Stay up-to-date with the latest and greatest ethical hacking tools and resources. Finesse your ethical hacking skills by visiting these sites for security, tools, resources, and more.
Bluetooth
Detailed presentation on the various Bluetooth attacks
NIST Special Publication 800-48
Certifications
Certified Information Security Manager
Certified Information Systems Security Professional
Certified Wireless Security Professional
Databases
Advanced Access Password Recovery
Advanced SQL Password Recovery
Elcomsoft Distributed Password Recovery
Microsoft SQL Server Management Studio Express
Pete Finnigan's listing of Oracle scanning tools
Exploit tools
General research tools
Netcraft's What's that site running?
RIPE Network Coordination Centre
U.S. Patent and Trademark Office
U.S. Securities and Exchange Commission
Hacker stuff
Hacker T-shirts, equipment, and other trinkets
Keyloggers
Laws and regulations
Gramm-Leach-Bliley Act (GLBA) Safeguards Rule
Health Information Technology for Economic and Clinical Health (HITECH) Act
Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Payment Card Industry Data Security Standard (PCI DSS)
U.S. state breach notification laws
Linux
Linux Security Auditing Tool (LSAT)
Live toolkits
Comprehensive listing of live bootable Linux toolkits
Log analysis
LogAnalysis.org system logging resources
Messaging
Miscellaneous tools
NetWare
Craig Johnson's BorderManager resources
Networks
QualysGuard vulnerability scanner
Password cracking
Advanced Archive Password Recovery
Dictionary files and word lists:
ftp://ftp.cerias.purdue.edu/pub/dict
ftp://ftp.ox.ac.uk/pub/wordlists
http://packetstormsecurity.nl/Crackers/wordlists
http://www.outpost9.com/files/WordLists.html
http://rs159.rapidshare.com/files/184075601/BlackKnightList.rar
Elcomsoft Distributed Password Recovery
Proactive System Password Recovery
NIST Guide to Enterprise Password Management
Patch management
Lumension Patch and Remediation
Microsoft TechNet Security Center
Slackware Linux Security Advisories
Windows Server Update Services from Microsoft
Security education and learning resources
Kevin Beaver's information security articles, whitepapers, webcasts, podcasts, and screencasts
Kevin Beaver's Security On Wheels information security audio programs
Kevin Beaver's Security On Wheels blog
Security methods and models
Open Source Security Testing Methodology Manual
Software Engineering Institute's OCTAVE methodology
Source-code analysis
Storage
System hardening
Bastille Linux Hardening Program
Center for Internet Security Benchmarks
How to disable SMTP relay on various e-mail servers
Linux Administrator's Security Guide
User awareness and training
Dogwood Management Partners Security Posters
Interpact, Inc. Awareness Resources
NIST Awareness, Training, & Education resources
Voice over IP
Vulnerability databases
Common Vulnerabilities and Exposures
CWE/SANS Top 25 Most Dangerous Programming Errors
National Vulnerability Database
Privacy Rights Clearinghouse's A Chronology of Data Breaches
SANS Top 20 Internet Security Problems, Threats, and Risks
US-CERT Vulnerability Notes Database
Wireless Vulnerabilities and Exploits
Web applications
Acunetix Web Vulnerability Scanner
N-Stealth Web Application Security Scanner
Windows
Microsoft Baseline Security Analyzer
Wireless networks
Digital Hotspotter
Elcomsoft Wireless Security Auditor
SeattleWireless Hardware Comparison page
WiGLE database of wireless networks
dummies
Source:http://www.dummies.com/how-to/content/ethical-hackers-guide-to-tools-and-resources.html
No comments:
Post a Comment