Sunday, April 30, 2006

Google Tips - Find Anything!

inurl:index.of.password
Directory listing contains password file(s)?
intitle:”Index of” service.pwd
Directory listing contains service.pwd file(s)
intitle:”Index of” view-source
Directory listing contains view-source file(s)
intitle:”Index of” admin
Direcory listing contains administrative files or directories
intitle:”Index of” .htpasswd
Directory listing contains .htpasswd file!
intitle:”Index of” log.txt
Directory listing contians log text files
intitle:”Index of” stats.html
Directory listing contains stats.html which may contain useful web server statistics
“access denied for user” “using password”
Web page contains error message which might provide useful application information
“A syntax error has occurred” filetype:ihtml
Web page contains error message which might provide useful application information
“ORA-00921: unexpected end of SQL command”
Web page contains error message which might provide useful application information
inurl:passlist.txt
The passlist.txt file may contain user passwords
“Index of /backup”
Directory may contain sensitive backup files
intitle:”Index of” .bash_history
Directory listing contains bash history information
intitle:”Index of” index.html.bak
Directory listing contains backup index file (index.html.bak)
intitle:”Index of” index.php.bak
Directory listing contains backup index file (index.html.bak)
intitle:”Index of” guestbook.cgi
Directory listing contains backup index file (index.html.bak)
intitle”Test Page for Apache”
Default test page for Apache
intitle:index.of.etc
Directory listing of /etc ?
filetype:xls username password
XLS spreadseet containing usernames and passwords?
“This file was generated by Nessus”
Nessus report!
intitle:”Index of” secring.bak
Secret key file
intitle:”Terminal Services Web Connection”
Access terminal services!
intitle:”Remote Desktop Web Connection”
Access Remote Desktop!
intitle:”Index of” access_log
Directory listing contains access_log file which may store sensitive information
intitle:”Index of” finance.xls
Directory listing contains finance.xls which may contain sensitive information
intitle:”Usage Statistics for”
Statistical information may contain sensitive data
intitle:”Index of” WSFTP.LOG
WSFTP.LOG file contains information about FTP transactions
intitle:”Index of” ws_ftp.ini
The ws_ftp.ini file may contain usernames and passwords of FTP users
“not for distribution” confidential
URL may contain confidential or sensitive information
“phpMyAdmin” “running on” inurl:”main.php”
phpMyAdmin allows remote mysql database administration
“#mysql dump” filetype:sql
mysql database dumps

inurl:php.ini filetype:ini
The php.ini file may contain sensitive PHP environment details.
BEGIN (CERTIFICATE|DSA|RSA) filetype:key
Private key(s)!
BEGIN (CERTIFICATE|DSA|RSA) filetype:csr
Private key(s)!
BEGIN (CERTIFICATE|DSA|RSA) filetype:crt
Private key(s)!
intitle:”Index of” passwd passwd.bak
passwd file!
intitle:”Index of” master.passwd
master.passwd file!
intitle:”Index of” pwd.db
pwd.db file may contain password information
intitle:”Index of..etc” passwd
passwd file!
filetype:cfg ks intext:rootpw -sample -test -howto
This file may contain the root password (encrypted)
intitle:”index.of.personal”
Directory may contain sensitive information
intitle:”Index of” login.jsp
The login.jsp file may contain database username or password information
intitle:”Index of” logfile
Directory may contain sensitive log files
filetype:php inurl:”viewfile” -”index.php” -”idfil
File may contain PHP source code
allinurl:intranet admin

“index of/root”
“auth_user_file.txt”
“index of/root”
“Index of /admin”
“Index of /password”
“Index of /mail”
“Index of /” +passwd
“Index of /” +password.txt
“Index of /” +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
administrators.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index
allintitle: “index of/admin”
allintitle: “index of/root”
allintitle: sensitive filetype oc
allintitle: restricted filetype :mail
allintitle: restricted filetype oc site:gov
allinurl: winnt/systpem32/
intitle:”Index of” .sh_history
intitle:”Index of” .bash_history
intitle:”index of” passwd
intitle:”index of” people.lst
intitle:”index of” pwd.db
intitle:”index of” etc/shadow
intitle:”index of” spwd
intitle:”index of” master.passwd
intitle:”index of” htpasswd
intitle:”index of” members OR accounts
intitle:”index of” user_carts OR user_cart

INTITLE - search for string in title
intitle:”michael moore”

ALLINTITLE - search strings in title
allintitle:”michael moore” films

INURL - search for string in the url
inurl:”michael moore”

INTEXT - search for the string in the site body
intext:”angry white men”

SITE - search specific domains
“virus” site:infosec.navy.mil

LINK - locate sites linking to the site entered
link:www.pogo.com

CACHE - search google site cache
cache:www.whitehouse.gov

DATERANGE - search within a date range (julian)
“michael moore” daterange:2452389-2452389

FILETYPE - locate files (don’t list any html pages, just the files)
“economic disaster” filetype:pdf -filetype:htm -filetype:html

RELATED - locate pages that are related (similar)
related:www.usatoday.com

INFO - locates links about site
info:www.2600.com

PHONEBOOK - locates phone numbers
phonebook:”fred stanley”

STOCKS - stock info
stocks:msft

BOOLEAN LOGIC

- “AND”, “I”, “a”, “The”, and “Of” are ignored
- a pipe “|” is treated as “OR”
- a minus symbol “-” eliminates the string from results
- wildcard “*” can be used on words, not characters
(”three * mice” = “three blind mice”)
- 10 word limit. Use wildcards like “do as * say not as * do”

Triggers and Switches

- ! = Initializes the “I’m Feeling Lucky” search option
intitle:”Directory of” sexually transmitted diseases -inurl:book -inurl:products

- ?? = searches the google directory
?? “michael moore”

- , = searches usenet database (google groups)
, group:sci.med* hiv

/images = searches google images
intitle:cheerleaders -filetype:htm -filetype:html /images

/news = searches google news
intitle:”saddam hussein” /news

/since = days ago
“george bush” /since:365

Google URLs

The query “three blind mice” returns
http://www.google.com/search?num=100&hl=en&q=%22three+blind+mice%22&as_qdr=m6&safe=off

query = q=%22three+blind+mice%22&as_qdr=m6&safe=off
num = number of results (1-100)
as_qdr=mx =specifies age of site (x= amount of months)
safe=off =content filter (on or off)

The Good Stuff

1. Vulnerable Servers (Mic*ft Based)

http://www.google.com/search?num=100&hl=en&safe=off&q=intitle%3A%22index+of+%2F%22+%22parent+directory%22+intitle%3A%22mp3%22+-filetype%3Ahtm+-filetype%3Ahtml

Runs this Query
intitle:”index of /” “parent directory” intitle:”mp3″ -filetype:htm -filetype:html

DESCRIPTION : searches for misconfigured web-servers with an open “/” root path and a folder named MP3s

2. Vulnerable Apache Servers (UNIX Based)

http://www.google.com/search?num=100&hl=en%safe=off&q=%2B%22index+%2Bof%2Fmp3%22+%2Bbeatles

Runs this Query
+”index +of/mp3″ +beatles

DESCRIPTION : searches for misconfigured paths containing mp3s

3. Password Snatching

http://www.google.com/search?hl=en&as_qdr=all&q=%22http%3A%2F%2Fbob%3Abob%40www%22&btnG=Google+Search

Runs this Query
http://bob:bob@www” or “http://12345:54321@www

DESCRIPTION : Searches for password files people save on their hard drives

4. Locate specific site info and passes

http://www.google.com/search?hl=en&q=%22http%3A%2F%2F%2A%3A%2A%40www%22+teenagepanties&btnG=Google+Search

Runs this Query
http://*:*@www” teenagepanties

5. Warez locator Queries

http://www.google.com/search?hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=off&q=intitle%3A%22index+of+%2F%22+%22parent+directory%22+%2B%22%2A.nfo%22+%2B%22%2A.rar%22+%2B%22%2A.r05%22+%2B%22%2A.r10%22+-filetype%3Ahtm+-filetype%3Ahtml&btnG=Google+Search

Runs this Query
intitle:”index of /” “parent directory” +”*.nfo” +”*.rar” +”*.r05″ +”*.r10″ -filetype:htm -filetype:html

intitle:”paris hilton”+”index of ” +”parent directory” +”mpg” -filetype:htm -filetype:html

delicious digg technorati yahoo newsvine google socialize

Advanced DOS techniques

This guide assumes that you know a little bit about dos including basic commands, the basics of batch files and the use of autoexec.bat. If you are *nix user, you will recognise some of the techniques that I describe in this document. I decided to write this guide because I have never seen these tips in print, and I find them very useful and valuable. I hope you will too!

TIP: Typing ‘/?’ after most commands will display a help page about that command. Try ‘dir /?’.

Echo
You will probably know that you can display messages on the screen by using ‘echo’. But it is more versatile than it would first appear. You can turn off the prompt, (the ‘c:\windows\>’ bit) by typing ‘echo off’. You can display a blank line by typing ‘echo.’. And finally, if you put ‘@echo off’ at the top of a batch file, the commands from the batch file will not be displayed on screen.

Environment Variables
These are named pieces of data that are accessible by all programs. (Including windows programs, VB programmers can use the ‘GetEnvironmentVariable’ API call to get environment variables). To display all environment variables you use the program that you use to set them, ’set’.

If you type ‘dir /?’ you will get the help page for this command. Take a look at the line that says ‘Switches may be preset in the DIRCMD environment variable’. Dir automatically sorts files and folders by date, but I prefer to see the folders first, then the files ordered by name. Normally I would type ‘dir /OGN /P’, but by using the DIRCMD environment variable, I can set these as the default parameters with the command ’set DIRCMD=/OGN /P’. Now when I type ‘dir’, it will automatically use the parameters that I stored in DIRCMD! (I put ’set DIRCMD=/OGN /P’ in autoexec.bat so I don’t have to type it each time I load DOS.)

The Path Environment Variable
When you type ’set’, all the variables are displayed, including one named ‘path’, which contains a list of directories. These directories are the ones that are searched when you type in a command. For example, when you use fdisk or format, you can be in any directory when you use them even though they are stored in c:\windows\command. They are made available by the inclusion of c:\windows\command in the path variable.

If you want to add a new path to the path variable, and type ’set path=c:\games’, you will notice that your directory has replaced all the paths that were in the variable previously. You can avoid this by typing ’set path=c:\games;%path%’. What is going on here? Well, a word enclosed in percentage signs represents a variable. Therefore you are making path contain your path, and the previous contents of path. To see an example, try ‘echo %path%’ and the contents of path will be displayed.

TIP: there is a program called ‘path’ that you can use the set the path variable.

Prompt
Have you ever wondered to yourself, “Wouldn’t it be cool to be able to change the way the command prompt looks like”? No, me neither, but it is possible. If you type ’set’, you will see a line that looks like ‘PROMPT=$p$g’. This tells command.com that the prompt should show the path and a right facing chevron. Try changing it around by typing ’set PROMPT=$g$p’ and you will get something that looks like ‘>c:\windows’. There are a whole series of special things you can put into the prompt, for example you can display the current time with ‘$T’. For a complete list, type ‘prompt /?’. (Prompt is a program similar to path, in that it provides and alternative way of changing the prompt variable.)

PRANKSTER TIP: Find a friend’s computer and set the prompt to ‘c:\windows\$g’ so it will look like a normal prompt, but will not change when you friend tries to change directory!

The Insertion Operator.
If you have ever used C++ you will recognise the insertion operator ‘>>’. You probably be surprised that you can use a version of this in the DOS environment! It is used to redirect the output of a program to a text file instead of the screen. You may want to use it if the output of a command overflows the screen, or you want to print the output. Try ‘dir /s >> files.txt’. This will output all files in the current directory and all subdirectories, but append this output to a file named ‘files.txt’. You can also use ‘dir /s > files.txt’. Notice that in this example there is only one chevron. This will perform as before, but if there is any text in ‘files.txt’ it will be overwritten.

There is another method of redirecting the output of a command. If you have used a *nix system you will probably be familiar with the pipe ‘|’ symbol. Well, this can also be used in DOS. The most useful application of this is when used with ‘more’, a program used to display text one page at a time. Try ‘dir /s | more’ This will be similar to typing ‘dir /s /p’ (It will display the contents of the current directory and all subdirectories, one page at a time.) Other useful redirections include sending the output to ’sort’ and ‘find’.

TIP: If using pipe produces a ‘too many parameters’ error, try replacing the pipe with the Alt+1,2,4 character.

Doskey
Ever used the Unix shell tcsh? There is a program in DOS, called Doskey, which enables some similar operations. It allows the user to scroll through previous typed commands and edit them without having to delete back to the mistake. It also enables frequently used commands to be stored as macros! This is a very handy tool (used by default on WinNT), especially if you use DOS frequently. TIP: add ‘doskey /insert’ to autoexec.bat to load it by default. For more information including using macros, type ‘doskey /?’.

Further Reading
Take a look at ‘batricks’ by Laurence Soucy for many more cool tips. http://home7.inet.tele.dk/batfiles/intro/contents.htm

Credits

by «phacination»
phacination@hotmail.com

delicious digg technorati yahoo newsvine google socialize

10 very crucial steps to avoid security breaches

The PC revolution and the Internet boom all over the world have introduced new elements to cyber crime. Elements that make cyber crime one of the most dangerous issues facing modern society. Children and innocent netizens are now being subject to unprecedented barrage of innovative cyber attacks.

For example, rising number of ‘phishing’ attacks have emerged as a new, big threat of cyber security. According to Anti-Phishing Working Group statistics, approximately 5 per cent of users fall prey to Phishing scams. Spam, viruses, worms and other malicious code account for global losses of several billion dollars

These simple 10 steps could cover people against more than 80 per cent of all causes of information security breaches:

1. Install the latest anti-virus software on your computer and never ever turn it (anti-virus) off, instal a personal firewall and spyware checker . To find them just search in igniteds using the keywords anti-virus and anti-spyware.

2. Never download or open attachments, whose source you are not certain about. Even if the source is trusted, see if the content is relevant, if not, don’t open attachment. Create another E-mail ID which you use exclusively for subscription to sites. That will prevent spam from coming to your main ID. Some accounts like Yahoo! allow you to create topic-specific E-mail IDs that you can delink.

3. Avoid checking mail or using credit card details online in cyber cafes. It’s next to impossible to be sure that it’s safe. Even reputed cafes such as those in international airports and 5-star hotels have known to be key-logged. Matter of fact, open an additional debit card with a limit if you do want to transact online. In a worst case scenario your damage is limited.

4. Do not give away your residence or cell number. Be especially careful when you are filling in contest forms, coupons, free gift vouchers. More often than not, these are gimmicks to obtain your personal details. Don’t believe it when they say the data will not be given to others - it most certainly will be. Don’t print these numbers on your visiting card.

5. Get into the habit of destroying documentation regarding credit cards, such as receipts, bills, invoices or any documents that contain personal details.

6. If you are using broadband or working from home, ensure that your PC is hardened professionally. You can do this yourself if you follow the next step.

7. Information is a reality of modern life. Just like health or transport or communication is. Point is, you need to know something about it, even if it’s just some basics. Read about information security breaches by subscribing to some newsletters. In case of many breaches, the only defence is knowledge. For instance, no technology could have prevented the phishing attack (wherein victims got mails seemingly from legitimate banks asking them to confirm their passwords and IDs)

8. Use two different passwords. One for mail, work and other important access and the other for routine proposes such as subscribing to sites. But remember to switch between them when you start doing transactions after mere browsing.

9. Create a difficult to guess password by taking the first alphabet from each word of a phrase.
For instance a password like 1at*eomc is constructed using a phrase “I am the star employee of my company”. For a complete demytifying of the passwords making technique look at the link below.

Link : http://igniteds.net/phpBB/viewtopic.php?t=3109

10. Educate your children about the dangers of cyber crime. Children with their unbound curiosity and unmonitored access are the single most common victims of cyber crime apart from the enterprises. Ensure that the home PC is kept in a common place so that you can monitor what is going on.

If you follow the above steps you can avoid the most common security breaches which is very dangerous for you personal life.

delicious digg technorati yahoo newsvine google socialize

Bypassing Firewalls Restrictions

In this article there will be available some (basic) known methods to bypass firewalls.
Firewalls are software or hardware applications that controls the traffic that
passes from the internet to the local computer. a Hardware firewall generally is
built-in in a Router. The router is a phisical device that receives all internet
traffic (in the form of ‘packets’) and sends it to each computer in the LAN.
It also sends information from inside the LAN to the internet. Hardware firewalls
usually only filter or blocks the outbound traffic, that means, the traffic that
comes from the internet to a computer or computers inside the LAN.
Software firewalls will filter/block both inbound and outbound traffic. When
a connection from the outside of the local computer is trying to be established
a message will show up asking wether to allow it or not. The same happens if an
application or service is trying to access some service of the internet, a
message will be displayed asking wether you allow the application to access the
internet or not.
The methods will be discussed having a Windows OS environment in mind, but of course,
it is not restricted to Windows and they can be used in other OS as well.

Method 1: -IP Spoof-

In this method The IP address is changed to bypass firewall rules.
For example if inside a LAN a Hardware Firewall has rules set up to
block a specific IP address or range of IP addresses, if we change
the current IP address we can bypass this rule.
To change the IP address go to “Start” then “Run” and type CONTROL.EXE
The control panel will open. Now click on the item ‘Network Connections’.
Select the connection that is in use and right click on it. The properties
table will show up. Double click on the “TCP/IP Protocol” properties to
open a new window. Select the Option “Use the following IP Address”
in the field :

IP ADDRESS: here type an IP address that belongs to the IP range allowed
on your LAN. Usually LANs gives IPs starting with 192.168.x.y where x and y
are also numerical values inside a range established by the DHCP server of
the LAN. Supposing the DHCP setup IPs from 192.168.0.2 - 192.168.100.254
then you can put any IP address you want inside that range and that is NOT
being used by any other machine inside the LAN. Also notice this IP address
must not be inserted in the IP restrictions range. For example if the
Firewall rules was setup to deny access to the internet to IP addresses from
192.168.1.1 - 192.168.90.254 then you can change the IP address to something
like 192.168.91.1 for example, supposing this IP address is not in use by
other machine.

Subnet Mask: usually 255.255.255.0

Default Gateway: Here you type the IP address of the Router, sometimes
192.168.0.1 To see the IP of your gateway, go to “START” - “RUN” and type
%comspec% .The MS-DOS prompt will show up. Now type IPCONFIG -ALL .You will
not only see the current IP address of your machine but the default gatway
IP address, the DNS Server address, the MAC address of your Ethernet Adapter
etc etc as well. So copy the MAC address, the gateway, DNS Servers IPs
because this info will be important.

In the field os DNS Servers:
DNS Server of Preference: put the IP address of the DNS Server of your area.
You have it on the IPCONFIGURATION and you might have copied it as stated above.
For example 65.65.76.76

Alternative DNS Server: Here you put an IP address of an alternative DNS
server of your area. again you might have copied this info as well.
for example 65.65.76.80

Click on “APPLY” and close.

Now your IP address should change. Supposing you put an IP address that is not
in the Firewall´s IP Restriction Range, now you will be able to access all the
Services listed in the restriction. For example, if the Rule contains well-known
services like Telnet, FTP, Rlogin, WebServices and POP3, then now you will be
able to access these services remotely and use them.
For example if a machine inside your LAN supports telnet and receives login from
all computers except those in the firewall IP Rule, then now you will be able to
connect to that machine using telnet, or even to a computer outside your LAN, eg:
your home computer running a telnet server. You will also be able to browse the
internet normally.

METHOD2: -MAC Address Spoof-

Some Firewalls also configures MAC address rules and restricts some MAC addresses
from accessing the internet or any other services listed.
Each computer in the world has a unique MAC address (phisical address) this is
a 6 byte value. They appear like this xx-xx-xx-xx-xx-xx . It combines letters and
numbers. eg: 00-10-00-b5-03-f8 supposing this is your MAC address and the Firewall
was setup to restrict the computer with that MAC to access the internet, FTP and
Rlogin. This means the computer with this MAC will not be able to access the
internet and wont be able to connect to other machines using FTP or Rlogin.
If you change your MAC then you won´t be restricted anymore.
To change the MAC address of your Ethernet Adapter you can use Tools or manually
change it via Registry in Windows XP but it is a bit hard, so it is better using
the available tools in the Internet. A very nice program that snifs traffic, cracks
passwords, list shares, spoof IPs and MAC address is Cain & Abel available at
http://oxid.it . Another tool that changes the MAC is “MAC Make Up” and it is
available at http://www.gorlani.com/publicprj/macmakeup/macmakeup.asp
Open up this tool and select the current used Ethernet Adapter. In the field
“MAC ADDRESS” type in your new MAC address the following way: xxxxxxxxxxxx
eg: 001000b503f9 and hit the button “CHANGE” to change it. To complete the operation
go to Control panel (”START” - “RUN” - type CONTROL.EXE”) and double click the
“SYSTEM” tab. Now click on “Device Manager”. (if under Windows XP you will first
have to click in “Hardware” then in “Device Manager”)
In the Device Manager tab select Ethernet Adapters, then select the adapter that
you have just changed the MAC address and disable and re-enable it.
Now your MAC should have changed and you are able to access those services that
were restricted before. Sometimes depending on the Firewall´s Restrictions you will
have to Change both IP and MAC address to bypass the rules.

METHOD3: -Reverse Connection-

If you use reverse connection you can also bypass Hardware Firewalls.
The reverse connection is nothing more than the target server connect to the client
instead of the client connect to the target server:

Client:20 <------- Target Server:30
Target Server:30 --------> Client:20

A bi-directional connection between 2 sides has been established.
Normally Hardware firewalls only filter/block the outbond traffic meaning that if a
computer outside a LAN tries to connect to a computer inside a LAN that is behind a
Router/Hardware Firewall it will run into errors like couldn´t connect to the remote
computer and so on. You must notice that this method will only work if the IP address
of the computer behind a router is not restricted to access the internet. If only
some ports were blocked in the firewall rule, then this method is better than IP spoof
since it doesn´t change anything just creates a ‘tunnel’. It is also good to use this
when a specific website or keyword to a service or website were used in the Firewall
restriction or when you don´t have access to the Firewall Configuration and eventually
want that someone outside the LAN access some service of the computer inside the LAN
There are tools that creates a tunnel between the target server and the client.
These are the TCP/UDP port redirector. A nice GUI (grphical user interface) tool is
“WinIPRelay”. get it at http://voodootechs.com and open it.
Click the button “ADD RELAY”

In the field “Local Port” type the port of the local computer you want to use in the
connection. Make sure it is not blocked or alredy being used.

In the field “Remote Host” type the IP address or if it is a website type the URL

In the field “Remote Port” type the port of the remote computer that will be connecting
to you. eg: if it´s a website then the port will usually be 80. if it is a service like
Telnet the port is 23. If the remote computer wants to access a service on your computer
(the one behind a LAN) then the remote port must be previously setup there, on the remote
computer and then you type it in this field.

In the field “Connection Timeout” type a numerical value to set the time in seconds that
the connection will keep established.

Click OK. Supposing the service you wanted to access is a website eg: www.msn.com and the
local port u chose is 40 then you just open up your internet browser and type: 127.0.0.1:40
and the msn.com webpage will be displayed. Notice that the port 40 must not be blocked.

Now suppose you want your friend to access your telnet server on port 23. If he tries direct
connection he won´t be able to connect, so he must open a port on his/her computer and start
to listen for connections. Suppose the chosen port was 55 and his ip address is 33.33.33.33
open “WinIPRelay” and set the local port to 23, Remote host to 33.33.33.33 , remote port
to 55 and Connection timeout to 999. if he open his command prompt and type:
telnet 127.0.0.1 55 he will reverse connect to your telnet server.

HTTP Tunnel –> bi-directional/reverse connection between 2 hosts using port 80 on the
computer behind the LAN and using only HTTP requests when establishing the connections.

METHOD4: -DLL Injection-

This method is used to bypass Software Firewalls. We know Software Firewalls filter not only
the outbound traffic but also the inbound traffic. If an application is contacted from a
remote computer the Software firewall will pop up a warning message asking whether you want
to allow it or not. Known applications like Windows Explorer, Generic Host Process for Win32
Services, Internet Explorer, NT´s System and Kernel, etc will probably be present in the
Firewall´s Permited applications since they are authentic application used by the system to
perform important operations, and also sometimes they must connect to the internet to update
something or complete a task or to access some website (Internet Explorer) etc.
Knowing a Firewall trusted application it is possible to create a DLL file
(application extension) that will inject code data to the trusted application and bypass the
firewall. If this were an ordinary application (EXE file) the firewall would pop up a warning
asking to allow or deny that application from receiving a connection from the internet, or to
connect to a remote service or computer (access the internet).
Using some programming language such as Visual Basic, Delphi, C++ , etc it is possible to
code a DLL file that will inject the necessary data to a trusted application and this way the
firewall will be bypassed. It can happens, depending on the protocol and/or port used in the
connection, that the firewall filters it and show the Warning message, but the application
that will appear is a known and trusted Firewall application, so you will still have great
chances to trick the User or the System Administrator.
Notice: Some firewalls detects this method warning that application X is trying to access the
internet via trusted application Y.

METHOD5: -Direct Code Injection-

This basically consists in injecting code directly into a legitim application without using DLLs
An external application would ‘patch’ the legitim application by adding custom code to it,
without corrupting the application. If successfull, when the legitim application is executed, the
custom code is also loaded. This leads to a change in the legitim application checksum.
Firewalls like Zone Alarm PRO will detect this method since it checks for applications checksums
changes.

METHOD6: -Firewall Disable-

This is probably one of the less suggested methods since Users and System Administrators will
get suspicious.
This basically consists in disabling/terminating the Firewall´s services and processes.
Some softwares registers its applications as services in Windows NT/2000/XP/2003 and adds
a value to the Windows Registry in the RunServices Section of Windows 95/98/ME. These services
usually are configured to automatically start at every Windows start. If we terminate the
Firewall´s running processes and stop their services, they will no longer work and therefore
will not filter any connections and the computer will be vulnerable. The processes are
normal applications that automatically run at Windows start and has a name with the EXE
extension (process.exe). The Services are special applications that has configured data such
as Name, start type, Error Control Security, etc. The name of the service has a image path
pointing to its aplication.
Nowadays some Firewalls has special applications that cannot be terminated or stoped and
some others when terminated or stopped they pop up a warning message. So this method is not
recommended and may be used only as a last alternative since it will cause suspition.

METHOD7: -”Trusted Website acting as Proxy”-

Suppose you have an well configured firewall that won´t allow your computer to access some sites.
It will probably use keywords such as ‘MSN’ ‘ICQ’ etc, so any URL that has ‘icq’ or ‘msn’ in the
link will be automatically blocked. You could try using the website´s IP address, but this method
is old and lots of firewalls have a kind of a ‘nslookup’ tool that will look and see if that IP
address is related to a blocked name/keyword, if it is a blocked keyword, access to the site will
be denied. Let´s suppose the firewall has setup a list of websites that you can access and luckily
google is allowed. You can use the google´s translation engine to access the blocked website. It
will act as a proxy (bridge) between your computer and the target website. All you have to do is
type the URL on the translation page and there you go. There might be other websites with similar
features, just search around, and if you are lucky enough access to some of those sites with the
similar feature will be allowed.

Method8: -”Legitim application spoof or replace”-

This method basically consists in creating an application with similar characteristics to a trusted
application or replace a legitim application with a specially crafted one.
On Mic*ft Windows systems you have some applications that you have to setup the firewall to allow
internet access such as the default webbrowser (Internet Explorer), automatic updates, services.exe
application, etc. You could deny internet access but then you might loose functionality.
Let´s target the default Webbrowser: Internet Explorer.
All we have to do here is fake a legitim application. You create an application that waits for
connections (server) and give the same name as the legitim one : ‘iexplore.exe’. We don´t stop here.
Let´s replace this application icon with the default Internet Explorer icon. Let´s also change the
properties like company name and file description to the same as Internet Explorer, which is
Mic*ft Corporation and description which is Internet Explorer. Now place it in a folder that won´t
make people suspect. don´t put in windows directory because this has alredy been widely used. put in
for example c:\program files or in c:\program files\Internet Expl0rer. Yes it is ‘0′ (zero) not ‘O’ tongue.gif
perhaps you could place it in the same directory as the legitim application but naming it iexpl0re.exe
Use your imagination wink.gif .
You can also replace the legitim application but you must be carefull, since there is lots of shortcuts
to Internet Explorer around the machine, and it all points
“%programfilesdirectory%\internet explorer\iexplore.exe”, so in this case you would also have to change
the shortcuts properties.
Note that firewalls like Zone Alarm PRO will detect files that has been modified/replaced and will
pop up a warning message telling that the application has changed. It is a very good feature, it
compares the current file checksum with the original one ( the file that have been given permition in
the past) and if it is different it will warn!

Method8: -”Application Checksum Spoof”-

This is a very theoretical method. don´t know if it will defeat firewalls like Zone Alarm Pro…
Some time ago an article about md5 colisions was posted on the internet. it consisted on a weakness in
the MD5 checksum that allows 2 applications have the same MD5 checksum. A demo program was posted
on the internet and it would make 2 applications have the same MD5 checksum. as I never tested it, I
cannot say anything, just theory.
So, if you are able to know the MD5 checksum of a legitim application and create another application and
have its checksum being the same as a legitim one, then replace the legitim one by yours, then
it would theoretically bypass firewalls that check for files checksum changes.

-Conclusion-

It was shown in this article some nice and known methods to bypass Hardware and Software
Firewalls Restrictions with some details. Sometimes one method alone may not work, but if
we join one or more methods together we may be able to bypass the firewalls

delicious digg technorati yahoo newsvine google socialize

Basics of hacking.

If you want to be a anti-hacker then:

1. Learn about hardware - basicly how your computer works.

2. Learn about different types of software.

3. Learn DOS.(learn everything possible)

4. Learn how to make a few batch files.

5. Port scanning. ( download blues port scanner if it’s your first time)

6. Learn a few programming languages
HTML,C++,Python,Perl…. (i’d recommend learning html as your first lang)

7. How to secure yourself (proxy,hiding ip etc)

8. FTP

9. TCP/Ip , UDP , DHCP ,

10. Get your hands dirty with networking

11. Learn diassembler language (its the most basic language for understanding machine language and very useful to ubderstand when anything is disassembled and decoded)

12. Learn to use a Unix os. (a Unix system is generally loaded with networking tools as well as a few hacking tools)

13. Learn how to use Exploits and compile them. (Perl and c++ is must)

14.Most Important: Get Hooked up to SecureTech Blog

delicious digg technorati yahoo newsvine google socialize

Friday, April 28, 2006

Free Spyware Remover - Top Online Adware Scanner 2006

#1 NOADWARE

Description

Spyware and Adware is software made by publishers that allow them to snoop on your browsing activity, invade your privacy, and flood you with those horrible popups.

Main Features

  • Active Monitoring continuously monitors
  • Logfile contains overall more detailed information
  • Gets the job done efficiently
  • Advanced Removal tool

Screenshot - NoAdware

Screenshot #1

Price


Free Download from the Publisher
If you are like most users on the internet, chances are you are probably infected with these applications. Don't let people invade your privacy and slow down your PC! Try NoAdware and see for yourself if your PC is infected!

Protection from known data-mining, aggressive advertising, parasites, Trojans, malware, Browser hijackers, and tracking components.

# 2 SPYWARE DOCTOR

Description

This shareware provides three-way pest protection for your PC through real-time threat blocking, advanced system scanning and immunization against known browser infections.

Main Features

  • Daily definition and regular updates
  • Detect and remove adware, malware, trojans, keyloggers
  • Real Time Monitoring
  • Live Updates
  • A Site Guard tool: Anti-Phishing
  • Ability to quarantine and restore items; Malware Immunizer

Screenshots - Spyware Doctor

Screenshot #1 Screenshot #2 Screenshot #3

Price: $29.95


Buy from Regnow
This software will easily scan your PC for thousands of known threats!

The consequences of adware infections can include banking and identity theft, unusual computer problems, slow Internet access, changed browser homepage, search pages or favorites, and excessive numbers of adware generated adverts.


#3 XOFTSPY

Description

ParetoLogic offers leading edge integrated application solutions to give you peace of mind that your computer is secure and your privacy is protected.

Main Features

  • Complete PC scanning: memory, registry entries
  • Definition updates
  • Efficient Customer Support
  • User-friendly interface

Screenshot

Screenshot XoftSpy #1

Price


Free Download from the Publisher
These malicious software programs are the most prevalent threat to online computer privacy and security.

It allows companies to track your Internet patterns and record your credit card and any other personal information without your permission. Quarantine infected files for immediate protection.


#4 SPYWARE NUKER

Description

These nuisance programs can cause your PC to run extremely slow and even crash, and allow hackers and advertising companies to invade your privacy whenever they wish.

Main Features

  • Detect and remove Spy software
  • Online Scan
  • Easy installation
  • Detect and remove spy software
  • Ad-ware Prevention

Screenshot

Screenshot #1

Price


Download from the Publisher
Scan your PC to locate any malware or adware infections!

There are currently over 78,000 spyware and adware programs that are infecting innocent Internet users such as yourself through downloadable games, music, screensavers, pictures, pop-ups, emails, ....


Tools related to Free Spyware Remover

delicious digg technorati yahoo newsvine google socialize

Top Antivirus Software 2006

# 1 TREND MICRO PC-CILLIN 2006

Description

Trend Micro PC-cillin Internet Security provides comprehensive and easy to use protection from viruses, intruders, and other Internet-based threats.

Main Features

  • Comprehensive Virus Detection and Removal
  • Spyware and Adware Protection is included
  • Robust Spam Protection is built-in
  • Enhanced Network Virus Protection
  • Automatic Virus Pattern Updates
  • Customizable Firewall Rules

Screenshots - Pc-cillin

Screenshot #1 Screenshot #2

Price

$49.95
Its new advanced features go far beyond standard antivirus and firewall protection, helping to safeguard your PC from new emerging threats like network viruses, spam email, inappropriate web content, and Spyware programs that can compromise your privacy.

Keeps you simply secure from viruses, hackers, privacy threats and spam email. PC-cillin Internet Security 2006 offers spam and spyware protection, wireless device protection, customizable firewall, privacy data protection, url filtering, and a year's free tech support via a toll-free number.
# 2 TITANIUM 2006 Antivirus

Description

The new Panda Titanium 2006 Antivirus+Antispyware protects you permanently and automatically against all types of viruses and spyware.

Main Features

  • Eliminates all types of viruses
  • Protection against phishing and other online fraud
  • Top 10 free daily automatic updates
  • Blocks hackers and intruders, even through Wi-Fi connections
  • Keep your PC free from spyware
  • Multiplatform: various antiviruses in one

Screenshot

Screenshot Panda Titanium #1 Screenshot Panda Titanium #2

Price

$49.95
To guarantee your security, Panda Titanium 2006 Antivirus + Antispyware offers a double layer of protection against unknown viruses and intruders thanks to its TruPrevent™ Technologies. It also protects you from hackers, phishing and other online fraud.

Titanium 2006 automatically detects and eliminates all types of viruses, worms and Trojans without you having to lift a finger. In addition, TruPreventTM Technologies give you double protection against new viruses.

Panda Titanium 2006 Antivirus+Antispyware includes one year’s services with no additional cost: 24h email and Internet Tech Support, 24h SOS Virus against unknown viruses and daily updates.
# 3 ETRUST EZ ANTIVIRUS

Description

This software detects and removes computer viruses “in the wild” – keeping you safe from virtually all known virus threats.

Main Features

  • Improved User Interface
  • Real-time Scanning
  • Runs safely in background
  • Fully-Automatic Updates
  • Free 30-Day Trial
  • Low Overhead

Screenshot

Screenshot eTrust #1

Price

$39.95
The latest version of eTrust EZ Antivirus is easier to use than ever, and continues to provide protection, detection, and elimination of thousands of computer viruses, worms, and Trojan horse programs.

eTrust EZ Anti-Virus was formerly known as InoculateIT Personal Edition.

Other Tools for best Antivirus

delicious digg technorati yahoo newsvine google socialize

Thursday, April 27, 2006

Top 75 Security Tools

From: http://www.insecure.org/tools.html

In May of 2003, I conducted a survey of Nmap users from the nmap-hackers mailing list to determine their favorite security tools. Each respondent could list up to 8. This was a followup to the highly successful June 2000 Top 50 list. An astounding 1854 people responded in '03, and their recommendations were so impressive that I have expanded the list to 75 tools! Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also plan to point newbies to this page whenever they write me saying "I do not know where to start".

Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. Many of the descriptions were taken from the application home page or the Debian or Freshmeat package descriptions. I removed marketing fluff like "revolutionary" and "next generation". No votes for the Nmap Security Scanner were counted because the survey was taken on an Nmap mailing list. This audience also means that the list is slightly biased toward "attack" tools rather than defensive ones.

These icons are used:
Did not appear on the 2000 list

Generally costs money. These rarely includes source code. A free limited/demo/trial version may be available.
Works on Linux
Works on FreeBSD/NetBSD/OpenBSD and/or proprietary UNIX systems (Solaris, HP-UX, IRIX, etc.)
Supports Microsoft Windows

Here is the list (starting with the most popular):



Nessus: Formerly open source vulnerability assessment tool
Nessus is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. It was open source for many years, but they turned proprietary in late 2005.




Ethereal: Sniffing the glue that holds the Internet together
Ethereal is a free network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, viewing summary and detail information for each packet. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. A text-based version called tethereal is included.




Snort: A free intrusion detection system (IDS) for the masses
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rule based language to describe traffic that it should collect or pass, and a modular detection engine. Many people also suggested that the Analysis Console for Intrusion Databases (ACID) be used with Snort.




Netcat: The network swiss army knife
A simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.




TCPDump / WinDump: The classic sniffer for network monitoring and data acquisition
Tcpdump is a well-known and well-loved text-based network packet analyzer ("sniffer"). It can be used to print out the headers of packets on a network interface that matches a given expression. You can use this tool to track down network problems or to monitor network activities. There is a separate Windows port named WinDump. TCPDump is also the source of the Libpcap/WinPcap packet capture library, which is used by Nmap among many other utilities. Note that many users prefer the newer Ethereal sniffer.



Hping2: A network probing utility like ping on steroids
hping2 assembles and sends custom ICMP/UDP/TCP packets and displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities.




DSniff: A suite of powerful network auditing and penetration-testing tools
This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI. A separately maintained partial Windows port is available here.





GFI LANguard: A commercial network security scanner for Windows
LANguard scans networks and reports information such as service pack level of each machine, missing security patches, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are outputted to an HTML report, which can be customized/queried. Apparently a limited free version is available for non-commercial/trial use.





Ettercap: In case you still thought switched LANs provide much extra security
Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like SSH and HTTPS). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.




Whisker/Libwhisker: Rain.Forest.Puppy's CGI vulnerability scanner and library
Whisker is a scanner which allows you to test HTTP servers for many known security holes, particularly the presence of dangerous CGIs. Libwhisker is a perl library (used by Whisker) which allows for the creation of custom HTTP scanners. If you wish to audit more than just web servers, have a look at Nessus.




John the Ripper: An extraordinarily powerful, flexible, and fast multi-platform password hash cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches.




OpenSSH / SSH: A secure way to access remote computers
Ssh (Secure Shell) is a program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. It is intended as a replacement for rlogin, rsh and rcp, and can be used to provide rdist, and rsync with a secure communication channel. OpenSSH is affiliated with the OpenBSD project, though a portable version runs on most UNIX systems. Note that the SSH.Com link above costs money for some uses, while OpenSSH is always free. Windows users may want to try the free PuTTY SSH Client or the nice terminal-based port of OpenSSH that comes with Cygwin. There are dozens of other clients (free or prorietary) available for most platforms - here is a huge list.



Sam Spade: Freeware Windows network query tool
SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more. Non-Windows users can enjoy online versions of many of their tools.




ISS Internet Scanner: Application-level vulnerability assessment
Internet Scanner started off in '92 as a tiny Open Source scanner by Christopher Klaus. Now he has grown ISS into a billion-dollar company with a myriad of security products. ISS Internet Scanner is pretty good, but is not cheap. So companies on a tight budget may wish to look at Nessus instead. A March 2003 Information Security magazine review of 5 VA tools (including these) is available here. Note that VA tools only report vulnerabilities. Commercial tools for actually exploiting them include CORE Impact and Dave Aitel's Canvas. Free exploits for some vulnerabilities can be found at sites like Packet Storm and SecurityFocus





Tripwire: The grand-daddy of file integrity checkers
A file and directory integrity checker. Tripwire is a tool that aids system administrators and users in monitoring a designated set of files for any changes. Used with system files on a regular (e.g., daily) basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner. An Open Source Linux version is freely available at Tripwire.Org. UNIX users may also want to consider AIDE, which has been designed to be a free Tripwire replacement. Or you may wish to investigate Radmind.





Nikto: A more comprehensive web scanner
Nikto is a web server scanner which looks for over 2000 potentially dangerous files/CGIs and problems on over 200 servers. It uses LibWhisker but is generally updated more frequently than Whisker itself.





Kismet: A powerful wireless sniffer
Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, and Ethereal and tcpdump compatible packet dump files. It also includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files. Windows support is currently preliminary, so those users may want to look at Netstumbler if they run into trouble. Linux (and Linux PDAs like Zaurus) users may wish to also look at the Wellenreiter wireless scanner.




SuperScan: Foundstone's Windows TCP port scanner
A connect-based TCP port scanner, pinger and hostname resolver. No source code is provided. It can handle ping scans and port scans using specified IP ranges. It can also connect to any discovered open port using user-specified "helper" applications (e.g. Telnet, Web browser, FTP).




L0phtCrack 4 (now called "LC4"): Windows password auditing and recovery application
L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). L0phtcrack currently costs $350/machine and no source code is provided. Companies on a tight budget may want to look at John the Ripper, Cain & Abel, and pwdump3.




Retina: Commertial vulnerability assessment scanner by eEye
Like Nessus and ISS Internet Scanner mentioned previously, Retina's function is to scan all the hosts on a network and report on any vulnerabilities found.


Netfilter: The current Linux kernel packet filter/firewall
Netfilter is a powerful packet filter which is implemented in the standard Linux kernel. The userspace iptables tool is used for configuration. It now supports packet filtering (stateless or stateful), all different kinds of NAT (Network Address Translation) and packet mangling. For non-Linux platforms, see pf (OpenBSD), ipfilter (many other UNIX variants), or even the Zone Alarm personal firewall (Windows).




traceroute/ping/telnet/whois: The basics
While there are many whiz-bang high-tech tools out there to assist in security auditing, don't forget about the basics! Everyone should be very familiar with these tools as they come with most operating systems (except that Windows omits whois and uses the name tracert). They can be very handy in a pitch, although for more advanced usage you may be better off with Hping2 and Netcat.




Fport: Foundstone's enhanced netstat
fport reports all open TCP/IP and UDP ports on the machine you run it on and shows what application opened each port. So it can be used to quickly identify unknown open ports and their associated applications. It only runs on Windows, but many UNIX systems now provided this information via netstat (try 'netstat -pan' on Linux). Here is a PDF-Format SANS article on using Fport and analyzing the results.




SAINT: Security Administrator's Integrated Network Tool
Saint is another commercial vulnerability assessment tool (like ISS Internet Scanner or eEye Retina). Unlike those Windows-only tools, SAINT runs exclusively on UNIX. Saint used to be free and open source, but is now a commercial product.




Network Stumbler: Free Windows 802.11 Sniffer
Netstumbler is the best known Windows tool for finding open wireless access points ("wardriving"). They also distribute a WinCE version for PDAs and such called Ministumbler. The tool is currently free but Windows-only and no source code is provided. They note that "the author reserves the right to change this license agreement as he sees fit, without notice." UNIX users (and advanced Win users) may want to look at Kismet instead.



SARA: Security Auditor's Research Assistant
SARA is a vulnerability assessment tool that was derived from the infamous SATAN scanner. They try to release updates twice a month and try to leverage other software created by the open source community (such as Nmap and Samba).





N-Stealth: Web server scanner
N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but do take their web site with a grain of salt. The claims of "30,000 vulnerabilities and exploits" and "Dozens of vulnerability checks are added every day" are highly questionable. Also note that essentially all general VA tools such as nessus, ISS, Retina, SAINT, and SARA include web scanning components. They may not all be as up-to-date or flexible though. N-stealth is Windows only and no source code is provided.





AirSnort: 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Windows support is still very preliminary.





NBTScan: Gathers NetBIOS info from Windows networks
NBTscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address.




GnuPG / PGP: Secure your files and communication w/advanced encryption
PGP is the famous encryption program by Phil Zimmerman which helps secure your data from eavesdroppers and other risks. GnuPG is a very well-regarded open source implentation of the PGP standard (the actual executable is named gpg). While GnuPG is always free, PGP costs money for some uses.



Firewalk: Advanced traceroute
Firewalk employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. This classic tool was rewritten from scratch in October 2002. Note that much or all of this functionality can also be performed by the Hping2 --traceroute option.




Cain & Abel: The poor man's L0phtcrack
Cain & Abel is a free password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary & Brute-Force attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. Source code is not provided.




XProbe2: Active OS fingerprinting tool
XProbe is a tool for determining the operating system of a remote host. They do this using some of the same techniques as Nmap as well as many different ideas. Xprobe has always emphasized the ICMP protocol in their fingerprinting approach.





SolarWinds Toolsets: A plethora of network discovery/monitoring/attack tools
SolarWinds has created and sells dozens of special-purpose tools targetted at systems administrators. Security related tools include many network discovery scanners and an SNMP brute-force cracker. These tools are Windows only, cost money, and do not include source code.




NGrep: Convenient packet matching & display
ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI, Token Ring and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.




Perl / Python: Portable, general-purpose scripting languages
While many canned security tools are available on this page for handling common tasks, it is important to have the ability to write your own (or modify the existing ones) when you need something more custom. Perl and Python make it very easy to write quick, portable scripts to test, exploit, or even fix systems! Archives like CPAN are filled with modules such as Net::RawIP and protocol implementations to make your tasks even easier.




THC-Amap: An application fingerprinting scanner
Amap (by THC) is a new but powerful scanner which probes each port to identify applications and services rather than relying on static port mapping.





OpenSSL: The premier SSL/TLS encryption library
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.




NTop: A network traffic usage monitor
Ntop shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user's terminal. In Web mode, it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics.




Nemesis: Packet injection simplified
The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux (and now Windows!). The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts. If you enjoy Nemesis, you might also want to look at hping2. They complement each other well.



LSOF: LiSt Open Files
This Unix-specific diagnostic and forensics tool lists information about any files that are open by processes currently running on the system. It can also list communications sockets open by each process.


Hunt: An advanced packet sniffing and connection intrusion tool for Linux
Hunt can watch TCP connections, intrude into them, or reset them. Hunt is meant to be used on ethernet, and has active mechanisms to sniff switched connections. Advanced features include selective ARP relaying and connection synchronization after attacks. If you like Hunt, also take a look at Ettercap and Dsniff.





Honeyd: Your own personal honeynet
Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Honeyd enables a single host to claim multiple addresses on a LAN for network simulation. It is possible to ping the virtual machines, or to traceroute them. Any type of service on the virtual machine can be simulated according to a simple configuration file. It is also possible to proxy services to another machine rather than simulating them. The web page is currently down for legal reasons, but the V. 0.5 tarball is still available here.




Achilles: A Windows web attack proxy
Achilles is a tool designed for testing the security of web applications. Achilles is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Achilles will intercept an HTTP session's data in either direction and give the user the ability to alter the data before transmission. For example, during a normal HTTP SSL connection a typical proxy will relay the session between the server and the client and allow the two end nodes to negotiate SSL. In contrast, when in intercept mode, Achilles will pretend to be the server and negotiate two SSL sessions, one with the client browser and another with the web server. As data is transmitted between the two nodes, Achilles decrypts the data and gives the user the ability to alter and/or log the data in clear text before transmission.




Brutus: A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available. UNIX users should take a look at THC-Hydra.





Stunnel: A general-purpose SSL cryptographic wrapper
The stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. It will negotiate an SSL connection using the OpenSSL or SSLeay libraries.




Paketto Keiretsu: Extreme TCP/IP
The Paketto Keiretsu is a collection of tools that use new and unusual strategies for manipulating TCP/IP networks. They tap functionality within existing infrastructure and stretch protocols beyond what they were originally intended for. It includes Scanrand, an unusually fast network service and topology discovery system, Minewt, a user space NAT/MAT router, linkcat, which presents a Ethernet link to stdio, Paratrace, which traces network paths without spawning new connections, and Phentropy, which uses OpenQVIS to render arbitrary amounts of entropy from data sources in three dimensional phase space. Got all that? :).




Fragroute: IDS systems' worst nightmare
Fragroute intercepts, modifies, and rewrites egress traffic, implementing most of the attacks described in the Secure Networks IDS Evasion paper. It features a simple ruleset language to delay, duplicate, drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all outbound packets destined for a target host, with minimal support for randomized or probabilistic behaviour. This tool was written in good faith to aid in the testing of intrusion detection systems, firewalls, and basic TCP/IP stack behaviour. Like Dsniff, and Libdnet, this excellent tool was written by Dug Song.





SPIKE Proxy: HTTP Hacking
Spike Proxy is an open source HTTP proxy for finding security flaws in web sites. It is part of the Spike Application Testing Suite and supports automated SQL injection detection, web site crawling, login form brute forcing, overflow detection, and directory traversal detection.




THC-Hydra: Parallized network authentication cracker
This tool allows for rapid dictionary attacks against network login systems, including FTP, POP3, IMAP, Netbios, Telnet, HTTP Auth, LDAP NNTP, VNC, ICQ, Socks5, PCNFS, and more. It includes SSL support and is apparently now part of Nessus. Like Amap, this release is from the fine folks at THC.

The Next 25

To save space & time, the next 25 best tools are listed in a more compact table:

  • OpenBSD: The proactively secure operating system.
  • TCP Wrappers: A classic IP-based access control and logging mechanism
  • pwdump3: Allows for retreiving Windows password hashes locally or across the network whether or not syskey is enabled.
  • LibNet: A high-level API (toolkit) allowing the application programmer to construct and inject network packets
  • IpTraf: IP Network Monitoring Software
  • Fping: A parallel ping scanning program
  • Bastille: Security hardening script for Linux, Mac OS X, and HP-UX
  • Winfingerprint: A Win32 Host/Network Enumeration Scanner
  • TCPTraceroute: A traceroute implementation using TCP packets
  • Shadow Security Scanner: A commercial vulnerability assessment tool
  • pf: The innovative packet filter in OpenBSD
  • LIDS: A Linux kernel intrusion detection/defense system
  • hfnetchk: Microsoft tool for checking the patch status of all the Windows machines on a network from a central location
  • etherape: A graphical network monitor for Unix modeled after etherman
  • dig: A handy DNS query tool that comes free with Bind
  • Crack / Cracklib: Alec Muffett's classic local password cracker
  • cheops / cheops-ng: Gives a simple interface to many network utilities, maps local or remote networks and identifies OS of machines
  • zone alarm: Windows Personal firewall software. They offer a limited free version, but much of the functionality is disabled. Some users prefer Kerio Personal Firewall, which also sports free and commercial versions.
  • Visual Route: Obtains traceroute/whois data and plots it on a World map
  • The Coroner's Toolkit (TCT): A collection of tools that are either oriented towards gathering or analyzing forensic data on a Unix system
  • tcpreplay: a tool to replay saved tcpdump or snoop files at arbitrary speeds
  • snoop: A well-known gangsta rapper (Snoop Dogg)! It is also a network sniffer that comes with Solaris.
  • putty: An excellent Windows SSH client
  • pstools: A suite of free command-line tools for managing Windows systems (process listings, command execution, etc)
  • arpwatch: Keeps track of ethernet/ip address pairings and can detect certain monkey business

delicious digg technorati yahoo newsvine google socialize