Saturday, January 26, 2013

INFO Hack Software-Some in my system


http://www.junauza.com/2009/06/10-more-hacking-and-security-software.html?m=1

Linux is a hacker's dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions. I have here a collection of 10 of the best security software tools for Linux. Please always keep in mind that these tools are not meant to harm, but to protect.UPDATE: More security software tools that you should check out.1. John the RipperJohn the Ripper is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others.2. Nmap Nmap is my favorite network security scanner. It is used to discover computers and services on a computer network, thus creating a "map" of the network. Just like many simple port scanners, Nmap is capable of discovering passive services on a network despite the fact that such services aren't advertising themselves with a service discovery protocol. In addition Nmap may be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card.Nmap runs on Linux, Microsoft Windows, Solaris, and BSD (including Mac OS X), and also on AmigaOS. Linux is the most popular nmap platform and Windows the second most popular.3. NessusNessus is a comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems such as:-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.-Misconfiguration (e.g. open mail relay, missing patches, etc).-Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.-Denials of service against the TCP/IP stack by using mangled packetsNessus is the world's most popular vulnerability scanner, estimated to be used by over 75,000 organizations worldwide. It took first place in the 2000, 2003, and 2006 security tools survey from SecTools.Org.4. chkrootkitchkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures and for comparing a traversal of the /proc filesystem with the output of the ps (process status) command to look for discrepancies.It can be used from a "rescue disc" (typically a Live CD) or it can optionally use an alternative directory from which to run all of its own commands. These techniques allow chkrootkit to trust the commands upon which it depend a bit more.There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.5. WiresharkWireshark is a free packet sniffer computer application used for network troubleshooting, analysis, software and communications protocol development, and education. In June 2006, the project was renamed from Ethereal due to trademark issues.The functionality Wireshark provides is very similar to tcpdump, but it has a GUI front-end, and many more information sorting and filtering options. It allows the user to see all traffic being passed over the network (usually an Ethernet network but support is being added for others) by putting the network interface into promiscuous mode.Wireshark uses the cross-platform GTK+ widget toolkit, and is cross-platform, running on various computer operating systems including Linux, Mac OS X, and Microsoft Windows. Released under the terms of the GNU General Public License, Wireshark is free software.6. netcatnetcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.Netcat was voted the second most useful network security tool in a 2000 poll conducted by insecure.org on the nmap users mailing list. In 2003, it gained fourth place, a position it also held in the 2006 poll.The original version of netcat is a UNIX program. Its author is known as *Hobbit*. He released version 1.1 in March of 1996.Netcat is fully POSIX compatible and there exist several implementations, including a rewrite from scratch known as GNU netcat.7. KismetKismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b and 802.11g traffic.Kismet is unlike most other wireless network detectors in that it works passively. This means that without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients, and associate them with each other.Kismet also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks.8. hpinghping is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de facto tools for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the Nmap Security Scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in very short time.Like most tools used in computer security, hping is useful to both system administrators and crackers (or script kiddies).9. SnortSnort is a free and open source Network Intrusion prevention system (NIPS) and network intrusion detection (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks.Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other software such as SnortSnarf, sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data. With patches for the Snort source from Bleeding Edge Threats, support for packet stream antivirus scanning with ClamAV and network abnormality with SPADE in network layers 3 and 4 is possible with historical observation.10. tcpdumptcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.In some Unix-like operating systems, a user must have superuser privileges to use tcpdump because the packet capturing mechanisms on those systems require elevated privileges. However, the -Z option may be used to drop privileges to a specific unprivileged user after capturing has been set up. In other Unix-like operating systems, the packet capturing mechanism can be configured to allow non-privileged users to use it; if that is done, superuser privileges are not required.The user may optionally apply a BPF-based filter to limit the number of packets seen by tcpdump; this renders the output more usable on networks with a high volume of traffic.Do you have a favorite security software tool for Linux? Feel free to comment and tell us about it. Random Entries: Hacking Windows Passwords

Related Posts:

9 Exciting Features Fedora 18 Has To OfferHow To Quickly Secure A CentOS Web ServerBest Finance Software for UbuntuBest Movie Collection Managers For LinuxHow Windows 8 has opened up a Window for Linux World Domination9 Exciting Features Fedora 18 Has To OfferTop 5 War-Based Games For AndroidHow To Quickly Secure A CentOS Web ServerBest Finance Software for UbuntuBest Movie Collection Managers For LinuxLINUX, SOFTWARE | 

66 Response to "10 Best Security Software Tools for Linux"

Anonymous Said,July 2, 2008 at 7:26 AMPlease do not list PuTTY, you are right in saying that it is a Windows tool, but for any other platform other than Windows using real `ssh` is much better and much more powerfulAnonymous Said,July 2, 2008 at 10:12 AMMissing curl and nc.C.J. Steele Said,July 2, 2008 at 11:17 AMas a professional pen-test, I was a bit disappointed that you missed netcat (`nc`), which is one of the most useful tools in my bag. Also another one that should be included is `amap`, or my own application mapper pyScout (intertrusion.com/files/).Nikesh Jauhari Said,July 2, 2008 at 1:27 PM1) chkrootkit is not a hacking software, it's used for checking the rootkit.2) How can you put putty as a hacking software3)Anonymous Said,July 2, 2008 at 3:48 PMYou should also add NETBIOS nameserver scanner to the listAnonymous Said,July 2, 2008 at 5:20 PMnetcat missed :(TiM Said,July 2, 2008 at 5:39 PMchkrootkit is a security tool so it should be included. I agree, netcat should have been on the list. But there are plenty of great hacking tools listed here that are better than netcat.SouL ReBeL Said,July 2, 2008 at 6:10 PMadd nc, remove putty.Anonymous Said,July 2, 2008 at 6:16 PMs/nc|netcat/socat/and you're about right.Anonymous Said,July 2, 2008 at 7:12 PMEchoing the comments about choices of what's in or not in the list, but I know such lists are always subjective. One thing, though, isn't subjective -- how are these "Linux" (just leave out the BSDs and Solaris) tools when just about every single one listed will also work for the OS about 92% of the world already uses? From now on, I disregard lists that mention one specific OS because 99% of the time I'll be able to use the applications or utilities listed on any OS. Including Windows (with or without cygwin).Anonymous Said,July 2, 2008 at 10:40 PMNikto is very usefull tooComputer Help Said,July 3, 2008 at 12:14 AMThanks for sharing this info. I found it very usefull.Anonymous Said,July 3, 2008 at 12:17 AMI think rkhunter is a better tool then chkrookit. Also you should replace netcat for putty.skeedunt Said,July 3, 2008 at 12:28 AMPutty? Wtf? What about something useful like webscarab for hacking websites? Putty? I don't get it...jun auza Said,July 3, 2008 at 1:42 AMChanged Putty to netcat. Thank you for the suggestion.Cheers!Anonymous Said,July 3, 2008 at 7:45 AMRegarding the comment above where someone got in a huff because the author uses the word 'Linux':Big deal, just because he's saying that these tools are good linux hacking tools doesn't mean he's saying that they don't work on other OS's.I for one would never dream of using any other OS than Linux for my hacking needs. It is far more flexible. Plus with great distrobutions like BackTrack, why would you need anything else.Anonymous Said,July 4, 2008 at 1:06 AMettercap. i could teach my cat to steal your password with it.Anonymous Said,July 4, 2008 at 1:09 AMWhat about ettercap?Anonymous Said,July 4, 2008 at 2:02 AMtripwireAnonymous Said,July 4, 2008 at 2:27 AMThis list really sucks.Anonymous Said,July 4, 2008 at 2:31 AMThose are all good tools but I would be very careful about using some of these after reading The Truth about Linux.I really don't want to use infringing software that will just make all the work I do property of the Microsoft Corporation and any other IP holders. Scary stuff.Kyle T Said,July 4, 2008 at 2:35 AMI'm really surprised to find that orfcrack was not in one of the top 5 it have yet to fail me in cracking a simple password on a xp machine. It comes with its own gui and the program basically runs it selfAnonymous Said,July 4, 2008 at 7:22 AMaircrack-ng is pretty cool, tooAnonymous Said,July 4, 2008 at 11:09 PMOne of these posts leads you (through a link) to a website with a virus on it. If you are surfing on a Windows computer, be very very careful. If you are a Linux user and love security, have a good day.raxso Said,July 6, 2008 at 1:54 AMThese are all great tools if being used properly... i also used this tools for security auditing...anirudh Said,July 6, 2008 at 3:09 PMgreatest tools. way to go, if one masters them :) liked it ..diggedsapran Said,July 8, 2008 at 6:07 PM1. aircrack-ng is a perfect wireless traffic analysis tool, kismet just monitors wifi activity2. rkhunter competes chkrootkit very wellRazi Shaban Said,July 9, 2008 at 11:36 PMLinux,you say. Kinda funny that most of these tools run on windows too.Nima Said,July 28, 2008 at 2:15 AMInformation Security Software ToolsFree software tools commonly used by information security expertshttp://cryptoexperts.blogspot.comAnonymous Said,July 29, 2008 at 1:33 AMHow does one block booting it is really annoying and can be very bothersome?Anonymous Said,August 21, 2008 at 11:12 AMHow can you leave out Metasploit. It is one powerful tool that makes security testing insanly easy.Anonymous Said,September 22, 2008 at 11:40 PMOMG that little penguin dude is so cute, I must have one.Lisawww.anonymize.us.tcAnonymous Said,September 22, 2008 at 11:42 PM*cough *cough tripwireThis list is weak.How in the hell could you forget tripwire?Anonymous Said,September 22, 2008 at 11:49 PMNo ettercap?lvcargnini Said,September 22, 2008 at 11:58 PMSnort Free ? Is this info correct ?Anonymous Said,September 23, 2008 at 12:53 AMmetasploit ?Anonymous Said,September 23, 2008 at 1:23 AMThe truth about linux is a load of shit. Windows stole the basis for there system of the Mac, Mac is what was amde first, and then Microsoft stole over half of these new findings and used them for themselves, so who cares what linux has done to rip them off. Also, Windows Vista has stolen technologies and layouts usedin Linux Ubuntu. Microsoft have taken more than there share from others, so no one can say people are stealing there ideas so dont use anything else, it's tht simple. Really!!!!Anonymous Said,September 23, 2008 at 1:54 AMWhoever posted that link to the "Truth About Linux", CHECK YOUR SOURCES. That article is complete and utter BS. At the time of this post, the link to whatever so-called "proof" that they have, is an error 404!! PROOF NOT FOUND.Anonymous Said,September 23, 2008 at 1:55 AMWhoever posted that link to the "Truth About Linux", CHECK YOUR SOURCES. That article is complete and utter BS. At the time of this post, the link to whatever so-called "proof" that they have, is an error 404!! PROOF NOT FOUND.Anonymous Said,September 23, 2008 at 10:59 AMI am glad I am not the only one that thinks so.I posted message: Semptember 23 2008 1:23 AMRead that before you believe any of the Linux crap you read. Linux is a true operating system who may or may not have infringed other Os's. But seriousley, Who hasn't infringed another OS??? It's just the way it is. none the less, Linux kicks ass and windows doesnt, there just peed off that there the big name and cant do as good a job, there twat plane and simple. Peace out.Danny boyKeith Said,September 23, 2008 at 1:49 PMI would have to say there are more than just few applications in Linux that allows users to perform specialised tasks.Nonethless, thanks for these few suggestions. I certainly have not come across some of them.Anonymous Said,September 23, 2008 at 11:33 PMHave you ever even used BackTrack? This list is sad.were Said,September 24, 2008 at 3:16 PMShare some security tools and knowledgehttp://werew01f.blogspot.comlwayar Said,September 25, 2008 at 6:53 PMMetasploitEthercapAircrack-ngSamhaimhttp://www.retronet.com.arAnonymous Said,September 29, 2008 at 2:28 PM"The Truth About Linux" is a troll. She's been posting that link all over the place for months. Probably a paid microsoftie.Anonymous Said,October 13, 2008 at 9:30 PMNo, The Truth About Linux is a JOKE, Click the Contact link at the end of the article. But it gets everyone scared. I'd troll it too just to freak people outsuperc0w Said,November 21, 2008 at 3:51 AMno urlsnarf? serious used it TODAY.SANDRIMEDA Said,February 5, 2009 at 6:25 PMvery good post, tnx!Peter Said,July 22, 2009 at 8:47 AMw3afopenvasDiamond Dave Said,August 29, 2009 at 7:44 AMIgnorate about hacking. How can I track an IP address to the exact location? Also, if someone wanted to learn more about hacking in general, is there a basic program to start with (or am I real stupid and "See list above")Anonymous Said,August 31, 2009 at 9:53 AMHACKERS BEWARE OF SPY BOT SEARCH AND DESTROY.YOU WILL BE SORRY.Anonymous Said,September 10, 2009 at 8:08 AMthese programs are very old my friend!!!why don't you tell us about the new one already used them all except for hiping and snortAnonymous Said,October 4, 2009 at 4:02 PMI agree :Metasploit EthercapAircrack-ngSamhaimmust to be included !Anonymous Said,October 18, 2009 at 12:50 AMok but there is any hacking software avilable on the net ?????Anonymous Said,January 7, 2010 at 11:41 PMi thing.... to crack software o windows is .... hex editor ... one u all can find on google....... and...its simple too....and. ethercap is must..Anonymous Said,February 18, 2010 at 12:36 PM"Linux,you say.Kinda funny that most of these tools run on windows too."That's what they call "cross-platform" applications.ShellShock Said,April 17, 2010 at 11:19 PMYou really should list Aircrack-ng... :|Anonymous Said,May 12, 2010 at 3:46 PMahehehehe..nice.. i know someone from bohol he is a terrible hacker. a.k.a SKULL do you know him?dog tags for dogs Said,December 10, 2010 at 10:50 AMI'm really surprised to find that orfcrack was not in one of the top 5 it have yet to fail me in cracking a simple password on a xp machine. It comes with its own gui and the program basically runs it selfFeri Hasrijal Said,January 20, 2011 at 9:18 AMhufffff....lolAnonymous Said,April 14, 2011 at 6:56 PMVisit www.computersecurity007.blogspot.com and download the free But Professional Hacking course then all of u know which hacking softwares are used by hackers and how they Conduct Penetration Test in networks and how to hack every thing so enjoy.............................Anonymous Said,April 16, 2011 at 2:07 AMThat website thats criticizing Linux so much is actually running Linux. I confirmed it using Xprobe2, which I think should be put onto that list of hacking tools.flakefrost Said,June 21, 2011 at 3:52 PMkismet is awesome :)Anonymous Said,July 24, 2011 at 9:38 PMhey who farted?imamz Said,February 23, 2012 at 1:51 PMwhan happened????Anonymous Said,March 17, 2012 at 4:16 AMwe.use.these

Post a Comment

NEXTPREVIOUSHome  RecentFeatured PostsCategories9 Exciting Features Fedora 18 Has To OfferTop 5 War-Based Games For AndroidHow To Quickly Secure A CentOS Web ServerBest Finance Software for UbuntuBiggest Apple Blunders that Made Android ShineBest Movie Collection Manag


--
Sent from hacked phone

No comments:

Post a Comment