[ad] This little, but very useful program, try to sends ICMP packet out the LAN, and detect all the host that allow it. Whit this you can find bugs in your (company?) network ( or others), for example hosts that allow p2p connections. Explanation When we use a Gateway, we send the packets with IP […]
Networking Hacking Tools
Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment.
Examples of network hacking tools include Kismet – Wireless Network Hacking, Sniffing & Monitoring, THC-Hydra – The Fast and Flexible Network Login Hacking Tool, Infernal Twin Updated 2.6.11 – Automated Wireless Hacking Suite and Firesheep – Social Network Session Stealing/Hijacking Tool.
Network hacking would also include WLAN hacking, wifi hacking, wireless hacking, Cisco hacking and so on which would rely on various different types of network hacking software.
Types of Networking Hacking
In this day and age, pretty much all hacking takes place across some kind of network (be it a private network or LAN, the public Internet, a darknet, public radio networks or any other kind).
You can find the best resources and networking hacking tools below.
Haraldscan – BlueTooth Discovery Scanner
[ad] I thought a while ago about posting some stuff on Bluetooth hacking, but never got round to it. Have posted a couple of new articles on Bluetooth but haven’t yet posted any tools. So let’s start with Haraldscan – a Bluetooth discovery scanner. The scanner will be able to determine Major and Minor device […]
Cisco & Microsoft Patch TCP Stack DoS Exploit
[ad] A fairly serious flaw that was announced in October 2008 by Outpost24 (and apparently discovered way back in 2005), has finally been patched by the major players Cisco and Microsoft. So far Redhat has offered a workaround for the flaw and Juniper has responded that their equipment is not vulnerable. It could be that […]
Trafscrambler – Anti-sniffer/IDS Tool
[ad] Trafscrambler is an anti-sniffer/IDS LKM(Network Kernel Extension) for OSX, licensed under BSD. Features Injection of packets with bogus data and with randomly selected bad TCP cksum or bad TCP sequences Userland binary(tsctrl) for controlling trafscrambler NKE SYN decoy – sends out number of SYN pkts before the original SYN pkt TCP reset attack – […]
Twitter Being Used As Botnet Command Channel
[ad] Ah Twitter in the news again, the bad guys sure do keep up with new trends. After being taken offline for a while by a Joejob DDoS attack Twitter is in the news again – this time it’s being used as the command channel for a Botnet. The normal method for controlling Botnets is […]