'penetration'에 해당되는 글 5건

  1. 2010.12.17 PT FrameWork by CEOinIRVINE
  2. 2009.10.08 How much does a penetration test cost? by CEOinIRVINE
  3. 2009.09.04 Penetration Testing Service by CEOinIRVINE
  4. 2008.12.04 Security Job by CEOinIRVINE
  5. 2008.12.04 Penetration Tester by CEOinIRVINE

PT FrameWork

Hacking 2010. 12. 17. 08:56
Posted by CEOinIRVINE
l

How much does a penetration test cost?

The cost of a pen test depends on the skill of the testers you engage and the size of the application.

Having said that, we have seen wide variation in pricing – from $5,000 to $50,000. And the higher prices don’t always mean higher quality.

At Plynt, we constantly strive to reduce our costs and pass on part of those benefits to you. Drop us a mail or contact me to get a quote for a security test.

'Hacking' 카테고리의 다른 글

Hacking  (0) 2009.10.28
What tools do you use to test applications?  (0) 2009.10.08
AVA Hacks  (1) 2009.10.02
Regarding Online Game Security  (0) 2009.10.02
Flaw In Sears Website Left Database Open To Attack  (0) 2009.09.04
Posted by CEOinIRVINE
l

Let me know if you need security consulting service including penetration testings, system security checks and etc.

:)

counterhacker@gmail.com
Posted by CEOinIRVINE
l

Security Job

Hacking 2008. 12. 4. 12:41

Rank 544 658
Rank change on same period last year Up+114
Matching permanent IT job ads 331 333
As % of all UK permanent IT job ads sampled 0.222 % 0.151 %
As % of the category below 0.378 % 0.273 %
Salaries quoted 260 245
Average minimum salary £49,504 £47,462
Average salary £55,087 £53,437
% change on same period last year +3.08 %
Average maximum salary £60,670 £59,412
UK excluding London average salary £53,532 £52,738
% change on same period last year +1.50 %
IT Job Market, Processes & Methodologies Processes & Methodologies
UK
Matching permanent IT job ads 87580 122189
As % of all UK permanent IT job ads sampled 58.83 % 55.45 %
Salaries quoted 73512 98005
Average minimum salary £42,973 £44,478
Average salary £46,983 £48,593
% change on same period last year -3.31 %
Average maximum salary £50,994 £52,707
UK excluding London average salary £42,938 £44,651
% change on same period last year -3.83 %

Penetration Testing
Demand Trend

The chart provides the 3-month moving total beginning in 2004 of permanent IT jobs citing Penetration Testing within the UK as a proportion of the total demand within the Processes & Methodologies category.

Penetration Testing Demand Trend

Penetration Testing
Salary Trend

The chart provides the 3-month moving average for salaries quoted in permanent IT jobs citing Penetration Testing within the UK.

Penetration Testing Salary Trend

Penetration Testing
Salary Histogram

The chart provides a salary histogram for IT jobs citing Penetration Testing over the 3 months to 3 December 2008 within the UK.

Penetration Testing Salary Histogram

Penetration Testing
Top 30 Job Locations

The table below looks at the demand and provides a guide to the average salaries quoted in IT jobs citing Penetration Testing within the UK over the 3 months to 3 December 2008. The 'Rank Change' column provides an indication of the change in demand within each location based on the same 3 month period last year. A positive number indicates a relative increase in demand.

Location Rank Change
on Same Period
Last Last
Matching
Permanent
IT Job Ads
Average Salary
Last 3 Months
Average Salary
% Change
on Same Period
Last Year
England Up+137 312 £55,205 +7.46 %
South East Up+122 98 £58,093 +17.60 %
London Up+79 94 £58,864 +8.30 %
West Sussex New entry- 41 £66,220 -
Gatwick New entry- 41 £66,220 -
North West Up+28 31 £43,542 -10.44 %
Manchester Up+17 28 £43,571 -9.15 %
South West Up+18 24 £47,250 -24.40 %
Yorkshire Up+41 23 £42,900 +7.79 %
West Yorkshire Up+22 21 £42,375 +6.47 %
Berkshire Up+56 18 £51,885 -20.48 %
City of London Down-12 17 £57,917 +27.16 %
West Midlands Up+18 15 £48,889 +33.94 %
East of England Up+46 14 £51,727 +18.00 %
Hampshire Up+26 14 £43,846 +3.77 %
Somerset Down-24 13 - -
Bath Down-26 13 - -
Leeds Up+20 11 £41,667 +4.69 %
Surrey Up+44 9 £50,056 +2.85 %
Hammersmith New entry- 8 £37,500 -
Staffordshire Up+9 7 £48,333 -
Worcestershire New entry- 5 - -
Cambridge Up+15 5 £45,000 +23.71 %
Canary Wharf New entry- 5 £69,000 -
Essex New entry- 5 £61,000 -
Cambridgeshire Up+26 5 £45,000 +23.71 %
Hertfordshire Up+15 4 £43,000 -26.80 %
Reading Up+6 4 £46,250 -33.24 %
Cheltenham New entry- 4 £45,000 -
Watford New entry- 4 £43,000 -

Penetration Testing
Top 30 Related IT Skills

For the 6 months to 3 December 2008, IT jobs within the UK citing Penetration Testing also mentioned the following IT skills in order of popularity. The figures indicate the number of jobs and their proportion against the total number of IT job ads sampled that cited Penetration Testing.

1 212 (29.65 %) Information Security
2 210 (29.37 %) CISSP
3 183 (25.59 %) Network Security
4 174 (24.34 %) Firewall
5 129 (18.04 %) Finance
6 124 (17.34 %) Security Testing
7 113 (15.80 %) Degree
8 101 (14.13 %) Cisco
9 99 (13.85 %) UNIX
10 90 (12.59 %) TCP/IP
11 88 (12.31 %) ISO27001
12 86 (12.03 %) PCI DSS
13 85 (11.89 %) Security Cleared
14 81 (11.33 %) Windows
15 76 (10.63 %) Risk Assessment
16 72 (10.07 %) Linux
17 71 (9.930 %) Microsoft
17 71 (9.930 %) Government
18 66 (9.231 %) Security Management
18 66 (9.231 %) Internet
19 65 (9.091 %) Ethical Hacking
20 64 (8.951 %) SC Cleared
21 62 (8.671 %) Perl
22 61 (8.531 %) Risk Management
23 60 (8.392 %) Java
24 59 (8.252 %) VPN
25 54 (7.552 %) Cisco Certification
26 51 (7.133 %) CheckPoint
26 51 (7.133 %) Telecoms
27 49 (6.853 %) CISM

Penetration Testing
Top Related IT Skills by Category

For the 6 months to 3 December 2008, IT jobs within the UK citing Penetration Testing also mentioned the following IT skills grouped by category. The figures indicate the number of jobs and their proportion against the total number of IT job ads sampled that cited Penetration Testing. Up to 20 skills are shown per category.

IT Job Market, Application DevelopmentApplication Development
1 34 (4.755 %) .NET
2 20 (2.797 %) CSS
2 20 (2.797 %) Ruby on Rails
3 16 (2.238 %) ASP.NET
4 12 (1.678 %) WebServices
5 7 (0.979 %) XML
6 6 (0.839 %) JSP
7 5 (0.699 %) WebSphere
8 4 (0.559 %) Java ME
8 4 (0.559 %) AJAX
9 3 (0.420 %) Spring
9 3 (0.420 %) SOAP
9 3 (0.420 %) Struts
9 3 (0.420 %) J2EE
9 3 (0.420 %) ASP
10 2 (0.280 %) HTML
10 2 (0.280 %) Java SE
10 2 (0.280 %) FIX Protocol
10 2 (0.280 %) CGI
10 2 (0.280 %) LAMP
IT Job Market, Application PlatformsApplication Platforms
1 7 (0.979 %) IIS
2 4 (0.559 %) MS Exchange
2 4 (0.559 %) WebLogic
3 3 (0.420 %) Apache
3 3 (0.420 %) SharePoint
4 1 (0.140 %) ColdFusion
4 1 (0.140 %) Exchange Server 2003
IT Job Market, ApplicationsApplications
1 17 (2.378 %) MS Excel
2 15 (2.098 %) MS Office
IT Job Market, Communications & NetworkingCommunications & Networking
1 183 (25.59 %) Network Security
2 174 (24.34 %) Firewall
3 90 (12.59 %) TCP/IP
4 66 (9.231 %) Internet
5 59 (8.252 %) VPN
6 44 (6.154 %) Intrusion Detection
7 40 (5.594 %) LAN
8 33 (4.615 %) Wireless
9 32 (4.476 %) VoIP
10 31 (4.336 %) WAN
11 27 (3.776 %) Cisco PIX
12 23 (3.217 %) NetScreen
13 18 (2.517 %) LDAP
14 17 (2.378 %) H.323
14 17 (2.378 %) Cisco IOS
15 16 (2.238 %) IPsec
15 16 (2.238 %) SSL
15 16 (2.238 %) WLAN
16 15 (2.098 %) HTTP
17 12 (1.678 %) FTP
IT Job Market, Database & Business IntelligenceDatabase & Business Intelligence
1 49 (6.853 %) GIS
2 36 (5.035 %) SQL Server
3 20 (2.797 %) MySQL
4 15 (2.098 %) DB2
5 11 (1.538 %) Oracle 8/8i
IT Job Market, Development ApplicationsDevelopment Applications
1 17 (2.378 %) Paros
1 17 (2.378 %) Metasploit
2 5 (0.699 %) AppScan
3 3 (0.420 %) LoadRunner
4 2 (0.280 %) Rational Robot
4 2 (0.280 %) JMeter
4 2 (0.280 %) QuickTest Pro
4 2 (0.280 %) SilkTest
4 2 (0.280 %) QARun
4 2 (0.280 %) WATIR
4 2 (0.280 %) Selenium
4 2 (0.280 %) WebLOAD
4 2 (0.280 %) FitNesse
IT Job Market, GeneralGeneral
1 129 (18.04 %) Finance
2 71 (9.930 %) Government
3 51 (7.133 %) Telecoms
4 49 (6.853 %) Banking
5 44 (6.154 %) Auditing
6 31 (4.336 %) Financial Institution
7 25 (3.497 %) Insurance
8 20 (2.797 %) FMCG
9 17 (2.378 %) Health
10 13 (1.818 %) Education
10 13 (1.818 %) Investment Banking
10 13 (1.818 %) Pensions
11 9 (1.259 %) Legal
12 7 (0.979 %) Home Office
12 7 (0.979 %) International Banking
13 6 (0.839 %) Online Betting
13 6 (0.839 %) Games
14 4 (0.559 %) Retail
15 3 (0.420 %) Military
16 2 (0.280 %) Publishing
IT Job Market, Job TitlesJob Titles
1 214 (29.93 %) Consultant
2 134 (18.74 %) Tester
3 129 (18.04 %) Penetration Tester
4 95 (13.29 %) Security Manager
5 90 (12.59 %) Security Consultant
6 76 (10.63 %) Analyst
7 70 (9.790 %) Security Analyst
8 39 (5.455 %) IT Security Manager
9 36 (5.035 %) Security Specialist
10 29 (4.056 %) Senior Consultant
11 26 (3.636 %) Security Engineer
12 24 (3.357 %) Team Leader
13 22 (3.077 %) Information Manager
14 21 (2.937 %) Test Consultant
14 21 (2.937 %) Developer
15 20 (2.797 %) Operations Analyst
15 20 (2.797 %) Internet Developer
16 18 (2.517 %) Senior Analyst
16 18 (2.517 %) Applications Tester
17 15 (2.098 %) Senior Security Analyst
IT Job Market, MiscellaneousMiscellaneous
1 45 (6.294 %) Computer Science
2 35 (4.895 %) CESG
3 24 (3.357 %) Management Information System
4 20 (2.797 %) PKI
5 19 (2.657 %) Biometrics
6 18 (2.517 %) Data Protection Act
7 16 (2.238 %) Cryptography
8 12 (1.678 %) Mainframe
9 10 (1.399 %) Client/Server
10 8 (1.119 %) CESG CLAS
11 6 (0.839 %) French Language
12 3 (0.420 %) German Language
13 2 (0.280 %) Italian Language
13 2 (0.280 %) Russian Language
13 2 (0.280 %) Spanish Language
13 2 (0.280 %) IBM Mainframe
13 2 (0.280 %) iSeries
13 2 (0.280 %) SecurID
14 1 (0.140 %) Clustering
14 1 (0.140 %) N-Tier
IT Job Market, Operating SystemsOperating Systems
1 99 (13.85 %) UNIX
2 81 (11.33 %) Windows
3 72 (10.07 %) Linux
4 26 (3.636 %) Solaris
5 9 (1.259 %) Windows Server 2003
6 4 (0.559 %) Windows XP
6 4 (0.559 %) AIX
7 3 (0.420 %) HPUX
8 1 (0.140 %) Windows 2000
8 1 (0.140 %) Windows NT
8 1 (0.140 %) Windows Server 2008
IT Job Market, Processes & MethodologiesProcesses & Methodologies
1 212 (29.65 %) Information Security
2 124 (17.34 %) Security Testing
3 85 (11.89 %) Security Cleared
4 76 (10.63 %) Risk Assessment
5 66 (9.231 %) Security Management
6 65 (9.091 %) Ethical Hacking
7 64 (8.951 %) SC Cleared
8 61 (8.531 %) Risk Management
9 44 (6.154 %) Business Continuity
10 39 (5.455 %) Identity Management
11 35 (4.895 %) Vulnerability Assessment
12 33 (4.615 %) BCP
13 29 (4.056 %) Data Protection
14 26 (3.636 %) Business Development
15 19 (2.657 %) OWASP
15 19 (2.657 %) ITIL
16 18 (2.517 %) Service Delivery
17 17 (2.378 %) OSSTMM
18 16 (2.238 %) Project Management
18 16 (2.238 %) Data Security
IT Job Market, Programming LanguagesProgramming Languages
1 62 (8.671 %) Perl
2 60 (8.392 %) Java
3 37 (5.175 %) C++
4 33 (4.615 %) Python
5 32 (4.476 %) C
6 28 (3.916 %) Ruby
7 24 (3.357 %) JavaScript
7 24 (3.357 %) PHP
8 22 (3.077 %) SQL
9 11 (1.538 %) VB
10 10 (1.399 %) Shell Script
11 8 (1.119 %) C#
12 5 (0.699 %) VBScript
13 2 (0.280 %) DHTML
13 2 (0.280 %) Jython
IT Job Market, QualificationsQualifications
1 210 (29.37 %) CISSP
2 113 (15.80 %) Degree
3 54 (7.552 %) Cisco Certification
4 49 (6.853 %) CISM
5 40 (5.594 %) CEH
6 37 (5.175 %) ISEB
7 31 (4.336 %) CISA
8 21 (2.937 %) CCNA
9 20 (2.797 %) CCNP
9 20 (2.797 %) Microsoft Certification
10 18 (2.517 %) GIAC
11 13 (1.818 %) MCSE
12 12 (1.678 %) CCIE
13 11 (1.538 %) CCSP
13 11 (1.538 %) CCDP
14 8 (1.119 %) CCSE
15 6 (0.839 %) CCSA
16 4 (0.559 %) CHFI
17 2 (0.280 %) SCNA
18 1 (0.140 %) CISMP
IT Job Market, Quality Assurance & ComplianceQuality Assurance & Compliance
1 88 (12.31 %) ISO27001
2 86 (12.03 %) PCI DSS
3 41 (5.734 %) PCI QSA
4 30 (4.196 %) Sarbanes-Oxley
5 15 (2.098 %) COBIT
5 15 (2.098 %) BS7799
6 9 (1.259 %) ISO17799
7 4 (0.559 %) QA
8 1 (0.140 %) HIPAA
8 1 (0.140 %) PABP
8 1 (0.140 %) COSO
IT Job Market, System SoftwareSystem Software
1 32 (4.476 %) Active Directory
2 25 (3.497 %) Nmap
3 17 (2.378 %) ISA Server
4 5 (0.699 %) WebInspect
5 2 (0.280 %) ProxySG
6 1 (0.140 %) Snort
6 1 (0.140 %) Backup Exec
IT Job Market, Systems ManagementSystems Management
1 27 (3.776 %) Nessus
2 15 (2.098 %) CA SiteMinder
3 4 (0.559 %) MOM
4 1 (0.140 %) Systems Management Server (SMS)
4 1 (0.140 %) MAILsweeper
IT Job Market, VendorsVendors
1 101 (14.13 %) Cisco
2 71 (9.930 %) Microsoft
3 51 (7.133 %) CheckPoint
4 44 (6.154 %) Oracle
5 28 (3.916 %) Juniper
6 17 (2.378 %) Nortel
7 12 (1.678 %) Blue Coat
8 11 (1.538 %) HP
9 10 (1.399 %) Symantec
10 9 (1.259 %) Nokia
10 9 (1.259 %) Sybase
11 8 (1.119 %) IBM
12 7 (0.979 %) McAfee Security
13 6 (0.839 %) Crossbeam
14 5 (0.699 %) Reuters
15 3 (0.420 %) VMware
15 3 (0.420 %) WatchGuard
15 3 (0.420 %) IronPort
16 2 (0.280 %) Finjan
16 2 (0.280 %) Websense

'Hacking' 카테고리의 다른 글

Getting Started Reverse Engineering  (0) 2008.12.16
Problems with Penetration Testing  (0) 2008.12.08
Manual Unpacking of UPX Packed PE File  (0) 2008.12.04
General IP Stack Tuning Recommendations  (0) 2008.11.29
Denial of Service Attacks  (0) 2008.11.29
Posted by CEOinIRVINE
l

Penetration Tester

Business 2008. 12. 4. 12:37

1) LOOK at the resume - closely.
Penetration testing isn't just being able to run some tools, exploit some systems, and charge the client for coffee and pizza (although that last item is essential, especially for late night work).

They must be able to:
* write clearly
* spell properly
* convey meaning

These traits are ESSENTIAL in explaining problems and recommending remediation steps in a way that is easily understandable by the client.

Biggest turn-off: All too often I see resumes full of run-on sentences or non-assertive phrases.

2) READ the resume - how do they think?
You might be tempted to skip over the majority of the resume and look for certain keywords like the names of familiar tools like nessus, nikto, webinspect, nmap, etc. While familiarity with these tools is important, you need to know their approach or methodology.

Some common (and quite good) methodologies:

The Open Source Security Testing Methodology Manual (OSSTMM) is:
"…a peer-reviewed methodology for performing security tests and metrics. The OSSTMM test cases are divided into five channels which collectively test: information and data controls, personnel security awareness levels, fraud and social engineering control levels, computer and telecommunications networks, wireless devices, mobile devices, physical security access controls, security processes, and physical locations such as buildings, perimeters, and military bases.

The OSSTMM focuses on the technical details of exactly which items need to be tested, what to do before, during, and after a security test, and how to measure the results. OSSTMM is also known for its Rules of Engagement which define for both the tester and the client how the test needs to properly run starting from denying false advertising from testers to how the client can expect to receive the report. New tests for international best practices, laws, regulations, and ethical concerns are regularly added and updated.
"


The Information Systems Security Assessment Framework (ISSAF) was developed by the Open Information Systems Security Group, and is defined as "…a peer reviewed structured framework that categorizes information system security assessment into various domains & details specific evaluation or testing criteria for each of these domains. It aims to provide field inputs on security assessment that reflect real life scenarios. ISSAF should primarily be used to fulfill an organization's security assessment requirements and may additionally be used as a reference for meeting other information security needs. ISSAF includes the crucial facet of security processes and their assessment and hardening to get a complete picture of the vulnerabilities that might exist."

(Note: Of the two methodologies listed, the OSSTMM is more mature.)

Familiarity with the Guidelines on Network Security Testing from NIST (The National Institute of Standards and Technology) is an excellent baseline. These guidelines are published in Special Publication 800-42, and are a bit less comprehensive that the OSSTMM model. Testers familiar with 800-42 are typically more knowledgeable about working with regulatory agencies and their specific testing and auditing requirements.

3) Certifications listed on resume - what matters?

CEH (Certified Ethical Hacker):
We have discussed this certification at length in articles here and here. My current opinion is that the certification program gives testers an exposure to tools, and prepares them to pass the required examination. That's about it.

National Security Agency IAM (Information Assessment Methodology) and IEM (Information Evaluation Methodology):
Both of these certifications cover the excellent IEM/IAM methodologies in grueling detail. The certifications involve classroom training, group activities, presentations to peers on assessments (think intelligence briefings), and written exams. These certifications form an impressive foundation for risk assessment skills.

Certified Security Professional (CSTP) and Certified Security Testing Associate (CSTA) are accredited by the University of Glamorgan. The certification coursework is excellent as seen in this PDF file.

Operating System Specific Certifications such as a MCSE, RHCE, etc. and vendor-specific certifications like CCNA, CCIE are very desirable. The more a candidate knows about the operating systems, devices and applications they are testing, the better.

ISACA has two great certifications that show knowledge of information systems management (CISM Certified Information Systems Manager and CISA Certified Information Systems Auditor).

My comments on the CISSP can be found in this entry.



4) What box(es) do they think in and out of?

Candidates may list their engagement experience as being either white box or black box. Knowledge in both types of testing environments is essential.

White box testing is testing an environment with prior knowledge of the infrastructure, systems, applications, policies, procedures, etc. In this situation, the tester has an 'edge', can spend less time doing reconnaissance work and more time testing and exploiting.

Black box testing is also known as 'cold testing'. In other words, the tester has no previous knowledge of the environment to be testing and must perform extensive research and reconnaissance on the target(s). Black box testers are usually intimately familiar with social engineering techniques and knowledge acquisition methods (like dumpster diving).

Focusing on the 'boxes' in interviews is a great way of judging a candidates true level of experience. Ask the candidate for specific examples of their work. Do they freely give previous clients' names? If so, this may be a sign that the candidate doesn't respect Non-Disclosure Agreements.

Most importantly, look for 'out of the box' thinking. Candidates that are able to think on their own and come up with unique solutions to problems are in high demand. (For an example, look at how Scrap & I penetrated the headquarters building of Allison Technologies in Case Of The Tepid Tipster.)

5) Personality, Business and Legal Skills

Your candidate is going to interface with your customer at many levels. Some important things to consider while reading the resume and during the interview:

• Do they have good people skills?
• Do they understand the value of the service they provide to the customer?
• Are they conversational?
• Do they comprehend how important it is to make the customer feel 'at ease' with their presence and service?
• Do they understand the legalities involved in testing?
• Do they have a 'John Wayne' attitude that could get you in trouble? (example: testing outside the scope of the engagement is a no-no!)

6) References, References, References

Ask the candidate for professional (and if possible) client references.


7) What's In Their Toolkit?

Candidates will have their own preference for toolkits, as there are many tools that perform the exact same function. The candidate should have an understanding of tools, and experience using toolkits like Auditor.

Auditor has one of the best (if not the best) selection of tools around. The candidate should have knowledge of at least a few of the tools listed in each category below (taken from the Auditor toolkit):

Footprinting

* Greenwhich
* Whois
* Gnetutil (Network Utilities)
* Itrace (ICMP traceroute)
* Tctrace (TCP traceroute)
* Traceroute
* DNSwalk (DNS verification)
* Dig (DNS lookup)
* Host (DNS lookup)
* NSTXCD (IP over DNS client)
* NSTXD (IP over DNS server)
* Oxyman (DNS tunnel)
* Curl (URL transfer)
* Elinks (Console web browser)
* Konqueror (Web browser)
* Socat (Socket Cat)
* Stunnel (Universal SSL tunnel)
* Arpfetch (SNMP ARP/IP fetcher)
* SNMPWalk (SNMP tree walk)
* TKMib (Mib browser)
* GQ (LDAP browser)
* Komba2 (KDE SMB browser)
* LinNeighborhood (Graphical SMB browser)
* Net utils (NET utilities)
* SMBClient (SMB client)
* SMBGet (SMB downloader)
* Smb4K (SMB share browser)
* Xsmbrowser (Graphical SMB browser)
* nmblookup (Netbios name lookup)
* smbdumpusers (User browser)
* smbgetserverinfo (Get server info)
* Cheops (Network neighborhood)
* NTP-fingerprint (Detection based on ntp fingerprint)
* Nmap (Network scanner)
* NmapFE (Graphical network scanner)
* P0f (Passive OS fingerprinting)
* Queso (OS detection)
* XProbe2 (OS detection)


Scanning

* Cisco global exploiter (Cisco scanner)
* Cisco torch (Cisco oriented scanner)
* ExploitTree search (ExploitTree collection)
* Metasploit (Metasploit commandline)
* Metasploit (Metasploit console GUI)
* Metasploit (Metasploit web interface)
* Nessus (Security Scanner)
* Raccess (Remote scanner)
* Httprint (Webserver fingerprinting)
* Nikto (Webserer scanner)
* Stunnel (Universal SSL tunnel)
* Cheops (Network neighborhood)
* GTK-Knocker (Simple GUI portscanner)
* IKE-Scan (IKE scanner)
* Knocker (Simple portscanner)
* Netenum (Pingsweep)
* Netmask (Requests netmask)
* Nmap (Network scanner)
* NmapFE (Graphical network scanner)
* Proxychains (Proxifier)
* Scanrand (Stateless scanner)
* Timestamp (Requests timestamp)
* Unicornscan (Fast port scanner)
* Isrscan (Source routed packets scanner)
* Amap (Application identification)
* Bed.pl (Application fuzzer)
* SNMP-Fuzzer (SNMP protocol fuzzer)
* ScanSSH (SSH identification)
* Nbtscan (Netbios scanner)
* SMB-Nat (SMB access scanner)
* Ozyman (DNS tunnel)
* Ass (Autonomous system scanner)
* Protos (Protocol identification)

Analyzer

* AIM-SNIFF (AIM sniffer)
* Driftnet (Image sniffer)
* Mailsnarf (Mail sniffer)
* Paros (HTTP interception proxy)
* URLsnarf (URL sniffer)
* smbspy (SMB sniffer)
* Etherape (Network monitor)
* Ethereal (Network analyzer)
* Ettercap (Sniffer/Interceptor/Logger)
* Hunt (Sniffer/Interceptor)
* IPTraf (Traffic monitor)
* NGrep (Network grep)
* NetSed (Network edit)
* SSLDump (SSLv3/TLS analyzer)
* Sniffit (Sniffer)
* TcPick (Packet stream editor)
* Dsniff (Password sniffer)

Spoofing

* Arpspoof (ARP spoofer)
* Macof (ARP spoofer/generator)
* Nemesis-ARP (ARP packet generator)
* Nemesis-Ethernet (Ethernet packet generator)
* CDP (CDP generator)
* DNSSpoof (DNS spoofer)
* Nemesis-DNS (DNS packet generator)
* DHCPX (DHCP flooder)
* Hping2 (Packet generator)
* ICMPRedirect (ICMP redirect packet generator)
* ICMPUSH (ICMP packet generator)
* Nemesis-ICMP (ICMP packet generator)
* Packit (Traffic inject/modify)
* TcPick (Packet stream editor)
* Yersinia (Layer 2 protocol injector)
* Fragroute (Egress rewrite)
* HSRP (HSRP generator)
* IGRP (IGRP injector)
* IRDP (IRDP generator)
* IRDPresponder (IRDP response generator)
* Nemesis-IGMP (IGMP generator)
* Nemesis-RIP (RIP generator)
* File2Cable (Traffic replay)
* Fragrouter (IDS evasion toolkit)
* Nemesis-IP (IP packet generator)
* Nemesis-TCP (TCP packet generator)
* Nemesis-UDP (UDP traffic generator)
* SendIP (IP packet generator)
* TCPReplay (Traffic replay
* Etherwake (Generate wake-on-LAN)



Bluetooth

* BTScanner (Bluetooth scanner)
* Bluesnarfer (Bluesnarf attack)
* Ghettotooth (Bluetooth scanner)
* Kandy (Mobile phone tool)
* Obexftp (Obexftp client)
* Phone manager
* RFComm (Bluetooth serial)
* RedFang (Bluetooth bruteforce)
* USSP-Push (Obex-push)
* XMinicom (Terminal)


Wireless

* apmode.sh (Act as accesspoint)
* Airpwn (Client penetration)
* Hotspotter (Client penetration)
* GpsDrive
* start-gps-daemon (GPS daemon)
* stop-gps-daemon (GPS daemon)
* ASLeap (LEAP/PPTP cracker)
* Genkeys (Hash generator for ASLeap)
* Airforge
* File2air (Packet injector)
* Void11
* Void11-Hopper (Channel hopper)
* GKismet (Graphical wireless scanner)
* GPSMAP (wireless mapping)
* KLV (Kismet Log Viewer)
* Kismet (Ncurses wireless scanner)
* Wellenreiter (Graphical Wireless scanner)
* 802ether (Dumpfile format convertor)
* airodump (Traffic recorder)
* aircrack (Modern WEP cracker)
* Aireplay (Wireless packet injector)
* Wep_Crack (Wep Cracker)
* Wep_Decrypt (Decrypt dump files)
* Airsnort (GUI based WEP cracker)
* ChopChop (Active WEP attack)
* DWEPCrack (WEP cracker)
* Decrypt (Dump file decrypter)
* WEPAttack (Dictionary attack)
* WEPlab (Modern WEP cracker)
* Cowpatty (WPA PSK bruteforcer)
* changemac.sh (MAC address changer)


Bruteforce

* ADMsnmp (SNMP bruteforce)
* Guess-who (SSH bruteforc)
* Hydra (Multi purpose bruteforce)
* K0ldS (LDAP bruteforce)
* Obiwan III (HTTP bruteforce)
* SMB-Nat (SMB access scanner)
* TFTP-bruteforce
* VNCrack (VNC bruteforce)
* Xhydra (Graphical bruteforcer


Password cracker

* BKHive (SAM recovery)
* Fcrackzip (Zip password cracker)
* John (Multi-purpose password cracker)
* Default password list
* Nasty (GPG secret key cracker)
* Rainbowcrack (Hash cracker)
* Samdump2 (SAM file dumper)
* Wordlists (Collection of wordlists)


Forensics

* Autopsy (Forensic GUI)
* Recover (Ext2 file recovery)
* Testdisk (Partition scanner)
* Wipe (Securely delete files)


Honeypot

* IMAP
* POP3
* Honeyd (Honeypot)
* IISEmulator (Honeypot)
* Tinyhoneypot (Simple honeypot)
Posted by CEOinIRVINE
l