Tools For network Hacking :

Tools For network Hacking :
Tools Descriptions:

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (Network Mapper) is a free open source utility for network exploration
or security auditing. It was designed to rapidly scan large networks, although
it works fine against single hosts. Nmap uses raw IP packets in novel ways to
determine what hosts are available on the network, what services (application
name and version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are in use,
and dozens of other characteristics. Nmap runs on most types of computers and
both console and graphical versions are available. Nmap is free and open source.

Can be used by beginners (-sT) or by pros alike (packet_trace). A very
versatile tool, once you fully understand the results.

Get Nmap Here – http://www.insecure.org/nmap/download.html

2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-
server framework.

Nessus is the worlds most popular vulnerability scanner used in over 75,000
organizations world-wide. Many of the worlds largest organizations are
realizing significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.

Get Nessus Here – http://www.nessus.org/download/

3. John the Ripper

Yes, JTR 1.7 was recently released!

John the Ripper is a fast password cracker, currently available for many
flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect
weak Unix passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

You can get JTR Here – http://www.openwall.com/john/

4. Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive
tests against web servers for multiple items, including over 3200 potentially
dangerous files/CGIs, versions on over 625 servers, and version specific
problems on over 230 servers. Scan items and plugins are frequently updated and
can be automatically updated (if desired).

Nikto is a good CGI scanner, there are some other tools that go well with Nikto
(focus on http fingerprinting or Google hacking/info gathering etc, another
article for just those).

Get Nikto Here – http://www.cirt.net/code/nikto.shtml

5. SuperScan

Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the
highly popular Windows port scanning tool, SuperScan.

If you need an alternative for nmap on Windows with a decent interface, I
suggest you check this out, it’s pretty nice.

Get SuperScan Here – http://www.foundstone.com/index.htm
subnav=resources/navigation.htm&subcontent=/resources/proddesc/superscan4.htm

6. p0f

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the
operating system on:

– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.

Basically it can fingerprint anything, just by listening, it doesn’t make ANY
active connections to the target machine.

Get p0f Here – http://lcamtuf.coredump.cx/p0f/p0f.shtml

7. Wireshark (Formely Ethereal)

Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you
capture and interactively browse the contents of network frames. The goal of
the project is to create a commercial-quality analyzer for Unix and to give
Wireshark features that are missing from closed-source sniffers.

Works great on both Linux and Windows (with a GUI), easy to use and can
reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.

Get Wireshark Here – http://www.wireshark.org/

8. Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in
different Layer 2 protocols. It pretends to be a solid framework for analyzing
and testing the deployed networks and systems. Currently, the following network
protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery
Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration
Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP).

The best Layer 2 kit there is.

Get Yersinia Here – http://yersinia.sourceforge.net/

9. Eraser

Eraser is an advanced security tool (for Windows), which allows you to
completely remove sensitive data from your hard drive by overwriting it several
times with carefully selected patterns. Works with Windows 95, 98, ME, NT,
2000, XP and DOS. Eraser is Free software and its source code is released under
GNU General Public License.

An excellent tool for keeping your data really safe, if you’ve deleted it..make
sure it’s really gone, you don’t want it hanging around to bite you in the ass.

Get Eraser Here – http://www.heidi.ie/eraser/download.php

10. PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms,
along with an xterm terminal emulator. A must have for any h4. 0r wanting to
telnet or SSH from Windows without having to use the crappy default MS command
line clients.

Get PuTTY Here. – http://www.chiark.greenend.org.uk/~sgtatham/putty/

11. LCP

Main purpose of LCP program is user account passwords auditing and recovery in
Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute
force session distribution, Hashes computing.

A good free alternative to L0phtcrack.

LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack
article.

Get LCP Here – http://www.lcpsoft.com/english/download.htm

12. Cain and Abel

My personal favourite for password cracking of any kind.

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It
allows easy recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis
attacks, recording VoIP conversations, decoding scrambled passwords, revealing
password boxes, uncovering cached passwords and analyzing routing protocols.
The program does not exploit any software vulnerabilities or bugs that could
not be fixed with little effort.

Get Cain and Abel Here – http://www.oxid.it/cain.html

13. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion
detection system. Kismet will work with any wireless card which supports raw
monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

A good wireless tool as long as your card supports rfmon (look for an orinocco
gold).

Get Kismet Here – http://www.kismetwireless.net/download.shtml

14. NetStumbler

Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux
counterparts, but it’s easy to use and has a nice interface, good for the
basics of war-driving.

NetStumbler is a tool for Windows that allows you to detect Wireless Local Area
Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized rogue access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.

Get NetStumbler Here – http://www.stumbler.net/

15. Hping

To finish off, something a little more advanced if you want to test your TCP/IP
packet monkey skills.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The
interface is inspired to the ping unix command, but hping isn’t only able to
send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a
traceroute mode, the ability to send files between a covered channel, and many
other features.

Get hping Here – http://www.hping.org/

21 Suggestions for Success

21 Suggestions for Success

1) Marry the right person. This one decision will determine 90% of your happiness or misery.
2) Work at something you enjoy and that’s worthy of your time and talent.
3) Give people more than they expect and do it cheerfully.
4) Become the most positive and enthusiastic person you know.
5) Be forgiving of yourself and others.
6) Be generous.
7) Have a grateful heart.
Persistence, persistence, persistence.
9) Discipline yourself to save money on even the most modest salary.
10) Treat everyone you meet like you want to be treated.
11) Commit yourself to constant improvement.
12) Commit yourself to quality.
13) Understand that happiness is not based on possessions, power or prestige, but on relationships with people you love and respect.
14) Be loyal.
15) Be honest.
16) Be a self-starter.
17)Be decisive even if it means you’ll sometimes be wrong.
18) Stop blaming others. Take responsibility for every area of your life.
19) Be bold and courageous. When you look back on your life, you’ll regret the things you didn’t do more than the ones you did.
20) Take good care of those you love.
21) Don’t do anything that wouldn’t make your Mom proud.

7 complicated facts about Women

7 complicated facts about Women

1. They believe in saving…
2. Believe in saving, but buy expensive
clothes…
3. Buy expensive clothes, but never have
anything 2 wear…
4. Never have anything 2 wear, but always
dressed beautifully…
5. Always dressed beautifully, but never
satisfied…
6. Never satisfied, but still expect men to
compliment them…
7. Expect men to compliment them,
but don’t believe them if complemented..

HAVE A GOOD LAUGH. BUT STAY……………

HAVE A GOOD LAUGH. BUT STAY……………

THEY ABOUND A PLENTY IN OUR NEIGHBOURHOOD

Number One Idiot.

I am a medical student currently doing a rotation in toxicology at the
poison control center.

Today, this woman called in very upset because she caught her little
daughter eating ants.

I quickly reassured her that the ants are not harmful and there would
be no need to bring her daughter into the hospital.

She calmed down and at the end of the conversation happened to mention
that she gave her daughter some ant poison to eat in order to kill the
ants.

I told her that she better bring her daughter into the emergency room
right away.

Here’s your sign, lady. Wear it with pride.
~~~~~~~~~~~~~~~~

Number Two Idiot.

Early this year, some Boeing employees on the airfield decided to
steal a life raft from one of the 747s.

They were successful in getting it out of the plane and home. Shortly
after they took it for a float on the river, they noticed a
Coast Guard helicopter coming toward them.

It turned out that the chopper was homing in on the emergency locator
beacon that activated when the raft was inflated. They are no longer
employed at Boeing.

Here’s your sign, guys. Don’t get it wet; the paint might run.
~~~~~~~~~~~~~~~~~

Number Three Idiot.

A man, wanting to rob a downtown Bank of America, walked into the
Branch and wrote this, ?Put all your muny in this bag.?

While standing in line, waiting to give his note to the teller, he
began to worry that someone had seen him write the note and might call
the police before he reached the teller’s window.

So he left the Bank of America and crossed the street to the Wells
Fargo Bank. After waiting a few minutes in line, he handed his note to
the Wells Fargo teller.

She read it and, surmising from his spelling errors that he wasn’t the
brightest light in the harbor, told him that she could not accept his
stickup note because it was written on a Bank of America deposit slip
and that he would either have to fill out a Wells Fargo deposit slip
or go back to Bank of America.

Looking somewhat defeated, the man said,? OK? and left.

He was arrested a few minutes later, as he was waiting in line back at
Bank of America .

Don’t bother with this guy’s sign. He probably couldn’t read it anyway.
~~~~~~~~~~~~~~~~

Number Four Idiot.

A motorist was unknowingly caught in an automated speed trap that
measured his speed using radar and photographed his car.

He later received in the mail a ticket for $40 and a photo of his car.

Instead of payment, he sent the police department a photograph of $40.

Several days later, he received a letter from the police that contained another picture, this time of handcuffs.

He immediately mailed in his $40.

Wise guy … But you still get a sign.
~~~~~~~~~~~~~~~~

Number Five Idiot.

A guy walked into a little corner store with a shotgun and demanded
all of the cash from the cash drawer.

After the cashier put the cash in a bag, the robber saw a bottle of
Scotch that he wanted behind the counter on the shelf. He told the
cashier to put it in the bag as well, but the cashier refused and
said, ?Because I don’t believe you are over 21.?

The robber said he was, but the clerk still refused to give it to him
because she didn’t believe him.

At this point, the robber took his driver’s license out of his wallet
and gave it to the clerk.

The clerk looked it over and agreed that the man was in fact over 21
and she put the Scotch in the bag.

The robber then ran from the store with his loot.

The cashier promptly called the police and gave the name and address
of the robber that he got off the license.

They arrested the robber two hours later.

This guy definitely needs a sign.
~~~~~~~~~~~~~~~

Idiot Number Six.

A pair of Michigan robbers entered a record shop nervously waving revolvers.
The first one shouted, ?Nobody move!?

When his partner moved, the startled first bandit shot him.

This guy doesn’t even deserve a sign.
~~~~~~~~~~~~~~~~~
Idiot Number Seven.

Arkansas : Seems this guy wanted some beer pretty badly.

He decided that he’d just throw a cinder block through a liquor store
window, grab some booze, and run.

So he lifted the cinder block and heaved it over his head at the
window. The cinder block bounced back knocking him unconscious.
It seems the liquor store window was made of Plexi-Glass.

The whole event was caught on videotape.

Yep, here’s your sign.

~~~~~~~~~~~~~~~~~
Idiot Number Eight.

I live in a semi-rural area.

We recently had a new neighbor call the local township administrative
office to request the removal of the Deer Crossing sign on our road…

The reason: ?Too many deer are being hit by cars out here ! I don’t
think this is a good place for them to be crossing anymore.?

Take the sign – Please!

 

Ten Things That Will Disappear In Our Lifetime More scary than humorous!

 Ten Things That Will Disappear In Our Lifetime
More scary than humorous!

1. The Post Office
Get ready to imagine a world without the post office. They are so deeply in financial trouble that there is probably no way to sustain it long term. Email, Fed Ex, and UPS have just about wiped out the minimum revenue needed to keep the post office alive.

2. The Cheque
Britain is already laying the groundwork to do away with cheque by 2018. It costs the financial system billions of dollars a year to process cheques. Plastic cards and online transactions will lead to the eventual demise of the cheque. If you never paid your bills by mail and never received them by mail, the post office would absolutely go out of business.

3. The Newspaper
The younger generation simply doesn’t read the newspaper. They certainly don’t subscribe. As for reading the paper online, get ready to pay for it. The rise in mobile Internet devices and e-readers has caused all the newspaper and magazine publishers to form an alliance. They have met with Apple, Amazon, and the major cell phone companies to develop a model for paid subscription services.

4. The Book
You say you will never give up the physical book that you hold in your hand and turn the literal pages. I said the same thing about downloading music from iTunes. I wanted my hard copy CD. But I quickly changed my mind when I discovered that I could get albums for half the price without ever leaving home to get the latest music. The same thing will happen with books. You can browse a bookstore online and even read a preview chapter before you buy. And the price is less than half that of a real book. And think of the convenience!
Once you start flicking your fingers on the screen instead of the book, you find that you are lost in the story, can’t wait to see what happens next, and you forget that you’re holding a gadget instead of a book.

5. The Land Line Telephone
Unless you have a large family and make a lot of local calls, you don’t need it anymore.Most people keep it simply because they’ve always had it. But you are paying double charges for that extra service.

6. Music
This is one of the saddest parts of the change story. The music industry is dying a slow death. Not just because of illegal downloading. It’s the lack of innovative new music being given a chance to get to the people who would like to hear it. To explore this fascinating and disturbing topic further, check out the book,
“Appetite for Self-Destruction” by Steve Knopper, and the video documentary, “Before the Music Dies.”

7. Television
Revenues to the networks are down dramatically. Not just because of the economy. People are watching TV and movies streamed from their computers. And they’re playing games and doing lots of other things that take up the time that used to be spent watching TV. Prime time shows have degenerated down to lower than the lowest common denominator. Cable rates are skyrocketing and commercials run about every 4 minutes and 30 seconds. It’s time for the cable companies to be put out of our misery. Let the people choose what they want to watch online and through Netflix.

8. The “Things” That You Own
Many of the very possessions that we used to own are still in our lives, but we may not actually own them in the future. They may simply reside in “the cloud.” Today your computer has a hard drive and you store your pictures, music, movies, and documents. Your software is on a CD or DVD, and you can always re-install it if need be. But all of that is changing. Apple, Microsoft, and Google are all finishing up their latest “cloud services.” That means that when you turn on a computer, the Internet will be built into the operating system. So, Windows, Google, and the Mac OS will be tied straight into the Internet. If you click an icon, it will open something in the Internet cloud. If you save something, it will be saved to the cloud. And you may pay a monthly subscription fee to the cloud provider. In this virtual world, you can access your music or your books, or your whatever from any laptop or handheld device. That’s the good news. But, will you actually own any of this “stuff” or will it all be able to disappear at any moment in a big “Poof?” Will most of the things in our lives be disposable and whimsical? It makes you want to run to the closet and pull out that photo album, grab a book from the shelf, or open up a CD case and pull out the insert.

9. Joined Handwriting
Already gone in some schools who no longer teach “joined handwriting” because nearly everything is done now on computers or keyboards of some type

10. Privacy
If there ever was a concept that we can look back on nostalgically, it would be privacy. That’s gone. It’s been gone for a long time anyway.. There are cameras on the street, in most of the buildings, and even built into your computer and cell phone. But you can be sure that 24/7, “They” know who you are and where you are, right down to the GPS coordinates, and the Google Street View. If you buy something, your habit is put into a zillion profiles, and your ads will change to reflect those habits.. “They” will try to get you to buy something else. Again and again. All we will have left that can’t be changed are “Memories”.