Proxocket is a dll proxy project for the main Winsock functions which allows to capture any type of packet and data sent/received by a specific software of your choice and optionally modifying its content or the connect, bind and accept functions through a custom dll very easy to create. Proxocket handles the following functions for […]
Networking Hacking Tools
Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment.
Examples of network hacking tools include Kismet – Wireless Network Hacking, Sniffing & Monitoring, THC-Hydra – The Fast and Flexible Network Login Hacking Tool, Infernal Twin Updated 2.6.11 – Automated Wireless Hacking Suite and Firesheep – Social Network Session Stealing/Hijacking Tool.
Network hacking would also include WLAN hacking, wifi hacking, wireless hacking, Cisco hacking and so on which would rely on various different types of network hacking software.
Types of Networking Hacking
In this day and age, pretty much all hacking takes place across some kind of network (be it a private network or LAN, the public Internet, a darknet, public radio networks or any other kind).
You can find the best resources and networking hacking tools below.
NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool
NiX Brute Forcer is a tool that uses brute force in parallel to log into a system without having authentication credentials beforehand. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of NiX is to support a variety of services that allow remote authentication such as: MySQL, SSH, FTP, IMAP. […]
Mausezahn – Fast Traffic Generator/Packet Crafting Tool
Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. It is mainly used to test VoIP or multicast networks but also for security audits to check whether your systems are hardened enough for specific attacks. Mausezahn can be used for example: As traffic […]
Inguma Is Back – The Penetration Testing & Vulnerability Research Toolkit
Inguma is back and being actively developed again. It’s been quite a long time, far too long in fact. We first reported about Inguma way back in 2007 and our latest mention of it was in March 2008. A new version has just been released almost 3 years later with some major changes and a […]
BlackSheep – Detect Users Of FireSheep On The Network
As you surely know, things blew up recently at Toorcon 12 with the release of the much talked about Firefox plugin called Firesheep. There were various discussions about how to mitigate against it like using Firefox plug-ins to force SSL connections (where available). Microsoft also tried to secure Hotmail with SSL but kinda b0rked that […]