Tools Flashcards
Allows you to look up all available information about an IP address, hostname, or domain, including country, state or province, city, name of network provider, administrator or tech support contact. Automatically delivers information associated with an IP address no matter where it is registered geographically.
Smart Whois
Buffer Overflows. A compiler that emits programs hardened against “stack smashing” attacks. Uses canaries.
StackGuard
Buffer Overflows. A family of tools designed to enhance system integrity by hardening system components and platforms against security attacks. Secures a Linux OS and applications. Works by hardening existing software components and platforms so that attempts to exploit security vulnerabilities will fail safe, i.e. the compromised process halts instead of giving control to the attacker, and then is restarted. The software components are effectively “laminated” with technologies to harden them against attack.
Immunix
Dos/DDoS. A free, open source tool that can tell a zombie system flooding packets to stop flooding. Works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.
Zombie Zapper
Dos/DDoS. A remote scanner for the most common Distributed Denial of Service programs (Zombies). Will detect Trinoo, Stacheldraht and Tribe Flood Network programs running with their default settings, although setup of each program type is possible from the configuration screen. Scanning is performed by sending the appropriate UDP and ICMP messages at a controlable rate to a user defined range of addresses.
DdoSPing
Dos/DDoS. A third generation network security analysis tool that operates under Unix, Linux, MAC OS/X or Windows (through coLinux) OS’. Integrates the National Vulnerability Database (NVD). Can adapt to many firewalled environments. Supports remote self scan and API facilities. Based on the SATAN model
SARA (Security Auditor’s Research Assistant)
Dos/DDoS. Became available in 1999. A network of this type looks conceptually similar to a trinoo; it is a packet flooding attack and the client controls the size of the flooding packets and duration of the attack. One interesting signature of this DDOS tool is that the sequence number for all TCP packets is 0x28374839.
Shaft
Dos/DDoS. Designed to launch coordinated denial-of-service attacks from many sources against one or more targets simultaneously. Includes features designed specifically to make its traffic difficult to recognize and filter, to remotely execute commands, to obfuscate the true source of the traffic, to transport its traffic over multiple transport protocols including UDP, TCP, and ICMP, and features to confuse attempts to locate other nodes by sending “decoy” packets. Designed to work on various UNIX and UNIX-like systems and Windows NT. Obfuscates the true source of attacks by spoofing IP addresses. In networks that employ ingress filtering, it can forge packets that appear to come from neighboring machines. Can flood networks by sending large amounts of data to the victim machine. Includes attacks designed to crash or introduce instabilities in systems by sending malformed or invalid packets.
TFN2K
Dos/DDoS. Made up of client and daemon programs, which implement a distributed network denial of service tool capable of waging ICMP flood, SYN flood, UDP flood, and Smurf style attacks, as well as providing an “on demand” root shell bound to a TCP port.
TFN
Dos/DDoS. Not a virus, but an attack tool released in late December 1999 that performs a distributed Denial of Service attack.
Trinoo
Dos/DDoS. Tool consists of a handler and an agent portion, much like previously known DDOS tools such as Trinoo. Handler can be controlled remotely by one or more intruders using a password-protected interactive login to a running handler. Simple commands issued to the handler cause instructions to be sent to agents deployed on compromised systems. The communications between intruder and handler, and the handler and agents, are configurable at compile time and have varied significantly from incident to incident. The default protocol and destination socket numbers in source code recently released to the public are 6723/tcp -> handler (intruder), 7983/udp -> agent (handler), and 9325/udp -> handler (agent).
Mstream
Dos/DDoS. Uses intrusion fingerprints to track down compromised hosts. It is capable of remotely detecting Stacheldraht, TFN, and Trinoo if the attacker did not change the default ports.
RID Remote Intrusion Detector
DOS/Ping of Death. A Denial of Service (DOS) attack that completely disables networking on many Win95 and WinNT machines.
Win Nuke
DOS/Ping of Death. A program that can freeze any computer connected to the Internet or on a network running Windows 95, Windows NT, and older versions of the MacOS that are not behind a firewall that blocks ICMP (Internet Control Message Protocol) data packets.
SSPing
DOS/Ping of Death. Attack uses a forged ICMP (InternetControl Message Protocol) echo request.
Smurf
DOS/Ping of Death. DoS on Windows systems. Sends TCP packets with bad header. As a result, CPU graph stays over 90% in the kernel.
Bubonic
DOS/Ping of Death. Freeware. It integrates bonk, jolt, land, nestea, netear, syndrop, teardrop, and winnuke into one multi-platform DoS attack.
Targa
DOS/Ping of Death. Sending a packet to a machine with the source host/port the same as the destination host/port crashes a lot of boxes.
Land
DOS/Ping of Death. Variant of the Ping-of-Death attack. It sends an IP fragment that beyond the maximum length of a legal IP packet.
Jolt2
Enumeration. A security auditing program for Microsoft Windows® NT/XP/200x. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information.
DumpSec
Enumeration. The intention of this package is to perform various security checks on remote servers running NetBIOS file sharing services. It is designed to explore the NETBIOS file-sharing services offered by the target system. It implements a stepwise approach to gather information and attempt to obtain file system-level access as though it were a legitimate local client.
NAT (NetBIOS Auditing Tool)
Enumeration/SNMP. A command line utility (included with Windows resource kits) that allows the querying of MIB information from a network device. While it supports GET/GETNEXT and WALK, most people use it to GET information and to WALK OID trees. Can access the SNMP OID and get the information you want from a command line.
SNMPUtil
Enumeration/SNMP. SNMP enumeration and management tool
SolarWinds (IP Network Browser)
Enumeration/Windows. A command line interface to a WIN32 function LookupAccountName.
User2SID
Enumeration/Windows. A command line interface to a WIN32 function LookupSidName.
SID2User
Enumeration/Windows. A small command line function that retrieves all available information about any know user from any NT/Win2k system that you can hit 139 on. Returns standard info like SID, Primary group, logon restrictions, etc., but it also dumps special group information, pw expiration info, pw age, smartcard requirements, and lots of other stuff. Works as a null user, even if the system has RA set to 1 to specifically deny anonymous enumeration.
UserInfo
Enumeration/Windows. Combines allmost all possible attacks against NETBIOS (users and computers - shares - password policy). It establishes a NETBIOS Null Session and keeps it open during the attack. Based on dictionaries or given values this tool will try to guess passwords.
Enum
Enumeration/Windows. Sidesteps “RestrictAnonymous=1” and acquires account information on Windows NT/2000 machines. Shows the information that leaks by opening an anonymous login and showing the following information: An enumeration of user IDs, account names and full names, Password age, User groups the user is a member of, Account type, Whether the account is disabled or locked, Password policies, Last logon time, Number of logons, Bad password count, Quotas
GetAcct
Footprinting. A free network query tool. Whois, DNS Query and ZT, traceroute, email header analysis, ping, website download, abuse address query, finger. Runs on Windows.
Sam Spade
Footprinting. An e-mail analysis tool that allows you to track Internet e-mails back to the sender.tp://www.visualware.com/emailtrackerpro/index.html)
eMailTracking Pro
Footprinting. An internet utility that returns information about the domain name and IP address.
Whois
Footprinting. Inherent in Windows command line. Enables you to query DNS and performe zone transfers.
NSLookup
Footprinting. Regional Internet Registries (RIR’s) that manage, distribute, and register public IP’s for regions. Online query tool enables users to find the address range of the network.
ARIN, APNIC, RIPE, LACNIC, (AFRINIC)
Footprinting. Reliably find out when your email gets opened, how long it gets read for, whether or not it gets forwarded to someone else or published on the internet, where the reader is located, and more.
MailTracking.com
Footprinting/Route Determination. Enhanced GUI-based Traceroute tool that provides more feedback regarding failed connections than typical traceroute programs. Features include printer and HTML output, a detailed whois display, continuous ping, instant browser access to nodes.
NeoTrace
Footprinting/Route Determination. Gui-based Traceroute tool. Tabbed GUI, traceroute, ping, reverse DNS query, IP Location reporting, network provider reporting, domain whois lookups, browser integration, email address tracing, ICMP traceroutes.
Visual Route
Footprinting/Route Determination. Monitors connections to open ports and alerts you to suspicious activity. Allows specific ports, domain names or IP addresses to be singled out for scrutiny and tracking. Identifies which country the connection to your computer is coming from. A real-time “Netstat” that also provides history and a rich set of features to help locate unwelcome visitors.
Visual Lookout
Footprinting/Route Determination. Unix/Linux tool that enables user to trace hops or computers between source and target computer. Increments TTL value in packets.
Traceroute
Footprinting/Route Determination. Windows tool that enables user to trace hops or computers between source and target computer. Increments TTL value in packets.
Tracert
Hacking Web Servers. A Very stealthy CGI scanner that is scriptable.
Whisker
Hacking Web Servers. An interactive ASP page command prompt that will show you how vulnerable your IIS web server is to the IUSR_COMPUTER, IWAM_COMPUTER and SYSTEM user accounts. It runs in the context of the web server as a standard ASP page, and simulates a backdoor to any IIS web server.
cmdasp.asp
Hacking Web Servers. Backdoor allowing upload via http.
IISCrack.dll
Hacking Web Servers. Comprehensive and intuitive Web application scanner.
WebInspect
Hacking Web Servers. Designed to identify known and unknown vulnerabilities, suggest fixes to identified vulnerabilities, and report possible security holes within a network’s internet, intranet, and extranet environments
Shadow Security Scanner
Hacking Web Servers. Exploit c code for hacking Win2K IIS servers
Jill32
Hacking Web Servers. HTTP security scanning tool.
N-Stealth Scanner
Hacking Web Servers. IIS 5.0 remote win32 exploit for the null.printer buffer overflow.
IIS5-Koei
Hacking Web Servers. IIS privilege escalation tool– makes use of the IIS 5.0 + SP0 (SP1, SP2)
ispc.exe
Hacking Web Servers. Printer overflow exploit, like IIS-Koei.
IIS5Hack
Hacking Web Servers. Resource Kit Utility for changing permissions
Cacls utility
Hacking Web Servers. Unicode vulnerability exploit script
UnicodeUploader.pl
Hacking Web Servers. Used to view the SAM file on a server which is vulnerable to a certain IIS hole.
IISExploit
Hacking Web Servers. Web site traffic analysis software
LogAnalyzer
Hacking Web Servers. Windows software patch management tool that helps you secure your systems by remotely managing service packs and hotfixes.
UpdateExpert
IDS, Firewalls, and Honeypots. A network intrusion detection evasion toolkit. It implements most of the attacks described in the Secure Networks “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection” paper of January 1998. Was written in the hopes that a more precise testing methodology might be applied to the area of network intrusion detection, which is still a black art at best.
Fragrouter
IDS, Firewalls, and Honeypots. A network intrusion detection system test suite.
NIDSbench
IDS, Firewalls, and Honeypots. An IDS evasion tool.
SideStep
IDS, Firewalls, and Honeypots. An open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. The most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry.
Snort
IDS, Firewalls, and Honeypots. API that can mask buffer overflow exploit signatures from Network IDS systems so that they are more difficult to detect.
ADMutate
IDS, Firewalls, and Honeypots. Tool to replay saved tcpdump or snoop files at arbitrary speeds.
TCPReplay
Linux Hacking. A set of scripts that scan a Un*x system looking for security problems.
TARA
Linux Hacking. A third-generation security analysis tool that is based on the SATAN model.
SARA (Security Auditor’s Research Assistant)
Man In The Middle. A collection of tools for network auditing and penetration testing. Some modules passively monitor a network for interesting data (passwords, email, files, etc.) and others facilitate the interception of network traffic normally unavailable to an attacker(due to layer-2 switching). Others implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.
Dsniff
Novell Hacking. Brute force cracker
NOVELBFH
Novell Hacking. Brute force cracker.
Kock
Novell Hacking. Checks for users that have no password. For both Netware 3.x and 4.x.
Chknull
Novell Hacking. Emulates a fake Novell file server.
Novelffs
Novell Hacking. Login spoofing utility for all versions of NetWare.
Spooflog
Novell Hacking. NLM which will create supervisor account from server.
Burglar
Novell Hacking. Novell hacking and cracking tool.
Bindery/BinCrack
Novell Hacking. Popular Packet Sniffers for Ethernet networks.
Gobbler
Novell Hacking. Resets any user password, including that of supervisor.
SETPWD.NLM
Novell Hacking. Simple bruteforce hacker for Novell.
nwpcrack
Novell Hacking. Tools for the opening of Novell’s Netware Directory Services.
Pandora
Novell Hacking. TSR program for recording typed passwords.
Getit