Archive | Network Hacking

Fake NetBIOS Tool – Simulate Windows Hosts

Some cool free tools made by folks from the French Honeynet Project. FakeNetBIOS is a family of tools designed to simulate Windows hosts on a LAN. The individual tools are: FakeNetbiosDGM (NetBIOS Datagram) FakeNetbiosNS (NetBIOS Name Service) Each tool can be used as a standalone tool or as a honeyd responder or subsystem. FakeNetbiosDGM sends […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment

Trinity Rescue Kit – Free Recovery and Repair for Windows

Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. It is possible to boot TRK in three different ways: As a bootable CD which you can burn yourself from a downloadable isofile From a […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Linux Hacking, Network Hacking | Add a Comment

stealth techniques – syn

Or half-open scanning technique is the first of three to come series about stealth scanning… The other two are Xmas/Fin/Null and idle/zombie scan techniques… Intro This is a series of three to come articles about stealth scanning, everything that I am going to present is hping oriented so if you want to learn this techniques […]

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment

Sguil – Intuitive GUI for Network Security Monitoring with Snort

Sguil (pronounced sgweel) is probably best described as an aggregation system for network security monitoring tools. It ties your IDS alerts into a database of TCP/IP sessions, full content packet logs and other information. When you’ve identified an alert that needs more investigation, the sguil client provides you with seamless access to the data you […]

Tags: , , , , , , , , , , ,

Posted in: Countermeasures, Linux Hacking, Network Hacking, Security Software | Add a Comment

Technitium Free MAC Address Changer v4.5 Released

Technitium MAC Address Changer v4.5 has been released. Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Foundstone Blast – TCP Network Service Stress Test Tool

Foundstone Blast v2.0 is a small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers. Features: /trial switch adds the ability to see how the buffer looks before sending it /v switch adds verbose option – off by default […]

Tags: , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Nemesis – Packet Injection Suite

Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting. Nemesis can natively craft and inject packets for: ARP […]

Tags: , , , , , ,

Posted in: Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment

Cisco IOS FTP Backdoor Ripe for Hackers

Another flaw in Cisco’s IOS, this time a problem with FTP, the mechanism used to update the firmware on Cisco devices (routers & switches mostly). You really don’t want someone playing around with your configuration files on your router do you? IOS FTP, which comes disabled by default in IOS, is used to upload IOS […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Network Hacking | Add a Comment

ISIC – IP Stack Integrity & Stability Checker

ISIC is a suite of utilities to exercise the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It generates piles of pseudo random packets of the target protocol. The packets be given tendencies to conform to. Ie 50% of the packets generated can have IP Options. 25% of the […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Programming | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·