As this is nearly the last chance for me to write up a post so that I got the three from last year I just decided to list tools as a reminder for me what I should use...
network:
yerisina
nmap
wireshark
unicornscan
packeth
tcpdump
etherape
scappy
tcptrace
paratrace
p0f
fragroute
ethercap
cain&able
dsniff
inguma
traceroute
ping
l2spike
sully
ike-scan
irpas
fierce
dnsenum
dnsmre
web application:
metoscan
nc
sslscan
w3af
grendel-scan
paros
burp
proxystrike
xss-me
sql-me
bsqlbf
firefox
ie
fiddler
nikto
dirbuster
pantera
stompy
ratproxy
hydra
medusa
hmap
halberd
flare
flasm
swfintuder
sqlninja
wireless:
air crack
kismet
airopeek
cowpatty
voip:
sipvicious
sivus
ohrwurm
sipcrack
sipbomber
sipproxy
steganRTP
voiper
misc:
john
metasploit
metagoofil
maltego
seat
nipper
rat
fwauto
This will be most probably edited.
Kind Regards
non-memory
Friday, August 29, 2008
Wednesday, August 13, 2008
number five
I am feeling a little bit under pressure as I managed to write the total number of 3 blog entries last August. So I have to get my brains together and hurry up to write some this August.
OK, here it goes then:
My colleges were paid to fly to Vegas. Somehow I think there was some kind of security conference going on. But when I am listening to them it seems more like a big fair for new jobs. Maybe I will get paid next time to go there when I am not scheduled for work.
But apparently some penetration testers at Vegas did forget that they are not black hats.
Leaving back doors after a successful break in at a clients site?
What is that about?
Kind Regards
non-black-hat
PS: And of course I have to mention that FX did two talks.
OK, here it goes then:
My colleges were paid to fly to Vegas. Somehow I think there was some kind of security conference going on. But when I am listening to them it seems more like a big fair for new jobs. Maybe I will get paid next time to go there when I am not scheduled for work.
But apparently some penetration testers at Vegas did forget that they are not black hats.
Leaving back doors after a successful break in at a clients site?
What is that about?
Kind Regards
non-black-hat
PS: And of course I have to mention that FX did two talks.
number four
As I am only reading two blogs apparently (which makes things quite easy) I have to point out one of the latest blog entry of FX:
Perception of Vulnerabilities
I would really like to have been a witness of the conversation between Dan and FX.
Well, this caused some discussion at work.
So happy discussing...
Kind Regards
the non discusser
Perception of Vulnerabilities
I would really like to have been a witness of the conversation between Dan and FX.
Well, this caused some discussion at work.
So happy discussing...
Kind Regards
the non discusser
Subscribe to:
Comments (Atom)