PBNJ is a network tool that can be used to give an overview of an machine or multiple machines by identifying the details about the services running on them. PBNJ is different from other tools because it is based on using a scan from nmap parsed to amap. PBNJ parses the data from a scan [...]
Tag Archive | "Hacking Tools"
Packet sniffing goes hi-tech? What’s wrong with ethereal? The equipment that technician Mark Klein learned was installed in the National Security Agency’s “secret room” inside AT&T’s San Francisco switching office isn’t some sinister Big Brother box designed solely to help governments eavesdrop on citizens’ internet communications. Rather, it’s a powerful commercial network-analysis product with all [...]
SecureDVD is a DVD with the 10 Best Security related Live CD’s. Yes that’s right, they authored this DVD based on the recommendations made by Darknet! Now you can have all your favorite CDs ‘compiled’ into a single DVD. I love this idea. SecureDVD is available to download, but due to it’s size, only in [...]
1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to [...]
1. BackTrack The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix). BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying [...]
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts [...]