Archive | Network Hacking




Foundstone Blast – TCP Network Service Stress Test Tool

Foundstone Blast v2.0 is a small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers. Features: /trial switch adds the ability to see how the buffer looks before sending it /v switch adds verbose option – off by default […]

Tags: , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Nemesis – Packet Injection Suite

Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting. Nemesis can natively craft and inject packets for: ARP […]

Tags: , , , , , ,

Posted in: Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment

Cisco IOS FTP Backdoor Ripe for Hackers

Another flaw in Cisco’s IOS, this time a problem with FTP, the mechanism used to update the firmware on Cisco devices (routers & switches mostly). You really don’t want someone playing around with your configuration files on your router do you? IOS FTP, which comes disabled by default in IOS, is used to upload IOS […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Network Hacking | Add a Comment

ISIC – IP Stack Integrity & Stability Checker

ISIC is a suite of utilities to exercise the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It generates piles of pseudo random packets of the target protocol. The packets be given tendencies to conform to. Ie 50% of the packets generated can have IP Options. 25% of the […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Programming | Add a Comment

VoIP Security Testing Tools List from VoIPSA

The VoIP Security Alliance (VOIPSA) is pleased to announce the public release of its VoIP security tool list. Check it out at: http://www.voipsa.org/Resources/tools.php This VoIP Security Tool List provides categories, descriptions and links to current free and commercial VoIP security tools. This list was developed to address the current void of VoIP security testing resources […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Scapy – Interactive Network Packet Manipulation

Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

LLTD – Link Layer Topology Discovery Protocol

Gomor released a LLTD (Link Layer Topology Discovery Protocol) implementation written in Perl (using Net::Frame framework). You may use this two modules to write fuzzers, or anything. You can find the modules here: Net Frame LLTD

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Programming | Add a Comment

DNS Brute Force eXtract – WS-DNS-BFX

There is another option for DNS Brute Forcing which uses threads, so may be faster than TXDNS 2.0 which we posted about recently. What does it do? This program was written to extract valid hosts of a domain that deny zone transfers. The program supports: IPv4 => IP Address of 32 bits. IPv6 => IP […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

JBroFuzz 0.5 from OWASP – Stateless Network Protocol Fuzzer

OWASP JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. Written in Java, it allows for the identification of certain classess of security vulnerabilities, by means of creating malformed data and having the network protocol in question consume the data. The purpose of this application is to provide a […]

Tags: , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Hackers Attack Root Servers and Slow Internet Key Traffic

Well at least it shows the Internet is not very susceptible to such attacks due to its distributed nature, even if the root nameservers are down, the DNS system still functions. This was a pretty heavy attack though and the most significant in the past 5 years or so, someone testing their ego I guess. […]

Tags: , , , , , , , , ,

Posted in: General News, Network Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·