Jump to content
Gonzalez

Ethical Hacker Tools

Recommended Posts

Scanner

1. 7th Dimension Port Scanner: Scan your port address more easily.

2. AB Complete Ping: Allow you to ping one or more IP addresses, to scan a network for shared resources and to scan a computer for open ports.

3. Angry IP Scanner: Scan IP very easily and rapidly!.

4. Dave’s Port Sniffer: Detect FTP, HTTP, POP, SMTP, TELNET and FINGER deamons running on any TCP host machine.

5. DeadBolt: Monitor holes in Windows and alert you when it detects suspicious activity, giving you the power to stop viruses dead in their tracks!.

6. Linux-Vuln-source: Carry the two scanner as Rnmap and VLAD ’s system security kit!.

7. MacAnalysis: Audit suite for your Macintosh to perform and help implement a security standard for your computer/network by performing some work.

8. NetBIOS Security Kit(unix): Perform various security checks on remote servers running NetBIOS file sharing services.

9. NetBIOS Security Kit(windows): Perform various security checks on remote servers running NetBIOS file sharing services.

10. Netmon: Monitor network connections.

11. Nmap: Explore or security audit network on Linux or Unix.

12. Port Invader: Scan a range or list of IP addresses to verify if there are open or closed ports.

13. Port Scanner: Scan a group of IP address looking for the presence of specific incoming TCP/IP ports.

14. PortScan: Scan port fast and configurably!.

15. Port_Scanner: Collet 20 tools to use in port sacanner on Linux or Unix!.

16. Portscan SMS Alert: Alert you when probed scandlogd logs information to syslog and invokes this shell script.

17. Scanner: Collect 84 tools and misc to scan.

18. SecureScan NX: Scan your distributed network architecture for vulnerabilities from one central location.

19. SkPortScan ActiveX Control: Integrate port-scanning capabilities into your applications with this ActiveX control.

20. THC-HappyBrowser: Check an NT-Server/Webserver for known vulnerabilities.

21. THC-Probe: Scan compilation for Linux.

22. THC-Scan: Automate tone, carrier, vmb scanning.

23. WhereIsIP: Find the geographic location of chat room members, ICQ members, and more.

24. Windows_Trojan_Scanner: Collect 6 little tools scanning whole networks to find well known Trojans.

25. Windows_port_scanner: Collect 9 Port Scanner running on Windows.

26. XSharez scanner: Scan, search and get specific resources for you.

Sniffer

1. Blackbox for AOL: Monitor application for America Online, AIM, ICQ, and Yahoo Messenger.

2. Colasoft Application Protocol Sniffer & Analyzer: It is a TCP/IP Network Sniffer & Analyzer program based on Windows system.

3. Ethereal0814: Free network protocol analyzer’s another version.

4. Ethereal0817: Analyze network protocol, another version of Ethereal.

5. Ethereal0820: Analyze network protocol freely for Win32.

6. Libpcap062: Needed for capturing packet to you as the packet capture library, the latest release of Libpcap.

7. Linux_sniff_source: Contain 18 sniffer tools on Linux and some source files.

8. LittleBrother: Allow supervisors to accurately manage and measure internet and network resource usage.

9. NetProb32 Network Analyzer: Analyze, Monitor Traffic, and Generator Packet program.

10. PacketX: Integrate winpcap packet capture functionality with VB or any other programming environment supporting Microsoft ActiveX technology.

11. Phenoelit’s own security sniffer: Open a network interface for all packets and not only for these packets, which are send to this interface.

12. Proxy Workbench: It is a unique proxy server ideal for developers, trainers and security experts that displays its data in real-time.

13. Snarp: Allow the host to sniff the data from the wire.

14. Sniff-em: Base on a competively priced, performance minded Windows as a Network analyzer.

15. Sniffers: Having 34 files in it and among that are 28 sniffer tools and some source codes.

16. Socket Workbench: Designed to analyze socket communications.

17. Stealth Activity Recorder: Use newly and easily internet enabled tool for monitoring home and business PCs.

18. Tcpdump362: Capture and dumper program pretty much for the original protocol packet.

19. Windows_sniff: Facilitate the capture and visualization of network traffic kit of 5 tools and 1 source code files.

20. Winpcap: Capture and send raw data from a network card, the free Packet Capture Architecture for Windows!.

Snoop tool

1. ID: Display the ID information of machine’s specific hardware.

2. IPQuery: Show the current IP Address.

3. NetroSnooper: Find hidden files on the internet!.

4. Network Inventory: Provide network administrators with the ability to perform a software inventory on all machines located on a network.

5. Quadsoft’s IP Tool: Tell you your IP Address in a variety of ways.

6. ShellSPY: Track every process running on your PC.

7. Trouble In Paradise: Install nothing but trouble your machine with some showing message.

8. iNetTools for Windows: Collect menu-driven testing tools for internet and IP-based networks.

Source code

1. APG: Set for random password generation.

2. ARP Monitor: Trace arp requests from/to your machine.

3. Asm: Including msmh, inpect, GetDialPasswords, it is a kit.

4. Backdoor: Includes 17 Backdoor tools in the kit with their source code.

5. Blue Beep: Blue Beep is a wardialer, this includes its source code.

6. C_SOURCE: Contain 4 files in it, and get the tools source code after decompress them.

7. Emailcrk: Crack password of e-mail account.

8. Findhost: Scan port on the net for you.

9. Harvester: Contain the source of Harvester, which monitors remote web pages and FTP directories.

10. IgmpNuke: Use IGMP packet tool’s source code.

11. Jail Chroot Project: Build a chrooted environment on POSIX with source code of C.

12. Keylogger_SRC: Include all the full source of Keylogger recording keystrokes.

13. Misc_src: Misc source code of 10 tools.

14. Network Grep: Mimick as much functionality in GNU grep as possible, applied at the network layer.

15. Nutcracker: Check/crack password tool for Unix/Linux.

16. PgpIcq: Encrypt your ICQ messages using the power of the world’s best encryption software.

17. Portscanner: Scan a group of IP address.

18. SecurityFocus ARIS Extractor: Analyze IDS log sophisticatedly and filter important attacks from the noise.

19. ShareDecryption: Extract share passwords from registry.

20. VB_SOURCE: Contain 14 files in it, and get the tools source code after decompress them.

21. Wnuke4: This is the complete wnuke4 source file package.

22. Zebedee: Secure IP tunnel tool’s source code!.

Spoof

1. Credit probe: Creates fake credit card numbers.

2. HTTPort: Establish a transparent TCP/IP tunnel through a proxy server.

3. IP Spoofer: Support IP spoofing software kit.

4. Ircgspoofer: Spoofer software on IRC Ghost.

5. Pinger: Trick your ISP into thinking you are always active.

Virus

1. Virus_exe: Including six most typical executable virus programs.

2. Virus_source: Containing many virus source codes in the package, this page will be devoted to Virii and Trojan’s, 89 files in all.

Backdoor

extract the file and rename it to ISO

Download :

http://www.megaupload.com/?d=Z3RK5G91
[url]http://www.megaupload.com/?d=X3AQJ4P2[/url]
[url]http://www.megaupload.com/?d=3NEGK6RJ[/url]
[url]http://www.megaupload.com/?d=V2JMPQUY[/url]
[url]http://www.megaupload.com/?d=FA2XYT4A[/url]
[url]http://www.megaupload.com/?d=YZ9W0LA0[/url]
[url]http://www.megaupload.com/?d=YJP8RZHT[/url]

Video Tutorials:

Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. When students leave this intensive five-day class, they will have hands-on understanding and experience in ethical hacking.

Chapter 1 - Introduction to Ethical Hacking

Chapter 2 - Footprinting

Chapter 3 - Scanning

Chapter 4 - Enumeration

Chapter 5 - System Hacking

Chapter 6 - Trojans and Backdoors

Chapter 7 - Sniffers

Chapter 8 - Denial of Service

Chapter 9 - Social Engineering

Chapter 10 - Session Hijacking

Chapter 11 - Hacking Web Servers

Chapter 12 - Web Application Vulnerabilities

Chapter 13 - Web Based Password Cracking Techniques

Chapter 14 - SQL Injection

Chapter 15 - Hacking Wireless Networks

Chapter 16 - Evading IDS, Firewalls and Honey Pots

Chapter 17 - Linux Hacking

Chapter 18 - Buffer Overflows

Chapter 19 - Cryptography

Chapter 20 - Virus and Worms

Chapter 21 - Physical Security

Chapter 22 - Penetration Testing

Download :


[url]http://rapidshare.de/files/33881434/CBt_Nuggets_Certified_Ethical_Hacker_Series-Video_Tutorial.part01.rar[/url]

[url]http://rapidshare.de/files/33881325/CBt_Nuggets_Certified_Ethical_Hacker_Series-Video_Tutorial.part02.rar[/url]

[url]http://rapidshare.de/files/33883360/CBt_Nuggets_Certified_Ethical_Hacker_Series-Video_Tutorial.part03.rar[/url]

[url]http://rapidshare.de/files/33883362/CBt_Nuggets_Certified_Ethical_Hacker_Series-Video_Tutorial.part04.rar[/url]

[url]http://rapidshare.de/files/33886318/CBt_Nuggets_Certified_Ethical_Hacker_Series-Video_Tutorial.part05.rar[/url]

[url]http://rapidshare.de/files/33885932/CBt_Nuggets_Certified_Ethical_Hacker_Series-Video_Tutorial.part06.rar[/url]

[url]http://rapidshare.de/files/33885867/CBt_Nuggets_Certified_Ethical_Hacker_Series-Video_Tutorial.part07.rar[/url]

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.


×
×
  • Create New...