Blackbuntu Security and Penetration Testing tools :
** Information Gathering
DNS : DnsEnum, Dnsbf, Dnsmap, Dnsrecon, DnsTracer, Dns-Walk, Dril, Fierce, FindDomains, HostMap, Lynis, Nmbscan, ripdc, quickrecon
Email Harvesting : theHarvester
Routing : 0trace, Itrace, Lanmap2, Nat Probe, Netenum, Netmask, NMBscan, Protos, Tctrace, TCPtraceroute
Search Engines : Bing-ip2hosts, Goorecon, Gooscan, Maltego, Metagoofil, Search Engine Assessment Toolkit (SEAT)
** Network Mapping
Identify Live Hosts : 0trace, 5nmp, Angry IP Scanner, Autoscan, Fping, Hping3, Lanmap, Nbtscan, Netdiscover, Netifera, Nmap, Nsat, Onesixtyone, OutputPBN, ScanPBNJ, SCTPscan, Sslscan, TCPtraceroute, Xprobe2, Zenmap
Network Analysis : Hyenae
OS Fingerprinting : 5nmp, Autoscan, Nmap, Nsat, Onesixtyone, P0f, Protos, Sslscan, Xprobe2, Zenmap
Port Scanning : Autoscan, Genlist, Netifera, Nmap, OutputPBNJ, Propecia, ScanPBNJ, SCTPscan, Zenmap
Service Fingerprinting : Amap, Httprint, Httsquash, Letdown, Nmap, ReverseRaider
VPN : IKE-Scan, PSK-Crack
** Vulnerability Identification
OpenVAS 4
Cisco : Cisco Auditing Tool, Cisco Global Exploiter, Cisco OCS Mass Scanner, Cisco Passwd Scanner, Cisco Torch, Cisco Router Config, Merge Router Config
Databases
MS-SQL : Automatic, aidSQL, Bsqlbf, DBPwAudit, Metacoretex, mssqlhaxor, MSSQL Scan, Multi Injector, Pbline, SA Exploiter, SQLBrute, SQLiX, Sqlmap, Sqlninja, SQLAT- SQL Auditing Tools
MYSQL : aidSQL, Automagic, Bsqlbf, DBPwAudit, Metacoretex, MiniMySqlat0r, MySQL Audit, MySQloit, Pblind, SQLcheck, SQLData, SQLiX, Sqlmap, Sqlsus
ORACLE : DBPwAudit, Metacoretex, Opwg, Oquery, Oscanner, Ose, Otnsctl, Pblind, POET, SQLBrute, SQLiX, Sqlmap, THC-OracleCrackert
Fuzzer : Fuzzer, Bed, Bf2, Bunny, FireFuzzer, FuzzDB, Fuzzgrind, JbroFuzz, Peach, SPIKE, Voiper, Wsfuzzer
SMB Analysis : Enum4Linux, Impacket samrdump, Impacket smbclient, Keimpx, SMB Client
SNMP Analysis : ADMsnmp, Braa, SNMP Check, SNMP Enum, SNMP Walk
Web Security Analysis : Andiparos, ASP-Audit, Burpsuite, CMS Exploorer, CSRFtester, Curl, DAV Test, DFF Scanner, DharmaEncoder, DirBuster, Fimap, Flare, Flasm, Grabber, Grendel Scan, Halberd, Hcraft, Httprint, Jmeter, Joomscan, Joonsq, Lbd, LFImap, LFI Sploiter, List-Urls, MiniMySqlat0r, Nikto2, openAcuntix, Paros Proxy, PowerFuzzer, Ratproxy, Skipfish, SOAPUI, SWFintruder, W3AF, Wafp, Wafw00f, Wapiti, Wbox, Webscarab, WebSecurity, Webshong, Wfuzz, Wmat, WPsqli, XSSer, Xssploit, xsss, Zaproxy
** Penetration : Armitage, BeEF, ExploitDB, Fast Track, Inguma, Metasploit, Pirana, Orimagi-pdf, Sapyto, SET
** Privilege Escalation
Offline Password Attacks : Rainbowcrack, Bkhive, CeWL, Chntpw, Crunch, CUPP, Hashcat, John, Oclhashcat, Ophcrack, Pw-inspector, Pyrit, Rarcrack, SaltyMD5, Samdump2, Wyd
Online Password Attacks : BruteSSH, DNSBruteforce, Hydra, Ledowep, Medusa, NCrack, RWW-Attack, SSHater, TFTP-bruteforce, VNCrack
Sniffers : Arpaler, Drifnet, DSniff, EtherApe, Ettercap, Ferret, Hamster, Ntop, SMBRelay3, SSLDump, SSLStrip, TcPick, Wireshark, Xspy, Xwatchwin
Spoofing : ADM-dns-tools, EtherApe, Ettercap, ICMP Redirect, Igrp route injection, Inundator, IDRP Responder, ISP, Middler, Nemesis, Netenum, Netsed, PackETH, Packit, Scapy, SSLDumo, SSLStrip, TCPreplay, THC-IPv6, Yersinia
** Maintaining Access
Backdoors and Rootkits : Web Backdoors Compilation
Tunneling : Tunneling, 3proxy, 6tunnel, CryptCat, DNS2tcp, gSTM, Miredo, Nstx, Proxychains, ProxyTunnel, Ptunnel, Sbd, Socat, Stunnel4, Tinyproxy, UDPtunnel, Vidalia
** Radio Network Analysis
802.11 : AP Hopper, ASLEAP, AirSnarf, Aircrack-ng, Airdrop-ng, Airgraph-ng, Cowpatty, FakeAP, File2Air, Gerix-wifi-crack-ng, Genpmk, Grimwepa, Giskismet, Kismet-Newcore, Kmsapng, Mitmap, Wepbuster, WEPCrack, Wicrawl, Wi-fEye, Wifitap, Wifite, Wifizoo
Bluetooth : BCCMD, Bluebugger, Blueprint, Bluescan, Bluesmash, Bluesnarfer, Bluesquirrel, Braces, BSS, BTAddr, BTAudit psm, BTAudit rfcomm, BTPinCrack, Btscanner, Carshisperer, CW Tools, Frontline, Ghettotooth, HCIDump, HID-Attack, ObexFTP, ObexStress, Packet Replay, Tanya, TBear, TBSearch, Ussp-Push
RFID : RFIDIOt ACG, RFIDIOt Forsch, RFIDIOt PCSC
** VoIP Analysis : Ace, Add_Registrations, EnumIAX, Erase_Registration, Iaxflood, IviteFlood, Iwar, Ohrwurm, Pcapsipdump, Protos-sip, Redirectpoisoon, RtpBreak, RtpFlood, RtpInject, RtpInsertSound, RtpMixSound, Sipbomber, Sipcrack, Sip_Rogue, Sipscan, Sipvicios, Smap, Ucsniff, Vnak, Voiper, VoipHopper, Voipong, Vomit, Warvox
** Digital Forensic
PyFlag
File Carving : Foremost, Magicrescue, Scalpel
Forensic Analysis : Autospy, MboxGrep, PhotoRec, Scalpel, TestDisk, Vinetto
Image Acquiring : Afcat, Afcompare, Afconvert, Affix, Afinfo, Afstats, Afxml, Aimage, Air Imager, Chkrootkit, Clanscan, DCFLDD, DC_Rescue, Galleta
Anti Forensic : Scrub, Wipe
** Reverse Engineering : Dissy, Evan's Debugger, GDB GNU Debugger, Metasm
** Miscellanious : Graudit, Icommander, Ipcalc, Lynis Auditong Tools, Maccanger, Pentbox, SendEmail, Ultiman
System requirements :
1GHz x86 processor
768 MB of system memory (RAM)
10 GB of disk space for installation
Graphics card capable of 800×600 resolution
DVD-ROM drive or USB port
DNS : DnsEnum, Dnsbf, Dnsmap, Dnsrecon, DnsTracer, Dns-Walk, Dril, Fierce, FindDomains, HostMap, Lynis, Nmbscan, ripdc, quickrecon
Email Harvesting : theHarvester
Routing : 0trace, Itrace, Lanmap2, Nat Probe, Netenum, Netmask, NMBscan, Protos, Tctrace, TCPtraceroute
Search Engines : Bing-ip2hosts, Goorecon, Gooscan, Maltego, Metagoofil, Search Engine Assessment Toolkit (SEAT)
** Network Mapping
Identify Live Hosts : 0trace, 5nmp, Angry IP Scanner, Autoscan, Fping, Hping3, Lanmap, Nbtscan, Netdiscover, Netifera, Nmap, Nsat, Onesixtyone, OutputPBN, ScanPBNJ, SCTPscan, Sslscan, TCPtraceroute, Xprobe2, Zenmap
Network Analysis : Hyenae
OS Fingerprinting : 5nmp, Autoscan, Nmap, Nsat, Onesixtyone, P0f, Protos, Sslscan, Xprobe2, Zenmap
Port Scanning : Autoscan, Genlist, Netifera, Nmap, OutputPBNJ, Propecia, ScanPBNJ, SCTPscan, Zenmap
Service Fingerprinting : Amap, Httprint, Httsquash, Letdown, Nmap, ReverseRaider
VPN : IKE-Scan, PSK-Crack
** Vulnerability Identification
OpenVAS 4
Cisco : Cisco Auditing Tool, Cisco Global Exploiter, Cisco OCS Mass Scanner, Cisco Passwd Scanner, Cisco Torch, Cisco Router Config, Merge Router Config
Databases
MS-SQL : Automatic, aidSQL, Bsqlbf, DBPwAudit, Metacoretex, mssqlhaxor, MSSQL Scan, Multi Injector, Pbline, SA Exploiter, SQLBrute, SQLiX, Sqlmap, Sqlninja, SQLAT- SQL Auditing Tools
MYSQL : aidSQL, Automagic, Bsqlbf, DBPwAudit, Metacoretex, MiniMySqlat0r, MySQL Audit, MySQloit, Pblind, SQLcheck, SQLData, SQLiX, Sqlmap, Sqlsus
ORACLE : DBPwAudit, Metacoretex, Opwg, Oquery, Oscanner, Ose, Otnsctl, Pblind, POET, SQLBrute, SQLiX, Sqlmap, THC-OracleCrackert
Fuzzer : Fuzzer, Bed, Bf2, Bunny, FireFuzzer, FuzzDB, Fuzzgrind, JbroFuzz, Peach, SPIKE, Voiper, Wsfuzzer
SMB Analysis : Enum4Linux, Impacket samrdump, Impacket smbclient, Keimpx, SMB Client
SNMP Analysis : ADMsnmp, Braa, SNMP Check, SNMP Enum, SNMP Walk
Web Security Analysis : Andiparos, ASP-Audit, Burpsuite, CMS Exploorer, CSRFtester, Curl, DAV Test, DFF Scanner, DharmaEncoder, DirBuster, Fimap, Flare, Flasm, Grabber, Grendel Scan, Halberd, Hcraft, Httprint, Jmeter, Joomscan, Joonsq, Lbd, LFImap, LFI Sploiter, List-Urls, MiniMySqlat0r, Nikto2, openAcuntix, Paros Proxy, PowerFuzzer, Ratproxy, Skipfish, SOAPUI, SWFintruder, W3AF, Wafp, Wafw00f, Wapiti, Wbox, Webscarab, WebSecurity, Webshong, Wfuzz, Wmat, WPsqli, XSSer, Xssploit, xsss, Zaproxy
** Penetration : Armitage, BeEF, ExploitDB, Fast Track, Inguma, Metasploit, Pirana, Orimagi-pdf, Sapyto, SET
** Privilege Escalation
Offline Password Attacks : Rainbowcrack, Bkhive, CeWL, Chntpw, Crunch, CUPP, Hashcat, John, Oclhashcat, Ophcrack, Pw-inspector, Pyrit, Rarcrack, SaltyMD5, Samdump2, Wyd
Online Password Attacks : BruteSSH, DNSBruteforce, Hydra, Ledowep, Medusa, NCrack, RWW-Attack, SSHater, TFTP-bruteforce, VNCrack
Sniffers : Arpaler, Drifnet, DSniff, EtherApe, Ettercap, Ferret, Hamster, Ntop, SMBRelay3, SSLDump, SSLStrip, TcPick, Wireshark, Xspy, Xwatchwin
Spoofing : ADM-dns-tools, EtherApe, Ettercap, ICMP Redirect, Igrp route injection, Inundator, IDRP Responder, ISP, Middler, Nemesis, Netenum, Netsed, PackETH, Packit, Scapy, SSLDumo, SSLStrip, TCPreplay, THC-IPv6, Yersinia
** Maintaining Access
Backdoors and Rootkits : Web Backdoors Compilation
Tunneling : Tunneling, 3proxy, 6tunnel, CryptCat, DNS2tcp, gSTM, Miredo, Nstx, Proxychains, ProxyTunnel, Ptunnel, Sbd, Socat, Stunnel4, Tinyproxy, UDPtunnel, Vidalia
** Radio Network Analysis
802.11 : AP Hopper, ASLEAP, AirSnarf, Aircrack-ng, Airdrop-ng, Airgraph-ng, Cowpatty, FakeAP, File2Air, Gerix-wifi-crack-ng, Genpmk, Grimwepa, Giskismet, Kismet-Newcore, Kmsapng, Mitmap, Wepbuster, WEPCrack, Wicrawl, Wi-fEye, Wifitap, Wifite, Wifizoo
Bluetooth : BCCMD, Bluebugger, Blueprint, Bluescan, Bluesmash, Bluesnarfer, Bluesquirrel, Braces, BSS, BTAddr, BTAudit psm, BTAudit rfcomm, BTPinCrack, Btscanner, Carshisperer, CW Tools, Frontline, Ghettotooth, HCIDump, HID-Attack, ObexFTP, ObexStress, Packet Replay, Tanya, TBear, TBSearch, Ussp-Push
RFID : RFIDIOt ACG, RFIDIOt Forsch, RFIDIOt PCSC
** VoIP Analysis : Ace, Add_Registrations, EnumIAX, Erase_Registration, Iaxflood, IviteFlood, Iwar, Ohrwurm, Pcapsipdump, Protos-sip, Redirectpoisoon, RtpBreak, RtpFlood, RtpInject, RtpInsertSound, RtpMixSound, Sipbomber, Sipcrack, Sip_Rogue, Sipscan, Sipvicios, Smap, Ucsniff, Vnak, Voiper, VoipHopper, Voipong, Vomit, Warvox
** Digital Forensic
PyFlag
File Carving : Foremost, Magicrescue, Scalpel
Forensic Analysis : Autospy, MboxGrep, PhotoRec, Scalpel, TestDisk, Vinetto
Image Acquiring : Afcat, Afcompare, Afconvert, Affix, Afinfo, Afstats, Afxml, Aimage, Air Imager, Chkrootkit, Clanscan, DCFLDD, DC_Rescue, Galleta
Anti Forensic : Scrub, Wipe
** Reverse Engineering : Dissy, Evan's Debugger, GDB GNU Debugger, Metasm
** Miscellanious : Graudit, Icommander, Ipcalc, Lynis Auditong Tools, Maccanger, Pentbox, SendEmail, Ultiman
System requirements :
1GHz x86 processor
768 MB of system memory (RAM)
10 GB of disk space for installation
Graphics card capable of 800×600 resolution
DVD-ROM drive or USB port
0 comments:
Post a Comment