Attack Types | Description |
---|---|
OS | Attacks that target default operating system settings |
App level | Attacks that target application code |
Shrink Wrap | Attacks that target off-the-shelf scripts and code |
Misconfiguration | Attacks that exploit poorly configured systems or applications |
Penetration Phases | Description |
---|---|
Reconnaissance | The process of gathering information about the target system |
Scanning & Enumeration | The process of identifying open ports, services, and vulnerabilities on the target system |
Gaining Access | The process of exploiting vulnerabilities to gain access to the target system |
Maintaining Access | The process of maintaining access to the target system once access has been gained |
Covering Tracks | The process of hiding evidence of the attack to avoid detection or attribution |
Name | description |
---|---|
RFC 1918 – Private IP Standard | SOX – Corporate Finance Processes |
RFC 3227 – Collecting andstoring data | GLBA – Personal Finance Data |
ISO 27002 – InfoSec Guideline | FERPA – Education Records |
CAN-SPAM – email marketing | FISMA – Gov Networks Security Std |
SPY-Act – License Enforcement | CVSS – Common Vuln Scoring System |
DMCA – Intellectual Property | CVE – Common Vulns and Exposure |
Type of Encryption | Description |
---|---|
Symmetric Encryption | Only one key is used to encrypt and decrypt |
Asymmetric Encryption | Public key is used to encrypt, Private key is used to decrypt |
Algorithm | Key Size | Block Size |
---|---|---|
DES | 56-bit (8-bit parity) | Fixed block |
3DES | 168-bit | Keys ≤ 3 |
AES | 128, 192, or 256 | Replaced DES |
IDEA | 128-bit | - |
Twofish | Block cipher key size ≤ 256-bit | - |
Blowfish | Replaced by AES; 64-bit block | - |
RC | Including RC2 -› RC6. 2,040 key, RC6 (128-bit block) | - |
Algorithm | Description |
---|---|
Diffie-Hellman | Key Exchange, used in SSL/IPSec |
ECC | Elliptical Curve. Low process power/Mobile |
EI Gamal | !=Primes, log problem to encrypt/sign |
RSA | 2 x Prime 4,096-bit. Modern standard |
Algorithm | Description |
---|---|
MD5 | 128-bit hash, expressed as 32-bit hex |
SHA1 | 160-bit hash, widely used in US applications |
SHA2 | Four separate hash algorithms with key sizes of 224, 256, 384, and 512 bits |
Model | Description |
---|---|
Web of Trust | Entities sign certs for each other |
Single Authority | CA at top. Trust based on CA itself |
Hierarchical | CA at top. RA’s under to manage certs |
XMKS – XML PKI System | - |
Attack Type | Description |
---|---|
Known Plain-text | Search plaintext for repeatable sequences. Compare to t versions. |
Ciphertext-only | Obtain several messages with the same algorithm. Analyze to reveal repeating code. |
Replay | Performed in MITM. Repeat exchange to fool system in setting up a comms channel. |
Field | Description |
---|---|
Used to verify user identity | Nonrepudiation |
Valid from/to | Certificate good through dates |
Version | Identifies format. Common = V1 |
Key usage | Shows for what purpose cert was made |
Serial | Uniquely identify the certificate |
Subject’s public key | Self-explanatory |
Subject | Whoever/whatever being identified by cert |
Optional fields | e.g., Issuer ID, Subject Alt Name... |
Algorithm ID | Algorithm used |
Issuer | Entity that verifies authenticity of certificate |
Term | Description |
---|---|
Reconnaissance | Gathering information on targets, whereas foot-printing is mapping out at a high level. These are interchangeable in C |
Google Hacking | Operator: keyword additional search items. site: Search only within domain. ext: File Extension. loc: Maps Location. intitle: keywords in title tag of page. allintitle: any keywords can be in title. inurl: keywords anywhere in url. allinurl: any of the keywords can be in url. incache: search Google cache only. |
DNS Record Types | Service (SRV): hostname & port # of servers. Start of Authority (SOA): Primary name server. Pointer (PTR): IP to Hostname; for reverse |
Definition: Gathering information on targets, whereas foot-printing is mapping out at a high level. These are interchangeable in C|EH.
Operator | Keyword additional search items |
---|---|
site: |
Search only within domain |
ext: |
File Extension |
loc: |
Maps Location |
intitle: |
Keywords in title tag of page |
allintitle: |
Any keywords can be in title |
inurl: |
Keywords anywhere in URL |
allinurl: |
Any of the keywords can be in URL |
incache: |
Search Google cache only |
Record Type | Description |
---|---|
Service (SRV) | Hostname & port # of servers |
Start of Authority (SOA) | Primary name server |
Pointer (PTR) | IP to hostname; for reverse DNS |
Name Server (NS) | NameServers with namespace |
Mail Exchange (MX) | E-mail servers |
CNAME | Aliases in zone, lists multi services in DNS |
Address (A) | IP to hostname; for DNS lookup |
DNS footprinting | whois, nslookup, dig |
Flag | Description |
---|---|
URG | Indicates data being sent out of band |
ACK | Ack to, and after SYN |
PSH | Forces delivery without concern for buffering |
RST | Forces comms termination in both directions |
SYN | Initial comms. Parameters and sequence #’s |
FIN | Ordered close to communications |
Protocol/Port | Description |
---|---|
UDP Port 53 | nslookup |
TCP Port 53 | Zone transfer |
Step | Description |
---|---|
Client -> Discover -> Server | Client sends a broadcast message to discover available DHCP servers |
Client <- Offers --- Server | DHCP server responds with an offer of configuration parameters |
Client -> Request -> Server | Client sends a request to a chosen DHCP server |
Client <- Acknowledgment (ACK) <- Server | DHCP server sends an acknowledgment to the client that the IP is reserved |
IP is removed from pool | The IP address that was assigned to the client is removed from the pool of available addresses |
Type | Description |
---|---|
0 | Echo Reply: Answer to type 8 Echo Request |
3 | Destination Unreachable: No host/network codes |
4 | Source Quench: Congestion control message |
5 | Redirect: 2+ gateways for sender to use or the best route not the configured default gateway |
8 | Echo Request: Ping message requesting echo |
11 | Time Exceeded: Packet too long to be routed |
Method of representing IP addresses.
IPv4 Notation | Subnet Mask | # of Hosts |
---|---|---|
/30 | 255.255.255.252 | 4 |
/28 | 255.255.255.240 | 16 |
/26 | 255.255.255.192 | 64 |
/24 | 255.255.255.0 | 256 |
/22 | 255.255.252.0 | 1024 |
/20 | 255.255.240.0 | 4096 |
/16 | 255.255.0.0 | 65,536 |
/14 | 255.252.0.0 | 262,144 |
/12 | 255.240.0.0 | 1,048,576 |
/10 | 255.192.0.0 | 4,194,304 |
/8 | 255.0.0.0 | 16,777,216 |
To calculate a subnet mask for a given IPv4 address and prefix length, you can use the following formula:
subnet mask = 2^(32 - prefix length) - 1
Range | Description |
---|---|
0-1023 | Well-known |
1024-49151 | Registered |
49152-65535 | Dynamic |
Code | Name | Description |
---|---|---|
100 | Continue | The server has received the request headers and the client should proceed to send the request body. |
200 | OK | The request was successful and the server has returned the requested data. |
302 | Found | The requested resource has been temporarily moved to a new URL. |
400 | Bad Request | The server could not understand the request due to invalid syntax or other client-side errors. |
404 | Not Found | The requested resource could not be found on the server. |
500 | Internal Server Error | The server encountered an unexpected error and could not fulfill the request. |
Service | Port(s) |
---|---|
FTP | 20/21 |
NetBIOS/SMB | 137-139 |
SSH | 22 |
IMAP | 143 |
Telnet | 23 |
SNMP | 161/162 |
SMTP | 25 |
LDAP | 389 |
WINS | 42 |
HTTPS | 443 |
TACACS | 49 |
CIFS | 445 |
DNS | 53 |
RADIUS | 1812 |
HTTP | 80/8080 |
RDP | 3389 |
Kerberos | 88 |
IRC | 6667 |
POP3 | 110 |
Printer | 515, 631, 9100 |
Portmapper (Linux) | 111 |
Tini | 7777 |
NNTP | 119 |
NetBus | 12345 |
NTP | 123 |
Back Orifice | 27374 |
RPC-DCOM | 135 |
Sub7 | 31337 |
Nmap is the de-facto tool for this pen-test phase.
Scan Type | Description | Open | Closed |
---|---|---|---|
TCP | 3-way handshake on all ports | SYN/ACK | RST/ACK |
SYN | SYN packets to ports (incomplete handshake) | SYN/ACK | RST/ACK |
FIN | Packet with FIN flag set | No response | RST |
XMAS | Multiple flags set (FIN, URG, and PSH) Binary Header: 00101001 | No response | RST |
ACK | Used for Linux/Unix systems | RST | No response |
IDLE | Spoofed IP, SYN flag, designed for stealth | SYN/ACK | RST/ACK |
NULL | No flags set. Responses vary by OS. Designed for Linux/Unix machines | N/A | N/A |
Option | Description |
---|---|
-sA | ACK scan |
-sF | FIN scan |
-sS | SYN scan |
-sT | TCP scan |
-sI | IDLE scan |
-sn | PING sweep |
-sN | NULL scan |
-sS | Stealth scan |
-sR | RPC scan |
-Po | No ping |
-sW | Window scan |
-sX | XMAS tree scan |
-PI | ICMP ping |
-PS | SYN ping |
-PT | TCP ping |
-oN | Normal output |
-oX | XML output |
-A | OS/Vers/Script |
-T<0-4> | Slow - Fast |
Uses a community string for PW. SNMPv3 encrypts the community strings.
Command | Description |
---|---|
nbstat | |
nbtstat -a COMPUTER | Shows details about the computer |
nbtstat -S 10 -display ses stats every 10 sec | Displays session statistics |
nbtstat -A 192.168.10.12 | Displays the remote table |
nbtstat -n | Displays the local name table |
nbtstat -c | Displays the local name cache |
nbtstat -r -purge | Purges the name cache |
- 1B = master browser for the subnet
- 1C = domain controller
- 1D = domain master browser
- IPv4 = unicast, multicast, and broadcast
- IPv6 = unicast, multicast, and anycast
- IPv6 unicast and multicast scope includes link local, site local, and global.
- First half = 3 bytes (24 bits) = Org UID
- Second half = unique number
- Basic NAT is a one-to-one mapping where each internal IP equals a unique public IP.
- NAT overload (PAT) = port address translation. Typically used as the cheaper option.
- Concerned with the connections.
- Doesn’t sniff every packet, it just verifies if it’s a known connection, then passes it along.
- Crafting of wrapped segments through a port rarely filtered by the Firewall (e.g., 80) to carry payloads that may otherwise be blocked.
- Slow down or flood the network (and sneak through in the mix) or fragmentation.
tcpdump flag(s) interface
- It has three modes: Sniffer/Packet logger/Network IDS.
- Config file: /etc/snort or c:snortetc
- Example:
alert tcp!HOME_NET any ->$HOME_NET 31337 (msg : "BACKDOOR ATTEMPT-Back-orifice.")
- Any packet from any address != home network.
- Using any source port, intended for an address in home network on port 31337, send msg.
- Span port = port mirroring
- False Negative: IDS incorrectly reports stream clean
- 7 spaces hashed: AAD3B435B51404EE
C:Windowssystem32config
- Must not contain user’s name.
- Minimum of 8 characters.
- At least 3 of 4 complexity components (e.g., special characters, numbers, uppercase letters, lowercase letters).
- Passive Online: Sniffing wire, intercept clean text password/replay/MITM
- Active Online: Password guessing.
- Offline: Steal copy of password i.e., SAM file. Cracking efforts on a separate system.
- Non-electronic: Social Engineering.
- Steal cookies exchanged between systems and use them to perform a replay-style attack.
- Refers to the active attempt to steal an entire established session from a target.
- Sniff traffic between client and server.
- Monitor traffic and predict sequence.
- Desynchronise session with client.
- Predict session token and take over session.
- Inject packets to the target server.
- Type 1: Something you know.
- Type 2: Something you have.
- Type 3: Something you are.
- Kerberos makes use of symmetric and asymmetric encryption technologies and involves:
- KDC: Key Distribution Centre.
- AS: Authentication Service.
- TGS: Ticket Granting Service.
- TGT: Ticket Granting Ticket.
- Process:
- Client asks KDC (who has AS and TGS) for ticket to authenticate throughout the network. This request is in clear text.
- Server responds with secret key. Hashed by the password copy kept on AD server (TGT).
- TGT sent back to server requesting TGS if user decrypts.
- Server responds with ticket, and client can log on and access network resources.
- Two elements make a registry setting: a key (location pointer) and value (define the key setting).
- Root-level keys include:
- HKEY_LOCAL_MACHINE - Info on hard/software.
- HKEY_CLASSES_ROOT - Info on file associations and Object Linking and Embedding (OLE) classes.
- HKEY_CURRENT_USER - Profile info on current user.
- HKEY_USERS - User config info for all active users.
- HKEY_CURRENT-CONFIG - Pointer to hardware profiles.
- HKEY_LOCAL-MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
- HKEY_LOCAL-MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
- HKEY_LOCAL-MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_LOCAL-MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- Dumpster diving
- Impersonation
- Technical support
- Shoulder surfing
- Tailgating/piggybacking
Threat | Description |
---|---|
Phishing | Email scam that tricks users into divulging personal information or clicking on malicious links. |
Whaling | Phishing attack that specifically targets high-ranking executives or other individuals with access to valuable data. |
Pharming | Malicious technique that redirects users to a fake website that looks like the real one. |
Spear Phishing | Targeted phishing attack that focuses on a specific individual or organization. |
Vishing | Phone scam in which attackers impersonate legitimate organizations to obtain sensitive information. |
Smishing | Phishing attack that uses SMS text messages instead of email. |
Malware | Malicious software, including viruses, trojans, and ransomware, that can be spread through various channels. |
Denial-of-Service (DoS) attacks | Attack that overwhelms a server or network with traffic, making it unavailable to legitimate users. |
Man-in-the-Middle (MITM) attacks | Attack that intercepts communication between two parties and can eavesdrop, modify, or inject messages. |
SQL Injection | Attack that injects malicious SQL code into a vulnerable application to gain access to sensitive data or perform actions. |
Cross-Site Scripting (XSS) | Attack that injects malicious scripts into a web page, enabling an attacker to steal data or execute code on a victim's system. |
DNS Spoofing | Attack that poisons the DNS cache to redirect traffic to a malicious website or server. |
Watering Hole Attacks | Attack that targets a specific group of users by infecting websites they frequently visit. |
Advanced Persistent Threats (APTs) | Attack that gains unauthorized access to a network and stays undetected for a long time to steal sensitive data or perform malicious actions. |
Type of Social Engineer | Description |
---|---|
Insider associates | Limited authorized access. |
Insider affiliates | Insiders by virtue of affiliation that spoof the identity of the insider. |
Outsider affiliates | Non-trusted outsider that use an access point that was left open. |
Pretexters | Uses a pretext to obtain information or access. Often poses as an authority figure or a trusted individual. |
Phishers | Use fraudulent emails, websites or other communications to trick individuals into divulging sensitive information. |
Baiters | Leave a malware-infected device or piece of media in a public place, hoping someone will take the bait and plug it into their device. |
Quid pro quo | Offers a service or benefit in exchange for access to sensitive information. |
Scareware artists | Trick users into thinking their device is infected with malware, and then sell them a bogus security solution. |
Human hackers | Skilled social engineers who use a combination of tactics to gain access to sensitive information or systems. |
Category | Description |
---|---|
Physical measures | Things you can touch, taste, or smell that provide physical security, such as locks, fences, walls, and barriers. |
Technical measures | Electronic systems and devices that provide security, such as access control systems, smart cards, and biometric scanners. |
Operational measures | Policies, procedures, and training that ensure proper security protocols are followed, such as visitor management policies, security awareness training, and incident response plans. |
Access control systems | Devices that restrict entry to physical spaces based on credentials like access cards, PINs, or biometrics. |
CCTV | Closed circuit television systems that can monitor and record activity in physical spaces. |
Locks and barriers | Physical locks, fences, walls, and other barriers that can help prevent unauthorized access to areas. |
Lighting | Proper lighting that can deter intruders and help identify potential security threats. |
Alarms | Security alarms that can alert staff or law enforcement of security breaches or other security threats. |
Fire suppression | Fire suppression systems like sprinklers and fire alarms that can help prevent damage and loss from fires. |
Backup power | Backup power systems like generators or uninterruptible power supplies that can help ensure that critical systems remain operational during power outages or other disruptions. |
Attack Technique | Description |
---|---|
Cross-Site Scripting (XSS) | Injecting malicious code into a web page that is then executed by unsuspecting users who visit the page. This can allow the attacker to steal sensitive information or take control of the victim's browser. |
SQL Injection | Exploiting vulnerabilities in web applications that allow attackers to execute arbitrary SQL code against a database. This can allow the attacker to access, modify, or delete sensitive data. |
Cross-Site Request Forgery (CSRF) | Forcing a user to perform actions on a web application without their knowledge or consent by exploiting their active session. This can allow the attacker to perform actions such as changing the user's password or making unauthorized transactions. |
File Inclusion | Exploiting vulnerabilities in web applications that allow attackers to include and execute malicious code from remote servers. This can allow the attacker to execute arbitrary code on the server or steal sensitive information. |
Directory Traversal | Exploiting vulnerabilities in web applications that allow attackers to access files or directories outside of the web root directory. This can allow the attacker to access sensitive files or execute arbitrary code on the server. |
Clickjacking | Tricking a user into clicking on a button or link that performs an unintended action. This can allow the attacker to perform actions such as posting messages on the victim's social media account or making unauthorized purchases. |
Remote Code Execution | Exploiting vulnerabilities in web applications that allow attackers to execute arbitrary code on the server. This can allow the attacker to take control of the server or steal sensitive information. |
Variant of Unicode or un-validated input attack | Techniques that exploit the way web applications handle input data, such as using Unicode encoding or input validation bypass. |
Attack Type | Description |
---|---|
Union Query | Use the UNION command to return the union of the target database with a crafted database. |
Tautology | Term used to describe the behavior of a database when deciding if a statement is true. |
Blind SQL Injection | Trial and error with no responses or prompts. |
Error-based SQL Injection | Enumeration technique. Inject poorly constructed commands to have the database respond with table names and other information. |
Type | Description |
---|---|
Buffer Overflow | A condition that occurs when more data is written to a buffer than it has space to store, resulting in data corruption. It is caused by insufficient bounds checking, a bug, or poor configuration in the program code. |
Stack | The premise is that all program calls are kept in a stack and performed in order. Attackers try to change a function pointer or variable to allow code execution. |
Heap | Takes advantage of memory "on top of" the application (dynamically allocated). Attackers use a program to overwrite function pointers. |
NOP Sled | Takes advantage of an instruction called "no-op." Attackers send a large number of NOP instructions into the buffer. Most IDS protect from this attack. |
Dangerous SQL functions | The following do not check the size of destination buffers: gets(), strcpy(), strcat(), printf(). |
You need a Compatible wireless adapter with promiscuous mode is required, but otherwise pretty much the same as sniffing wired.
802.11 SPECIFICATIONS | Description |
---|---|
WEP | RC4 with 24-bit vector. Keys are 40 or 104 bits. |
WPA | RC4 supports longer keys; 48-bit IV. |
WPA/TKIP | Changes IV each frame and key mixing. |
WPA2 | AES + TKIP features; 48-bit IV. |
Spec | Distance | Speed | freq |
---|---|---|---|
802.11a | 30m | 54 Mbps | 5GHz |
802.11b | 100m | 11 Mbps | 2.4 GHz |
802.11g | 100m | 54 Mbps | 2.4 GHz |
802.11n | 125m | 100 Mbps+ | 2.4/5GHz |
Attack Type | Description |
---|---|
Bluesmacking | DoS against a device |
Bluejacking | Sending messages to/from devices |
Bluesniffing | Sniffs for Bluetooth |
Bluesnarfing | Actual theft of data from a device |
Virus Type | Description |
---|---|
Boot | Moves boot sector to another location and is almost impossible to remove. |
Camo | Disguises itself as legitimate files to avoid detection. |
Cavity | Hides in empty areas in an executable file. |
Macro (or Script) | Written in MS Office Macro Language and is embedded in documents like Word, Excel, or PPT. |
Multipartite | Attempts to infect files and boot sector at the same time. |
Metamorphic | Rewrites itself when it infects a new file, making it hard to detect. |
Network | Spreads via network shares and can infect other computers on the same network. |
Polymorphic | Constantly changes its signature, making it hard to detect. |
Shell | Like boot sector but wrapped around application code and run on application start. |
Stealth | Hides in files and copies itself to deliver a payload |
Attack Type | Description |
---|---|
SYN Attack | Sends thousands of SYN packets with a false IP address, causing the target machine to attempt SYN/ACK response and engage all machine resources. |
SYN Flood | Sends thousands of SYN packets but never responds to any of the returned SYN/ACK packets, causing the target machine to run out of available connections. |
ICMP Flood | Sends ICMP Echo packets with a fake source address, causing the target machine to attempt to respond but reach a limit of packets sent per second. |
Application-level | Sends "legitimate" traffic to a web application than it can handle, causing the target machine to become overwhelmed and unresponsive. |
Smurf | Sends a large number of pings to the broadcast address of the subnet with source IP spoofed to the target, causing the subnet to send ping responses to the target. |
Fraggle Attack | Similar to Smurf, but uses UDP instead of ICMP. |
Ping of Death | Attacker fragments an ICMP message to send to the target, and when the fragments are reassembled, the resultant ICMP packet is larger than the max size and crashes the system. |
Path | Description |
---|---|
/ | -Root |
/var | -Variable Data / Log Files |
/bin | -Biniaries / User Commands |
/sbin | -Sys Binaries / Admin Commands |
/root | -Home dir for root user |
/boot | -Store kernel /proc -Direct access to kernel |
/dev | -Hardware storage devices |
/mnt | -Mount devices |
- INIT process ID 1
- Root UID, GID 0
- Accounts of Services 1-999
- All other users Above 1000
- 4 – Read
- 2 – Write
- 1 – Execute
- User/Group/Others
- 764 – User>RWX, Grp>RW, Other>R
- action protocol address port -> address port (option:value;option:value)
- alert tcp 10.0.0.1 25 -> 10.0.0.2 25
- (msg:”Sample Alert”; sid:1000;)
- NMAP:
nmap -ST -T5 -N -P 1-100 10.0.0.1
- Netcat:
nc -v -z -w 2 10.0.0.1
- TCPdump:
tcpdump -i eth0 -v -X ip proto 1
- Snort:
snort -vde -c my.rules 1
- hping:
hping3 -I -eth0 -c 10 -a 2.2.2.2 -t 100 10.0.0.1
- iptables:
iptables -A FORWARD -j ACCEPT -p tcp ―dport 80
Tool | Webpage | Category | License | OS Support | Language | Release Date | Description |
---|---|---|---|---|---|---|---|
Eccouncil.org | https://www.eccouncil.org/ | Vulnerability Research | - | - | - | - | The International Council of Electronic Commerce Consultants (EC-Council) is a global leader in cybersecurity education, training, and certification. Their website includes a variety of resources related to vulnerability research, including news, articles, and research papers. |
Exploit Database | https://vulndb.cyberriskanalytics.com/ | Vulnerability Research | Proprietary | Web-based | - | - | The Exploit Database is a web-based tool that provides information on software vulnerabilities and exploits. It includes a searchable database of known vulnerabilities, as well as details on known exploits and proof-of-concept code. It is maintained by CyberRisk Analytics, a provider of cybersecurity risk intelligence services. |
Metasploit | https://www.metasploit.com/ | Penetration Testing | BSD | Linux, macOS, Windows, BSD | Ruby, C, C++, Lua | 2003 | Metasploit is a popular penetration testing framework that allows users to find vulnerabilities and test for exploits. It includes a database of known vulnerabilities and a suite of tools for conducting penetration tests. |
National Vuln Db | https://nvd.nist.gov/ | Vulnerability Research | Public Domain | Web-based | - | - | The National Vulnerability Database (NVD) is a comprehensive database of security vulnerabilities maintained by the National Institute of Standards and Technology (NIST). It includes information on known vulnerabilities, including severity ratings and recommended mitigation strategies. |
Nessus | https://www.tenable.com/products/nessus-vulnerability-scanner | Vulnerability Scanning | Proprietary | Linux, macOS, Windows | - | 1998 | Nessus is a popular vulnerability scanning tool that allows users to scan networks for vulnerabilities and assess their security posture. It includes a database of known vulnerabilities and a suite of tools for conducting vulnerability assessments. |
Savvius | https://www.savvius.com/ | Network Monitoring | Proprietary | Windows, macOS, Linux | C++, Python | - | Savvius provides network performance and security solutions, including network monitoring and packet analysis tools. Its network monitoring tool, Omnipeek, includes features for troubleshooting and analyzing network traffic, detecting network security threats, and optimizing network performance. |
Tool | Webpage | Category | Description |
---|---|---|---|
Nslookup | https://www.nslookup.io/ | DNS and Whois Tool | Nslookup is a command-line tool that can be used to query DNS servers for information such as IP addresses, domain names, and other DNS records. |
Sam Spacde | https://samlabs.com/whois | DNS and Whois Tool | Sam Spacde is a web-based tool that can be used to perform Whois lookups to get information about domain names, including registration details, IP addresses, and other DNS records. |
ARIN | https://www.arin.net/whois/ | DNS and Whois Tool | ARIN is a web-based tool that can be used to perform Whois lookups to get information about IP addresses and other network resources, including registration details, ownership information, and other DNS records. |
WhereisIP | https://whatismyipaddress.com/ip-lookup | DNS and Whois Tool | WhereisIP is a web-based tool that can be used to perform IP address lookups to get information such as geolocation, ISP details, and other DNS records. |
DNSstuff | https://www.dnsstuff.com/ | DNS and Whois Tool | DNSstuff is a web-based tool that can be used to perform various DNS and network diagnostic tests, including DNS lookups, traceroutes, ping tests, and email verification. It includes both free and paid features, and is designed for both novice and advanced users. |
DNS-Digger | https://www.epideme.com/digger/ | DNS and Whois Tool | DNS-Digger is a web-based tool that can be used to perform DNS lookups for a variety of record types, including A, AAAA, MX, NS, TXT, and more. It includes features such as query batching, wildcard support, and multiple DNS server selection. |
MXtoolbox | https://mxtoolbox.com/SuperTool.aspx | DNS and Whois Tool | MXtoolbox is a web-based tool that can be used to perform a variety of DNS and network diagnostic tests, including DNS lookups, blacklist checks, email verification, and more. It includes both free and paid features, and is designed for both novice and advanced users. |
Netcraft | https://www.netcraft.com/ | DNS and Whois Tool | Netcraft is a web-based tool that can be used to perform various DNS and website-related diagnostic tests, including DNS lookups, website uptime monitoring, and phishing site detection. It includes both free and paid features, and is designed for both novice and advanced users. |
Webmaster | https://developers.google.com/search | DNS and Whois Tool | Webmaster is a web-based tool that can be used to perform various website-related diagnostic tests, including website indexing, search engine optimization, and security scanning. It includes both free and paid features, and is designed for both novice and advanced users. |
Archive | https://archive.org/ | Website Mirroring Tool | Archive is a free and open-source website mirroring tool that can be used to download entire websites, including all files and subdirectories. It includes features for recursive downloads and automatic indexing of downloaded files. |
Tool | Webpage | Category | Description |
---|---|---|---|
Nslookup | DNS and Whois Tool | Nslookup is a command-line tool that can be used to query DNS servers for information such as IP addresses, domain names, and other DNS records. | |
Sam Spacde | https://samlabs.com/whois | DNS and Whois Tool | Sam Spacde is a web-based tool that can be used to perform Whois lookups to get information about domain names, including registration details, IP addresses, and other DNS records. |
ARIN | https://www.arin.net/whois/ | DNS and Whois Tool | ARIN is a web-based tool that can be used to perform Whois lookups to get information about IP addresses and other network resources, including registration details, ownership information, and other DNS records. |
WhereisIP | https://whatismyipaddress.com/ip-lookup | DNS and Whois Tool | WhereisIP is a web-based tool that can be used to perform IP address lookups to get information such as geolocation, ISP details, and other DNS records. |
DNSstuff | DNS and Whois Tool | DNSstuff is a web-based tool that can be used to perform various DNS and network diagnostic tests, including DNS lookups, traceroutes, ping tests, and email verification. It includes both free and paid features, and is designed for both novice and advanced users. | |
DNS-Digger | https://www.epideme.com/digger/ | DNS and Whois Tool | DNS-Digger is a web-based tool that can be used to perform DNS lookups for a variety of record types, including A, AAAA, MX, NS, TXT, and more. It includes features such as query batching, wildcard support, and multiple DNS server selection. |
MXtoolbox | https://mxtoolbox.com/SuperTool.aspx | DNS and Whois Tool | MXtoolbox is a web-based tool that can be used to perform a variety of DNS and network diagnostic tests, including DNS lookups, blacklist checks, email verification, and more. It includes both free and paid features, and is designed for both novice and advanced users. |
Tool | GitHub page | Category | Description |
---|---|---|---|
Wget | https://github.com/mirror/wget | Website Mirroring Tool | Wget is a free and open-source website mirroring tool that can be used to download entire websites, including all files and subdirectories. It includes features for recursive downloads, FTP/SSL support, and bandwidth throttling. |
Archive | https://web.archive.org/ | Website Mirroring Tool | Archive is a free and open-source website mirroring tool that can be used to download entire websites, including all files and subdirectories. It includes features for recursive downloads and automatic indexing of downloaded files. |
GoogleCache | Website Mirroring Tool | GoogleCache is a website mirroring tool that can be used to access cached versions of websites stored by Google. It can be useful for accessing websites that are currently down or unavailable. |
Tool | GitHub page | Category | Description |
---|---|---|---|
Angry IP Scanner | https://github.com/angryip/ipscan | Ping Sweep Tool | Angry IP Scanner is an open-source ping sweep tool that can be used to scan networks and identify live hosts. It includes features for both manual and automated testing, as well as reporting and exporting. |
MegaPing | https://github.com/LanTricks/MegaPing | Ping Sweep Tool | MegaPing is a commercial ping sweep tool that can be used to scan networks and identify live hosts, as well as perform other network diagnostics such as port scanning and DNS resolution. |
Fping | https://github.com/schweikert/fping | Ping Sweep Tool | Fping is an open-source ping sweep tool that can be used to scan networks and identify live hosts. It includes features for both manual and automated testing, as well as reporting and exporting. |
Masscan | https://github.com/robertdavidgraham/masscan | Ping Sweep Tool | Masscan is an open-source port scanner that can also be used for ping sweeps to identify live hosts on a network. It is optimized for high-speed scanning and can scan millions of IP addresses per hour. |
SolarWinds Ping Sweep Tool | https://www.solarwinds.com/free-tools/ping-sweep | Ping Sweep Tool | SolarWinds Ping Sweep Tool is a free ping sweep tool that can be used to scan networks and identify live hosts. It includes features for both manual and automated testing, as well as reporting and exporting. |
Advanced IP Scanner | https://www.advanced-ip-scanner.com/ | Ping Sweep Tool | Advanced IP Scanner is a free ping sweep tool that can be used to scan networks and identify live hosts. It includes features for both manual and automated testing, as well as reporting and exporting. |
Tool | Webpage | Category | License | OS Support | Language | Release Date | Description |
---|---|---|---|---|---|---|---|
Nmap | https://nmap.org/ | Network Scanning | Open Source | Windows, Linux, macOS | C | 2022-01-07 | Nmap is a powerful open-source network scanning tool that can be used to discover hosts and services on a network, as well as identify vulnerabilities and perform other security-related tasks. |
Nessus | https://www.tenable.com/products/nessus | Vulnerability Scanning | Commercial | Windows, Linux, macOS | C | 2022-02-15 | Nessus is a popular commercial vulnerability scanner that can detect security vulnerabilities in systems and networks. It includes a variety of scanning options and features for reporting and analysis. |
Burp Suite | https://portswigger.net/burp | Web Application Scanning | Commercial | Windows, Linux, macOS | Java | 2022-02-09 | Burp Suite is a commercial web application scanning tool that can be used to test web applications for security vulnerabilities. It includes a variety of scanning and testing options, as well as features for reporting and analysis. |
Metasploit | https://www.metasploit.com/ | Exploitation | Open Source | Windows, Linux, macOS | Ruby | 2022-01-12 | Metasploit is a popular open-source exploitation framework that can be used to test and exploit vulnerabilities in systems and networks. It includes a variety of payloads and modules for customizing and automating exploitation tasks. |
Shodan | https://www.shodan.io/ | Search Engine | Commercial | Web-Based | Python | N/A | Shodan is a commercial search engine that can be used to find internet-connected devices and services. It includes a variety of search filters and features for analyzing and reporting on search results. |
Wireshark | https://www.wireshark.org/ | Packet Analysis | Open Source | Windows, Linux, macOS | C, C++ | 2022-02-16 | Wireshark is a popular open-source packet analysis tool that can be used to capture, analyze, and troubleshoot network traffic. It includes a variety of filters and features for dissecting and interpreting network packets. |
OpenVAS | http://www.openvas.org/ | Vulnerability Scanning | Open Source | Linux | C | 2022-02-21 | OpenVAS is an open-source vulnerability scanner that can detect security vulnerabilities in systems and networks. It includes a variety of scanning options and features for reporting and analysis. |
John the Ripper | https://www.openwall.com/john/ | Password Cracking | Open Source | Windows, Linux, macOS | C | 2022-01-18 | John the Ripper is an open-source password cracking tool that can be used to test and crack password hashes. It includes a variety of cracking modes and options for customizing and optimizing cracking tasks. |
SQLMap | http://sqlmap.org/ | SQL Injection | Open Source | Windows, Linux, macOS | Python | 2022-02-17 | SQLMap is an open-source SQL injection tool that can be used to test web applications |
Tool | GitHub page | Category | Description |
---|---|---|---|
THC-Scan | https://github.com/vanhauser-thc/thc-scan | War Dialing Tool | THC-Scan is an open-source war dialing tool that can be used to scan phone numbers and identify those that are connected to modems, fax machines, or other devices that can be exploited for unauthorized access. |
TeleSweep | https://github.com/hackerspider1/TeleSweep | War Dialing Tool | TeleSweep is an open-source war dialing tool that can be used to scan phone numbers and identify those that are connected to voice mailboxes or other automated systems that can be exploited for unauthorized access. |
ToneLoc | https://github.com/crmulliner/toneloc | War Dialing Tool | ToneLoc is an open-source war dialing tool that can be used to scan phone numbers and identify those that are connected to modems or other devices that can be exploited for unauthorized access. |
WarVox | https://github.com/rapid7/warvox | War Dialing Tool | WarVox is an open-source war dialing tool that can be used to scan phone numbers and identify those that are connected to voice mailboxes or other automated systems that can be exploited for unauthorized access. It can also perform audio analysis. |
Banner Grabbing | Information Gathering Tool | Banner grabbing tools can be used to gather information about networked services, including the software version, operating system, and other identifying information. | |
Telnet | https://github.com/willsteel/telnet-iot-scanner | Banner Grabbing Tool | Telnet is a protocol used for remote access to command-line interfaces on networked devices. Telnet banner grabbing tools can be used to gather information about networked devices that support Telnet, including the software version and other identifying information. |
ID Serve | https://github.com/nowsecure/id-serve | Banner Grabbing Tool | ID Serve is an open-source banner grabbing tool that can be used to gather information about networked services, including the software version, operating system, and other identifying information. |
Netcraft | Banner Grabbing Tool | Netcraft is a commercial banner grabbing tool that can be used to gather information about networked services, including the software version, operating system, and other identifying information. | |
Xprobe | https://github.com/neuroo/xprobe2 | Banner Grabbing Tool | Xprobe is an open-source banner grabbing tool that can be used to gather information about networked services, including the software version, operating system, and other identifying information. |
Tool | GitHub page | Category | Description |
---|---|---|---|
Nessus | https://github.com/tenable/nessus-core | Vulnerability Scanner | Nessus is a commercial vulnerability scanner that can detect security vulnerabilities in systems and networks. |
SAINT | https://github.com/securestate/saint | Vulnerability Scanner | SAINT is a commercial vulnerability scanner that can detect security vulnerabilities in systems and networks. |
Retina | https://github.com/BeyondTrust/RetinaNetworkCommunity | Vulnerability Scanner | Retina is a commercial vulnerability scanner that can detect security vulnerabilities in systems and networks. |
Core Impact | Exploitation Tool | Core Impact is a commercial penetration testing tool that can exploit vulnerabilities in systems and networks. | |
Nikto | https://github.com/sullo/nikto | Web Application Scanner | Nikto is an open-source web server scanner that can detect security vulnerabilities in web servers and applications. |
Network Mapping | Network Mapping Tool | Network mapping tools can scan and map networks, including the devices and hosts connected to them. | |
NetMapper | https://github.com/bryanb/netmapper | Network Mapping Tool | NetMapper is an open-source network mapping tool that can scan and map networks, including the devices and hosts connected to them. |
LANState | Network Mapping Tool | LANState is a commercial network mapping tool that can scan and map networks, including the devices and hosts connected to them. | |
IPSonar | https://github.com/justaguysecurity/IPSonar | Network Mapping Tool | IPSonar is an open-source network mapping tool that can scan and map networks, including the devices and hosts connected to them. |
Proxy, Anonymizer, and Tunneling | Proxy and Tunneling Tool | Proxy, anonymizer, and tunneling tools can be used to bypass firewalls and access blocked content by hiding the user's IP address and/or encrypting their traffic. | |
Tor | https://github.com/torproject/tor | Anonymizer Tool | Tor is a free and open-source anonymizer tool that can be used to browse the internet anonymously by routing traffic through a series of servers. |
ProxySwitcher | https://github.com/proxyswitcher/proxyswitcher | Proxy Tool | ProxySwitcher is a commercial proxy tool that can be used to manage and switch between multiple proxies. |
ProxyChains | https://github.com/haad/proxychains-ng | Proxy Tool | ProxyChains is an open-source proxy tool that can be used to tunnel any application through one or more proxy servers. |
SoftCab | https://github.com/SoftCab/SoftCab.ProxyClient | Proxy Tool | SoftCab is a commercial proxy tool that can be used to manage and switch between multiple proxies. |
HTTP Tunnel | Tunneling Tool | HTTP Tunnel is an open-source tunneling tool that can be used to tunnel any application through an HTTP proxy. | |
Anonymouse | Anonymizer Tool | Anonymouse is a free web-based anonymizer tool that can be used to browse the internet anonymously by hiding the user's IP address. | |
Enumeration | Enumeration Tool | Enumeration tools are used to gather information about systems, networks, or applications, often for the purpose of penetration testing. | |
SuperScan | https://github.com/nettitude/Nettitude_SuperScan | Network Scanning Tool | SuperScan is a free and open-source network scanning tool that can scan networks and identify open ports and services on target systems. |
User2Sid/Sid2User | https://github.com/SecureAuthCorp/impacket | Enumeration Tool | User2Sid/Sid2User is an open-source enumeration tool that can be used to convert between usernames and security identifiers (SIDs) in Windows Active Directory environments. |
LDAP Admin | Enumeration Tool | LDAP Admin is a free and open-source tool for managing Lightweight Directory Access Protocol (LDAP) directories. It can be used to browse, search, and modify LDAP directories. | |
Xprobe | https://github.com/neuroo/xprobe2 | Enumeration Tool | Xprobe is an open-source enumeration tool that can be used to fingerprint target systems and identify the operating system, applications, and services running on them. |
Hyena | Enumeration Tool | Hyena is a commercial tool for managing Windows systems and Active Directory domains. It includes features for system administration, management, and reporting. | |
SNMP Enumeration | Enumeration Tool | SNMP enumeration tools can be used to gather information about devices on a network that support the Simple Network Management Protocol (SNMP). | |
SolarWinds | Enumeration Tool | SolarWinds is a suite of commercial tools for managing IT infrastructure, including network and system monitoring, configuration management, and security management. | |
SNMPUtil | https://github.com/mdlayher/snmp | Enumeration Tool | SNMPUtil is an open-source tool for querying devices on a network that support the Simple Network Management Protocol (SNMP). It can be used to gather information about system configurations, performance, and other statistics. |
SNMPScanner | https://github.com/10se1ucgo/snmpscan | Enumeration Tool | SNMPScanner is an open-source tool for scanning networks for devices that support the Simple Network Management Protocol (SNMP). It can be used to gather information about system configurations, performance, and other statistics. |
Tool Name | Website | CLI Examples | Input File |
---|---|---|---|
Cain | http://www.oxid.it/cain.html | cain.exe -r capturefile.cap | capturefile.cap |
John the Ripper | https://www.openwall.com/john/ | john --wordlist=password.txt hashfile.txt | password.txt, hashfile.txt |
LCP | https://www.lcpsoft.com/ | lcp.exe -dumpsam | None |
THC-Hydra | https://github.com/vanhauser-thc/thc-hydra | hydra -l username -P passwordlist.txt -vV -e ns targetIP http-get /admin | passwordlist.txt |
ElcomSoft | https://www.elcomsoft.com/ | elcomsoft.exe -p passwordfile.txt hashfile.txt | passwordfile.txt, hashfile.txt |
Aircrack | https://www.aircrack-ng.org/ | aircrack-ng -w wordlist -b BSSID capturefile.cap | wordlist, capturefile.cap |
Rainbow Crack | https://project-rainbowcrack.com/ | rainbowcrack.exe LM_hash.txt rainbow_table.rt | LM_hash.txt, rainbow_table.rt |
Brutus | https://www.hoobie.net/brutus/ | brutus.exe -u username -p passwordfile.txt -x service -s port | passwordfile.txt |
KerbCrack | https://www.tarlogic.com/en/tools/kerbcrack/ | kerbcrack.exe -d targetdomain -u username -p passwordfile.txt | passwordfile.txt |
CUPP - Common User Passwords Profiler | https://github.com/Mebus/cupp | python3 cupp.py -i | None |
Mentalist | https://github.com/sc0tfree/mentalist | python3 mentalist.py -i passwordlist.txt -b md5 | passwordlist.txt |
Hashcat | https://hashcat.net/hashcat/ | hashcat -m 0 -a 0 hashfile.txt wordlist.txt | hashfile.txt, wordlist.txt |
Kali linux | https://www.kali.org/ | john --wordlist=/usr/share/wordlists/rockyou.txt.gz hashfile.txt | /usr/share/wordlists/rockyou.txt.gz, hashfile.txt |
Tool Name | Website | CLI Examples | Description |
---|---|---|---|
Wireshark | https://www.wireshark.org/ | wireshark -i eth0 | Network protocol analyzer and packet sniffer |
Ace | https://github.com/ustayready/ace | ace --iface eth0 --pcap-file capture.pcap | Sniffs for passwords on the local network |
KerbSniff | https://www.tarlogic.com/en/tools/kerbsniff/ | kerbsniff.exe -i interface_name | Kerberos packet sniffer and password harvesting tool |
Ettercap | https://ettercap.github.io/ettercap/ | ettercap -T -q -i eth0 | Comprehensive suite for man-in-the-middle attacks |
Tool Name | Website | Description |
---|---|---|
KeyProwler | https://www.keyprowler.com/ | Keylogger and activity monitoring software for Windows |
Ultimate Keylogger | https://ultimatekeylogger.com/ | Keylogger and activity monitoring software for Windows |
All in one Keylogger | https://www.relytec.com/ | Keylogger and activity monitoring software for Windows |
Actual Spy | https://www.actualspy.com/ | Keylogger and screen capture software for Windows |
Ghost | https://www.ghostmonitor.com/ | Keylogger and activity monitoring software for Windows |
Hidden Recorder | https://hiddenrecorder.net/ | Keylogger and screen capture software for Windows |
Desktop Spy | https://www.spyarsenal.com/desktop-spy/ | Keylogger and screen capture software for Windows |
USB Grabber | https://www.usbgrabber.com/ | Keylogger and USB activity monitoring software for Windows |
Tool Name | Website | Description |
---|---|---|
Offline NT Password & Registry Editor | http://pogostick.net/~pnh/ntpasswd/ | Bootable utility to reset Windows passwords |
Trinity Rescue Kit | https://trinityhome.org/ | Bootable Linux distribution for system rescue, password resetting and file recovery |
Ophcrack | https://ophcrack.sourceforge.io/ | Bootable utility for recovering Windows passwords using rainbow tables |
Tool Name | Website | Description |
---|---|---|
PCUnlocker | https://www.top-password.com/ | Windows password reset tool with bootable CD/DVD/USB option |
Password Resetter | https://www.passwordresetter.com/ | Windows password reset tool with bootable CD/DVD option |
PassMoz LabWin | https://www.passmoz.com/ | Windows password reset tool with bootable USB option |
Tool Name | Website | Description |
---|---|---|
PassFab | https://www.passfab.com/ | Password recovery software for Windows, Office and other programs |
LCP | https://www.lcpsoft.com/ | Windows password recovery tool with local and remote password hash retrieval |
Cain and Abel | http://www.oxid.it/cain.html | Password recovery and auditing tool for Windows |
Tool Name | Website | Description |
---|---|---|
SystemRescueCD | https://www.system-rescue-cd.org/ | Bootable Linux distribution for system rescue and recovery |
Acronis True Image | https://www.acronis.com/en-us/home/ | Backup and recovery software with system imaging and cloning |
Clonezilla | https://clonezilla.org/ | Bootable partition and disk imaging/cloning program |
Tool Name | Website | Description |
---|---|---|
PDQ Deploy | https://www.pdq.com/pdq-deploy/ | Software deployment tool for Windows |
RemoteExec | https://www.isdecisions.com/remoteexec/ | Remote execution tool for Windows |
Dameware | https://www.dameware.com/ | Remote administration tool for Windows |
Tool Name | Website | Description |
---|---|---|
Remote Desktop Spy | https://www.spytech-web.com/remote-desktop-spy.shtml | Spyware that allows remote viewing of desktop activity |
Activity Monitor | https://www.softactivity.com/ | Monitoring software that records all user activities |
OSMonitor | https://www.os-monitor.com/ | Employee monitoring and surveillance software for Windows |
SSPro | https://www.sspro.com/ | Computer monitoring software for Windows and Mac |
Spector Pro | https://spectorsoft.com/ | Computer monitoring and surveillance software for Windows |
Tool Name | Website | Description |
---|---|---|
ELsave | http://www.theonespy.com/elsave/ | Tool that hides files and folders on a Windows system |
Cleaner | https://www.stevengould.org/ | Utility to clean temporary and unused files from a Windows system |
EraserPro | https://www.heidi.ie/eraser/ | Open source secure data removal tool for Windows |
Evidence Eliminator | N/A | Tool for removing sensitive files and data from a Windows system |
Tool Name | Website | Description |
---|---|---|
Komodia | http://www.komodia.com/ | Tool for intercepting and modifying network traffic |
Hping2 | https://github.com/antirez/hping | Command-line packet crafting tool for network testing |
PackEth | https://sourceforge.net/projects/packeth/ | GUI-based packet crafting tool for Windows and Linux |
Packet Generator | https://github.com/saminiir/packet-generator | Command-line packet crafting tool for Linux and macOS |
Netscan | https://www.softperfect.com/products/networkscanner/ | Network scanner and packet crafting tool for Windows |
Scapy | https://scapy.net/ | Interactive packet crafting tool for Python |
Nemesis | https://github.com/libnet/nemesis | Command-line packet crafting and injection tool for Linux |
Tool Name | Website | Description |
---|---|---|
Paros Proxy | http://www.parosproxy.org/ | Java-based web application security assessment tool |
Burp Suite | https://portswigger.net/burp | Comprehensive web application security assessment tool |
Firesheep | https://github.com/codebutler/firesheep | Firefox extension for session hijacking attacks |
Hamster/Ferret | https://www.bytepioneers.com/hamster/ | Session hijacking tools for Linux and Windows |
Ettercap | https://www.ettercap-project.org/ | Comprehensive suite for man-in-the-middle attacks and packet sniffing |
Hunt | https://github.com/bugcrowd/HUNT | Command-line tool for web application reconnaissance and vulnerability scanning |
Google Search Query | Description |
---|---|
inurl:"/wp-json/wp/v2/users" |
Finds all publicly available WordPress API user directories. |
intitle:"index.of" intext:"api.txt" |
Finds publicly available API key files. |
inurl:"/api/v1" intext:"index of /" |
Finds potentially interesting API directories. |
ext:php inurl:"api.php?action=" |
Finds all sites with a XenAPI SQL injection vulnerability. |
intitle:"index of" api_key OR "api key" OR apiKey -pool |
Lists potentially exposed API keys. |
Tool Name | Website | Description |
---|---|---|
Encryption | N/A | Built-in encryption functionality in various operating systems |
TrueCrypt | https://www.truecrypt71a.com/ | Open source disk encryption software for Windows, Linux and macOS |
BitLocker | https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview | Built-in disk encryption feature in Windows operating systems |
DriveCrypt | https://www.securstar.com/en/home/products/drivecrypt/overview/ | Commercial disk encryption software for Windows |
EZStego | https://sourceforge.net/projects/ezstego/ | Steganography tool for hiding data inside image files |
OmniHidePro | https://www.omnihil.com/omnihidepro.html | Steganography tool for hiding data inside image and audio files |
Cryptanalysis | N/A | Techniques for deciphering encrypted messages without knowing the key |
Cryptobench | https://www.cryptobench.com/ | Tool for benchmarking encryption algorithms and ciphers |
Tool Name | Website | Description |
---|---|---|
MD5 Hash | N/A | Hash function commonly used for data integrity verification |
Hash Calc | https://github.com/mkaring/HashCalc | Windows-based hash calculation utility |
Steganography | N/A | Techniques for hiding data within images, audio, or other files |
XPTools | N/A | Collection of Windows security tools |
ImageHide | http://www.mnhinc.com/ImageHide.htm | Steganography tool for hiding data within image files |
Merge Streams | https://github.com/stefano-m/lwsm | Tool for merging multiple data streams |
StegParty | https://github.com/abeluck/stegparty | Command-line steganography tool for Linux and macOS |
gifShuffle | https://github.com/quiet/gifshuffle | Command-line tool for steganography in GIF files |
QuickStego | https://www.quickcrypto.com/quickstego/ | Steganography tool for hiding data within image and audio files |
InvisibleSecrets | https://www.invisiblesecrets.com/ | Steganography and encryption software for Windows |
Tool Name | Website | Description |
---|---|---|
Wireshark | https://www.wireshark.org/ | Popular network protocol analyzer and packet sniffer |
CACE | https://www.winpcap.org/windump/ | Windows-based packet analyzer and capture utility |
tcpdump | https://www.tcpdump.org/ | Command-line network protocol analyzer and packet sniffer |
Capsa | https://www.colasoft.com/capsa/ | Network analyzer and packet sniffer for Windows-based networks |
OmniPeek | https://www.liveaction.com/ | Comprehensive network analyzer and packet sniffer for Windows |
Windump | https://www.winpcap.org/windump/ | Command-line network protocol analyzer and packet sniffer |
dnsstuff | https://www.dnsstuff.com/ | Online network tool suite for DNS analysis and troubleshooting |
EtherApe | https://etherape.sourceforge.io/ | Graphical network monitor and protocol analyzer for Unix-based systems |
Wireless | https://www.aircrack-ng.org/ | Wireless network security auditing and cracking tools |
Kismet | https://www.kismetwireless.net/ | Wireless network detector, sniffer, and intrusion detection system |
Netstumbler | N/A | Windows-based wireless network discovery and mapping tool |
Tool Name | Website | Description |
---|---|---|
Macof | N/A | Tool for flooding switches with fake MAC addresses |
SMAC | https://www.klcconsulting.net/smac/ | MAC address spoofing utility for Windows |
ARP Poisoning | N/A | Technique for redirecting traffic to a malicious endpoint |
Cain | https://www.oxid.it/cain.html | Network security tool for Windows |
UfaSoft | http://www.ufasoft.com/sniffer/ | Network protocol analyzer and packet sniffer for Windows |
WinARP Attacker | https://www.download32.com/winarpattacker-i32561.html | ARP spoofing tool for Windows |
Tool Name | Website | Description |
---|---|---|
Wfetch | N/A | Command-line HTTP client for Windows |
Httprecon | https://sourceforge.net/projects/httprecon/ | Web server fingerprinting tool for Linux and macOS |
ID Serve | N/A | Tool for detecting web server software and version |
WebSleuth | http://www.metasploit.com/ | Web application fingerprinting and mapping tool |
Black Widow | https://www.softpedia.com/get/Internet/Tools/Misc-Networking-Tools/Black-Widow.shtml | Web site scanner and vulnerability assessment tool |
CookieDigger | https://www.allacronyms.com/CookieDigger | Tool for analyzing and extracting cookies from web traffic |
Nstalker | https://www.nstalker.com/products/ | Web application security scanner for Windows and Linux |
NetBrute | N/A | Windows-based web server security testing tool |
SQL Injection | N/A | Attack technique for exploiting web application vulnerabilities |
BSQL Hacker | https://www.sqlhacker.com/ | Automated SQL injection and database exploitation tool |
Marathon | https://www.marathontesting.com/ | Web application testing tool for Windows |
SQL Injection Brute | N/A | Tool for brute forcing SQL injection vulnerabilities |
SQL Brute | https://www.securitysoftware.cc/sql-brute/ | Brute force tool for guessing SQL Server account credentials |
SQLNinja | https://sqlninja.sourceforge.net/ | SQL Server injection and exploitation tool for Linux |
SQLGET | N/A | Windows-based SQL injection and database exploitation tool |
Tool Name | Website | Description |
---|---|---|
Discovery | https://www.discoverywifi.com/ | Wireless network discovery and mapping tool |
Kismet | https://www.kismetwireless.net/ | Wireless network detector, sniffer, and intrusion detection system |
NetStumbler | N/A | Windows-based wireless network discovery and mapping tool |
insider | https://github.com/0x90/wifi-arsenal | Wireless network security toolkit for Linux and macOS |
NetSurveyor | https://www.nutsaboutnets.com/netsurveyor/ | Windows-based wireless network discovery and mapping tool |
Packet Sniffing | N/A | Technique for intercepting and analyzing wireless network traffic |
Cascade Pilot | https://www.riverbed.com/products/cascade/ | Network performance management and packet analysis tool |
Omnipeek | https://www.liveaction.com/ | Comprehensive network analyzer and packet sniffer for Windows |
Comm View | https://www.tamos.com/products/commwifi/ | Windows-based network protocol analyzer and packet sniffer |
Capsa | https://www.colasoft.com/capsa/ | Network analyzer and packet sniffer for Windows-based networks |
WEP/WPA Cracking | N/A | Techniques for cracking WEP/WPA encryption on wireless networks |
Aircrack | https://www.aircrack-ng.org/ | Wireless network security auditing and cracking tools |
KisMac | https://github.com/IGRSoft/KisMAC2 | Wireless network discovery and mapping tool for macOS |
Tool Name | Website | Description |
---|---|---|
WepAttack | https://sourceforge.net/projects/wepattack/ | Wireless network key cracking tool for Linux |
WepCrack | N/A | Windows-based wireless network key cracking tool |
coWPatty | N/A | Brute force tool for guessing WPA passwords on wireless networks |
Bluetooth | N/A | Short-range wireless communication technology |
BTBrowser | N/A | Windows-based Bluetooth device discovery tool |
BH Bluejack | https://www.bluejackingtools.com/ | Windows-based Bluetooth device discovery and hacking tool |
BTScanner | https://www.bluescan.org/ | Linux-based Bluetooth device discovery tool |
Bluesnarfer | https://www.alighieri.org/tools/bluesnarfer.html | Linux-based Bluetooth device hacking tool |
Mobile Device Tracking | N/A | Technique for locating and tracking mobile devices |
Wheres My Droid | https://www.wheresmydroid.com/ | Android app for locating and remotely controlling lost or stolen devices |
Find My Phone | https://www.apple.com/icloud/find-my/ | Apple's built-in feature for locating lost or stolen devices |
GadgetTrack | https://www.gadgettrak.com/ | Cross-platform app for locating and remotely controlling lost or stolen devices |
iHound | https://www.ihoundsoftware.com/ | iOS app for tracking and remotely controlling lost or stolen devices |
Tool Name | Website | Description |
---|---|---|
Wrappers | N/A | Programs that encapsulate other programs for stealth or other purposes |
Elite Wrap | N/A | Wrapping tool for creating undetectable backdoors or Trojans |
Monitoring Tools | N/A | Tools for monitoring system activity or network traffic |
HiJackThis | https://sourceforge.net/projects/hjt/ | Windows-based tool for detecting and removing malware and spyware |
CurrPorts | https://www.nirsoft.net/utils/cports.html | Windows-based tool for monitoring open ports and active network connections |
Fport | https://www.majorgeeks.com/files/details/fport.html | Windows-based tool for identifying and killing processes using specific ports |
Tool Name | Website | Description |
---|---|---|
Netcat | https://eternallybored.org/misc/netcat/ | Swiss Army Knife of networking utilities for TCP/IP protocols |
Nemesis | https://github.com/libnet/nemesis | Command-line network packet crafting and injection tool |
IDS | N/A | Intrusion detection systems for monitoring and analyzing network traffic |
Snort | https://www.snort.org/ | Open-source intrusion detection and prevention system for networks |
Tool Name | Website | Description |
---|---|---|
ADMutate | https://www.packetfactory.net/projects/admutate/ | Tool for generating a large number of network probes for testing IDS/IPS systems |
NIDSBench | https://sourceforge.net/projects/nidsbench/ | Tool for benchmarking and testing network intrusion detection systems |
IDSInformer | https://sourceforge.net/projects/idsinformer/ | Tool for monitoring network intrusion detection systems and generating alerts |
Inundator | https://inundator.sourceforge.net/#download | Network packet generator for testing intrusion detection and prevention systems |
The information in this cheat sheet is not only useful for passing the Certified Ethical Hacker Exam, but can act as a useful reference for penetration testers and those pursuing other Security certifications. However you choose to use it, we hope you’ve found it a helpful resource to keep around. wanna see more ? visit here