Last week the Dyn DNS DDoS took out most of the East coast US websites including monsters like Spotify, Twitter, Netflix, Github, Heroku and many more. Hopefully it wasn’t because I shared the Mirai source code and some script kiddies got hold of it and decided to take half of the US websites out. A […]
Networking Hacking Tools
Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment.
Examples of network hacking tools include Kismet – Wireless Network Hacking, Sniffing & Monitoring, THC-Hydra – The Fast and Flexible Network Login Hacking Tool, Infernal Twin Updated 2.6.11 – Automated Wireless Hacking Suite and Firesheep – Social Network Session Stealing/Hijacking Tool.
Network hacking would also include WLAN hacking, wifi hacking, wireless hacking, Cisco hacking and so on which would rely on various different types of network hacking software.
Types of Networking Hacking
In this day and age, pretty much all hacking takes place across some kind of network (be it a private network or LAN, the public Internet, a darknet, public radio networks or any other kind).
You can find the best resources and networking hacking tools below.
mitmproxy – Intercepting HTTP Proxy Tool aka MITM
mitmproxy is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers. It’s a console tool that allows interactive examination and modification of HTTP traffic. It differs from mitmdump in that all flows are kept in memory, which means that it’s intended for taking and manipulating small-ish samples. The command-line companion called mitmdump […]
MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool
MANA Toolkit is a set of tools for rogue access point (evilAP) attacks and wireless MiTM. More specifically, it contains the improvements to KARMA attacks implemented into hostapd, as well as some useful configs for conducting MitM once you’ve managed to get a victim to connect. Contents MANA Toolkit contains: kali/ubuntu-install.sh – simple installers for […]
Two Israeli Men Arrested For Running VDoS-s.com DDoS Service
DDoS or Booter services have been around for a while, but VDoS-s.com was a particularly slick (and shameless) one with a content marketing strategy and active social media accounts. Two Israeli men were arrested for running the service after ironically being hacked by a security researcher. They called their service a ‘Stresser’ and claimed to […]
DET – Data Exfiltration Toolkit
DET is a proof of concept Data Exfiltration Toolkit using either single or multiple channel(s) at the same time. The idea behind DET was to create a generic tool-kit to plug any kind of protocol/service to test implemented Network Monitoring and Data Leakage Prevention (DLP) solutions configurations, against different data exfiltration techniques. Features DET already […]