It seems like the formidable Anonymous army has managed to change the weighting of stats collected by the Web Hacking Incident Database (WHID) with it’s vast array of DDoS attacks. We’ve reported on a couple of them like back in December when the WikiLeaks Attacks Caused Rival DDoS Retaliation. There have been a whole lot […]
Networking Hacking Tools
Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment.
Examples of network hacking tools include Kismet – Wireless Network Hacking, Sniffing & Monitoring, THC-Hydra – The Fast and Flexible Network Login Hacking Tool, Infernal Twin Updated 2.6.11 – Automated Wireless Hacking Suite and Firesheep – Social Network Session Stealing/Hijacking Tool.
Network hacking would also include WLAN hacking, wifi hacking, wireless hacking, Cisco hacking and so on which would rely on various different types of network hacking software.
Types of Networking Hacking
In this day and age, pretty much all hacking takes place across some kind of network (be it a private network or LAN, the public Internet, a darknet, public radio networks or any other kind).
You can find the best resources and networking hacking tools below.
PacketFence – Free, Open Source Network Access Control (NAC) System
PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, 802.1X support, layer-2 isolation of problematic devices, integration with the Snort IDS and the Nessus vulnerability scanner; PacketFence can be used to effectively […]
Acunetix WVS (Web Vulnerability Scanner) 7 Review – Engine & Scanning Improvements
We wrote our first review of Acunetix WVS 6 back in January 2009 and published an update about the release of Acunetix Web Vulnerability Scanner (WVS) 6.5 in June 2009. The team over at Acunetix have been working hard on version 7 for quite some time and released a new build with added features earlier […]
Mallory – Transparent TCP & UDP Proxy
Mallory is a transparent TCP and UDP proxy. It can be used to get at those hard to intercept network streams, assess those tricky mobile web applications, or maybe just pull a prank on your friend. In more technical terms, Mallory is an extensible TCP/UDP man in the middle proxy that is designed to be […]
Tunisia Running Country Wide Facebook, Gmail & Yahoo! Password Capture
We have mentioned Facebook plenty of times, they have had their fair share of security issues and we have mentioned Tunisia once way back in regards to Internet Repression. It seems like the government of Tunisia have been basically phishing their users with fake versions of login pages for Facebook, Gmail and Yahoo!. It only […]