernet, IEEE 802.11, PPP and loopback
-captured network data can be browsed from GUI as well as terminal, with the TShark
-data display can be refined using a display feature
-plug-in can be created for new protocols
-VoIP calls can be captured using proper encoding and detection
  • Aircrack-ng

Aircrack –ng is a open source cross platform program  developed by Thomas d’Otreppe  for Packet sniffer and injector ,WEP encryption key recovery and is GPL licensed software.

Aircrack –ng is a network software suite consisting of detectors, packet sniffing, WEP and WPA/WPA-PSK cracker and analysis tool. Major features include
-crack WEP and WPA keys
-decrypts WEP and WPA encrypted capture files
-packet injector
-packet sniffer
- Virtual tunnel interface creator
-virtual access to different wireless cards from other computer.

NOTE: FOR USING WIRESHARK AND AIRCRACK-NG ONE NEED SOME SPECIAL WIRELESS CARDS CAPABLE OF GATHERING PACKETS. GOOGLE TO FIND AIRCRACK COMPARABLE WIRELESS CARDS.
  • Backtrack Linux

Backtrack Linux is security and penetration testing giant in information security field .Backtrack is  a distribution based on Debian GNU/Linux distribution mainly aimed at digital forensic and penetration testing. It is preloaded with all security tools including wireshark, aircrack-ng, Kismet, ophcrack, Nmap and so on. Backtrack focuses on 12 major categories on information security. The latest release are named as BACKTRACK 5R3 and Kali 1.0.

  • Metaspoit

It is software which aims at computer security project and provides information on security vulnerabilities and aims at penetration testing and signature development.

It comes with various editions including framework edition, community edition, express and pro.
  • VMware workstation

VMware workstation is a hypervisor that runs on *64 computers and enables users to set up multiple virtual machines and use them simultaneously. VMware Workstation allows multiple operating systems to run simultaneously.It is developed by VMware Inc. a division of EMC Corporation. The latest workstation 9 is released and sold.

  • Kismet

Kismet is an 802.11 layer2 wireless network detector sniffer and intrusion network system. it works with about any wireless card and is fully supported.

  • Nmap

Nmap is a classic high speed TCP port scanner. It offers tools for network exploration and security auditing and it supports large network without breaking a sweat. It is free and open source and is very dynamic and easy to use by a newbie or a pro.

  • Nessus

Nessus is a remote network security auditor to test security modules and find vulnerabilities. Nessus is also the most used network security auditor.

  • Nikto

Nikto is a open source web server scanner which performs test against web servers, it is also a great CGI scanner it also have other tools to focus on fingerprinting and Google hacking/info gathering.

  • TcpDump

TcpDump is a powerful tool for network monitoring and data acquisition. It is used to dump traffic from a particular network. It can also be used to track network problems and detect attacks like “ping”.

  • Netcraft

Netcraft is an online tool to scan websites OS and web server information.

  • Netcat

Netcat is a simple UNIX utility which reads and writes data across network connections using TCP and UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. It is also a good network debugging and exploration tool since it can create almost any kind of correction.


  • The list of other software according to the use are given below
INFORMATION GATHERING
     DOMAIN
                              Sam Spade
                              Whois Lookup
                              Visual Route
     NETWORK
                               Firewalk
                               Hping2
                               Ngrep
                               TcpDump
                               Sguil
     WEB-SITE
                              Grab-a-site
                              Netcraft
                              Paros Proxy
VULNERABILITY IDENTIFICATION 
     GETTING ACCESS
                             Crack/Libcrack
                             Etherea 
                             L0pht Crack
                             Sniffit
                             Snort
     FIREWALLS
                             8signs
                             eSafe
                            McAfee Firewall
                            ZoneAlarm
OTHER TOOLS
          IPFilter
          Libnet
          LogCheck
          SARA
          Retina
          Tripwire

Post a Comment