1. SECURITY TOOLS
Vulnerability assessment tools:
Nessus:
http://www.nessus.org/
The premier Open Source vulnerability assessment toolNessus is a remote security scanner
forWindows, Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface,and
performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML,
LaTeX, and ASC II text, andsuggests solutions for security problems.
Hping2 :
http://www.hping.org/
A network probing utility like ping on steroids hping3 assembles and sends custom ICP/UDP/TCP
packets and displays anyreplies. It was inspired by the ping command, but offers far more
control over the probes sent. It also has a handy traceroutemode and supports IPfragmentation.
This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewallthat
blocks attempts using the standard utilities.
DSniff :
http://naughty.monkey.org/~dugsong/dsniff/
A suite of powerful network auditing and penetration-testing tools.This popular and well-engineered
suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, andwebspy
passively monitor a network for interesting data passwords, e-mail, files, etc. arpspoof, dnsspoof,
and macof facilitatethe interception of network traffic normally unavailable to an attacker e.g,
due to layer-2 switching . sshmitm andwebmitmimplement active monkey-in-the-middle attacks
against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hocPKI. A separately
maintained partial Windows port is available here.
GF I LANguard :
http://www.gfi.com/lannetscan/
A commercial network security scanner for WindowsLANguard scans networks and reports
information such as service pack level of each machine, missing security patches, openshares,
open ports, services/applications active on the computer, key registry entries, weak passwords,
users and groups, andmore. Scan results are outputted to an HTML report, which can be
customised/queried. Apparently a limited free version isavailable for non-commercial/trial use.
Sam Spade:
2. http://www.samspade.org/ssw/
SamSpade provides a consistent GUI and implementation for many handy network query tasks. It
was designed with trackingdown spammers in mind, but can be useful for many other network
exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig,
traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, websitesearch, and
more. Non-Windows users can enjoy online versions of many of their tools.
ISS Internet Scanner: Application- level vulnerability assessment :
http://www.iss.net/products_services/enterprise
_protection/vulnerability_assessment/scanner_internet.php
Internet Scanner started off in '92 as a tiny Open Source scanner by Christopher Klaus. Now he has
grown ISS into a billion-dollar company with a myriad of security products. ISS Internet Scanner is
pretty good, but is not cheap. So companies on a tight budget may wish to look at Nessus instead.
A March 2003 Information Security magazine review of 5 VA tools including these isavailable
here. Note that VA tools only report vulnerabilities. Commercial tools for actually exploiting them
include CORE Impactand Dave Aitel's C anvas. Free exploits for some vulnerabilities can be found at
sites like Packet Storm and SecurityFocus
Nikto:
http://www.cirt.net/code/nikto.shtml
Nikto is a web server scanner which looks for over 2600 potentially dangerous files/C GIs and
problems on over 625 servers. Ituses LibWhisker but is generally updated more frequently than
Whisker itself.
SuperScan: F oundstone's Windows TCP port scanner :
http://www.foundstone.com/index.htm?subnav=resources/navigation.htm
A connect-based TC P port scanner, pingerand hostname resolver. No source code is provided. It can
handle ping scans and portscans using specified IP ranges. It can also connect to any discovered open
port using user-specified
SAINT :
http://www.saintcorporation.com/saint/
Security Administrator's Integrated Network Tool, Saint is another commercial vulnerability
assessment tool like ISS Internet Scanner or eEye Retina . Unlike those Windows-onlytools, SAINT
runs exclusively on UNIX. Saint used to be free and open source, but is now a commercial product.
SARA: Security Auditor's Research Assistant :
3. http://www-arc.com/sara/
SARA is a vulnerability assessment tool that was derived from the infamous SATAN scanner. They
try to release updates twice amonth and try to leverage other software created by the open source
community such as Nmap and Samba .
N- Stealth: Web server scanner:
http://www.nstalker.com/nstealth/
N-Stealthis a commercial web server security scanner. It is generally updated more frequently
than free web scanners such aswhisker and nikto, but do take their web site with a grain of salt. The
claims of
Firewalk: Advancedtraceroute :
http://www.packetfactory.net/projects/firewalk/
Firewalk employs traceroute-like techniques to analyze IP packet responses to determine gateway
AC L filters and map networks.This classic tool was rewritten from scratch in October 2002. Note
that much or all of this functionality can also be performed bythe Hping2 --traceroute option.
XProbe2: Activ e OS fingerprinting tool :
http://www.sys-security.com/html/projects/X.html
XProbeis a tool for determining the operating system of a remote host. They do this using some of
the same techniques as Nmapas well as many different ideas. Xprobe has always emphasized the IC MP
protocol in their fingerprinting approach.
Toolsets: A plethor of network discovery /monitoring/ attack tools :
http://www.solarwinds.net/
SolarWinds has created and sells dozens of special-purpose tools targetted at systems
administrators. Security related toolsinclude many network discovery scanners and an SNMP
brute-force cracker. These tools are Windows only, cost money, and donot include source code.
THC- Amap: An application fingerprinting scanner :
http://www.thc.org/releases.php
Amap by THC is a new but powerful scanner which probes each port to identify applications
and services rather than relying onstatic port mapping.
Hunt: An advanced packet sniffing and connection intrusion tool for Linux:
http://lin.fsid.cvut.cz/~kra/index.html#HUNT
4. Hunt can watch TC P connections, intrude into them, or reset them. Hunt is meant to be used
on ethernet, and has activemechanisms to sniff switched connections. Advanced features include
selective ARP relaying and connection synchronization afterattacks. If you like Hunt, also take a look at
Ettercap and Dsniff.
A Windows web attack proxy :
http://achilles.mavensecurity.com/
Achilles is a tool designed for testing the security of web applications. Achilles is a proxy server, which
acts as a man-in-the-middleduring an HTTP session. A typical HTTP proxy will relay packets to and
from a client browser and a web server. Achilles willintercept an HTTP session's data in either
direction and give the user the ability to alter the data before transmission. For example,during a
normal HTTP SSL connection a typical proxy will relay the session between the server and the
client and allow the twoend nodes to negotiate SSL. In contrast, when in intercept mode,
Achilles will pretend to be the server and negotiate two SSLsessions, one with the client
browser and another with the web server. As data is transmitted between the two nodes,
Achillesdecrypts the data and gives the user the ability to alter and/or log the data in clear text before
transmission.
Brutus: A network brute- force authentication cracker :
http://www.hoobie.net/brutus/
This Windows-only cracker bangs against network services of remote systems trying to guess passwords
by using a dictionary andpermutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP,
NTP, and more. No source code is available. UNIX usersshould take a look at THC -Hydra.
Fragroute: IDS sy stems' worst nightmare :
http://www.monkey.org/~dugsong/fragroute/
Fragroute intercepts, modifies, and rewrites egress traffic, implementing most of the attacks described
in the Secure Networks IDSEvasion paper. It features a simple ruleset language to delay, duplicate,
drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all
outbound packets destined for a target host, with minimal support for randomized orprobabilistic
behaviour. This tool was written in good faith to aid in the testing of intrusion detection systems,
firewalls, and basicTC P/IP stack behaviour. Like Dsniff, and Libdnet, this excellent tool was written by
Dug Song.
HTTP Hacking :
http://www.immunitysec.com/resources-freesoftware.shtml
5. Spike Proxy is an open source HTTP proxy for finding security flaws in web sites. It is part of the
Spike Application Testing Suiteand supports automated SQL injection detection, web site crawling,
login form brute forcing, overflow detection, and directorytraversal detection.
Shadow Security Scanner: A commercial v ulnerability assessment tool:
http://www.safety-lab.com/en2/products/1.htm
A commercial vulnerability assessment tool
nmap :
http://www.insecure.org
A popular tool used for ports scanning and OS finger printing"Install genuine and updated softwareto
strengthen y our online safety and security "