Ethical Hacker's Guide to Tools and Resources

Stay up-to-date with the latest and greatest ethical hacking tools and resources. Finesse your ethical hacking skills by visiting these sites for security, tools, resources, and more.


Bluetooth


BlueScanner


Bluesnarfer


BlueSniper Rifle


Blooover


Bluejacking community site


BTScanner for XP


Car Whisperer


Detailed presentation on the various Bluetooth attacks


NIST Special Publication 800-48


Smurf


Certifications


Certified Ethical Hacker


Certified Information Security Manager


Certified Information Systems Security Professional


Certified Wireless Security Professional


CompTIA Security+


SANS GIAC


Databases


Advanced Access Password Recovery


Advanced SQL Password Recovery


AppDetectivePro


Elcomsoft Distributed Password Recovery


Microsoft SQL Server Management Studio Express


NGSSQuirreL


Pete Finnigan's listing of Oracle scanning tools


QualysGuard


SQLPing3 and SQLRecon


Exploit tools


Metasploit


Milw0rm


General research tools


AfriNIC


APNIC


ARIN


Bing


DNSstuff.com


dnstools.com


The File Extension Source


Google


Government domains


Hoover's business information


LACNIC


Military domains


Netcraft's What's that site running?


RIPE Network Coordination Centre


Switchboard.com


U.S. Patent and Trademark Office


US Search.com


U.S. Securities and Exchange Commission


Wotsit's Format


Whois.net


Whatismyip.com


Yahoo! Finance


Zabasearch


Hacker stuff


2600 The Hacker Quarterly


Computer Underground Digest


Hacker T-shirts, equipment, and other trinkets


Hackin9


Honeypots: Tracking Hackers


The Online Hacker Jargon File


PHRACK


Keyloggers


Invisible KeyLogger Stealth


KeyGhost


SpectorSoft


Laws and regulations


Gramm-Leach-Bliley Act (GLBA) Safeguards Rule


Health Information Technology for Economic and Clinical Health (HITECH) Act


Health Insurance Portability and Accountability Act (HIPAA) Security Rule


Payment Card Industry Data Security Standard (PCI DSS)


U.S. state breach notification laws


Linux


BackTrack


freshmeat.net


GFI LANguard


Linux Security Auditing Tool (LSAT)


QualysGuard


SourceForge


THC-Amap


Tiger


Live toolkits


BackTrack


Comprehensive listing of live bootable Linux toolkits


Knoppix


Network Security Toolkit


Security Tools Distribution


Log analysis


ArcSight Logger


GFI EventsManager


LogAnalysis.org system logging resources


Messaging


Abuse.net SMTP relay checker


Brutus


Cain & Abel


DNSstuff.com relay checker


EICAR Anti-Virus test file


GFI e-mail security test


mailsnarf


smtpscan


Miscellaneous tools


FreeZip


WinZip


NetWare


Craig Johnson's BorderManager resources


JRB Software


NetServerMon


Pandora


Rcon program


Remote


UserDump


Networks


Arpwatch


Blast


Cain & Abel


CommView


dsniff


Essential NetTools


ettercap


Firewalk


Getif


GFI LANguard


IETF RFCs


IKEcrack


MAC address vendor lookup


MAC Changer


Nessus vulnerability scanner


Netcat


Netfilter/iptables


NetResident


NetScanTools Pro


Nmap port scanner


NMapWin


OmniPeek


Port number listing


Port number lookup


PortSentry


PromiscDetect


QualysGuard vulnerability scanner


SMAC MAC address changer


SNARE


sniffdet


SNMPUTIL


SuperScan port scanner


TCP Wrappers


TrafficIQ Pro


UDPFlood


WhatIsMyIP


Wireshark


Password cracking


Advanced Archive Password Recovery


BIOS passwords


Brutus


Cain & Abel


Crack


Default vendor passwords


Dictionary files and word lists:



Elcomsoft Distributed Password Recovery


Elcomsoft System Recovery


John the Ripper


ophcrack


Pandora


Password Safe


Proactive Password Auditor


Proactive System Password Recovery


pwdump3


NetBIOS Auditing Tool


NIST Guide to Enterprise Password Management


NTAccess


RainbowCrack


Rainbow tables


SQLPing3


TSGrinder


WinHex


Patch management


BigFix Patch Management


Debian Linux Security Alerts


Ecora Patch Manager


GFI LANguard


Linux Kernel Updates


Lumension Patch and Remediation


Novell Patches and Security


Microsoft TechNet Security Center


Red Hat Linux Security Alerts


Slackware Linux Security Advisories


SUSE Linux Security Alerts


Windows Server Update Services from Microsoft


Security education and learning resources


Kevin Beaver's information security articles, whitepapers, webcasts, podcasts, and screencasts


Kevin Beaver's Security On Wheels information security audio programs


Kevin Beaver's Security On Wheels blog


Kevin Beaver's Twitter page


Security methods and models


Open Source Security Testing Methodology Manual


OWASP


SecurITree


Software Engineering Institute's OCTAVE methodology


Source-code analysis


Checkmarx


Fortify Software


Klocwork


Ounce Labs


Storage


CHAP Password Tester


CIFSShareBF


Effective File Search


FileLocator Pro


GFI LANguard


Google Desktop


GrabiQNs


Identity Finder


NASanon


StorScan


SuperScan


System hardening


Bastille Linux Hardening Program


Center for Internet Security Benchmarks


Deep Freeze


Fortres 101


How to disable SMTP relay on various e-mail servers


Imperva


Linux Administrator's Security Guide


PGP Whole Disk Encryption


Pyn Logic


SecureIIS


ServerDefender


TrueCrypt


User awareness and training


Awareity MOAT


Dogwood Management Partners Security Posters


Greenidea Visible Statement


Interpact, Inc. Awareness Resources


Managing an Information Security and Privacy Awareness and Training Program by Rebecca Herold (Auerbach)


NIST Awareness, Training, & Education resources


Security Awareness, Inc.


Voice over IP


Cain & Abel


CommView


Listing of various VoIP tools


NIST's SP800-58 document


OmniPeek


PROTOS


sipsak


SiVuS


vomit


VoIP Hopper


Vulnerability databases


Common Vulnerabilities and Exposures


CWE/SANS Top 25 Most Dangerous Programming Errors


National Vulnerability Database


Privacy Rights Clearinghouse's A Chronology of Data Breaches


SANS Top 20 Internet Security Problems, Threats, and Risks


US-CERT Vulnerability Notes Database


Wireless Vulnerabilities and Exploits


Web applications


Absinthe


Acunetix Web Vulnerability Scanner


Brutus


Defaced Web sites


HTTrack Website Copier


Firefox Web Developer


Foundstone's Hacme Tools


Google Hack Honeypot


Google Hacking Database


NGSSquirrel


N-Stealth Web Application Security Scanner


Paros Proxy


Port 80 Software's ServerMask


SiteDigger


SWFScan


WebInspect


WebGoat


WSDigger


WSFuzzer


Windows


DumpSec


GFI LANguard


Microsoft Baseline Security Analyzer


Network Users


QualysGuard


Sysinternals


Winfo


Wireless networks


Aircrack


AirMagnet WiFi Analyzer


AirSnort


Asleap


Cantenna war-driving kit


CommView for Wi-Fi


Digital Hotspotter


Elcomsoft Wireless Security Auditor


Homebrew WiFi antenna


KisMAC


Kismet


NetStumbler


OmniPeek


SeattleWireless Hardware Comparison page


Super Cantenna


Wellenreiter


WEPCrack


WiGLE database of wireless networks


WifiMaps


WiFinder


WildPackets' OmniPeek


WinAirsnort




dummies

Source:http://www.dummies.com/how-to/content/ethical-hackers-guide-to-tools-and-resources.html

No comments:

Post a Comment