Top 10 Linux Tools1. nmap
- Nmap ("Network Mapper") is a free open source utility for network
exploration or security auditing. It was designed to rapidly scan large
networks, although it works fine against single hosts. Nmap uses raw IP
packets in novel ways to determine what hosts are available on the
network, what services (application name and version) those hosts are
offering, what operating systems (and OS versions) they are running,
what type of packet filters/firewalls are in use, and dozens of other
characteristics. Nmap runs on most types of computers and both console
and graphical versions are available.
2. Nikto
- Nikto is an Open Source (GPL) web server scanner which performs
comprehensive tests against web servers for multiple items, including
over 3200 potentially dangerous files/CGIs, versions on over 625
servers, and version specific problems on over 230 servers. Scan items
and plugins are frequently updated and can be automatically updated (if
desired).
3. THC-Amap
- Amap is a next-generation tool for assistingnetwork penetration
testing. It performs fast and reliable application protocol detection,
independant on the TCP/UDP port they are being bound to.
4. Ethereal
- Ethereal is used by network professionals around the world for
troubleshooting, analysis, software and protocol development, and
education. It has all of the standard features you would expect in a
protocol analyzer, and several features not seen in any other product.
5. THC-Hydra
- Number one of the biggest security holes are passwords, as every
password security study shows. Hydra is a parallized login cracker which
supports numerous protocols to attack. New modules are easy to add,
beside that, it is flexible and very fast.
6. Metasploit Framework
- The Metasploit Framework is an advanced open-source platform for
developing, testing, and using exploit code. This project initially
started off as a portable network game and has evolved into a powerful
tool for penetration testing, exploit development, and vulnerability
research.
7. John the Ripper
- John the Ripper is a fast password cracker, currently available for
many flavors of Unix (11 are officially supported, not counting
different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary
purpose is to detect weak Unix passwords. Besides several crypt(3)
password hash types most commonly found on various Unix flavors,
supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM
hashes, plus several more with contributed patches.
8. Nessus
- Nessus is the world's most popular vulnerability scanner used in over
75,000 organisations world-wide. Many of the world's largest
organisations are realising significant cost savings by using Nessus to
audit business-critical enterprise devices and applications.
9. IRPAS - Internetwork Routing Protocol Attack Suite
- Routing protocols are by definition protocols, which are used by
routers to communicate with each other about ways to deliver routed
protocols, such as IP. While many improvements have been done to the
host security since the early days of the Internet, the core of this
network still uses unauthenticated services for critical communication.
10. Rainbowcrack
- RainbowCrack is a general propose implementation of Philippe
Oechslin's faster time-memory trade-off technique. In short, the
RainbowCrack tool is a hash cracker. A traditional brute force cracker
try all possible plaintexts one by one in cracking time. It is time
consuming to break complex password in this way. The idea of time-memory
trade-off is to do all cracking time computation in advance and store
the result in files so called "rainbow table".
Top 10 Windows Tools1. Cain & Abel
- Cain & Abel is a password recovery tool for the Microsoft Windows
Operating System. It allows easy recovery of various kind of passwords
by sniffing the network, cracking encrypted passwords using Dictionary,
Brute-Force and Cryptanalysis attacks, recording VoIP conversations,
decoding scrambled passwords, revealing password boxes, uncovering
cached passwords and analyzing routing protocols.
2. SuperScan
- SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan
4 (Current Version) is a completely-rewritten update of the highly
popular Windows port scanning tool, SuperScan.
3. GFI LANguard Network Security Scanner
- GFI LANguard N.S.S. is a network vulnerability management solution
that scans your network and performs over 15,000 vulnerability
assessments. It identifies all possible security threats and provides
you with tools to patch and secure your network. GFI LANguard N.S.S. was
voted Favorite Commercial Security Tool by NMAP users for 2 years
running and has been sold over 200,000 times!
4. Retina
- Retina Network Security Scanner, recognised as the industry standard
for vulnerability assessment, identifies known security vulnerabilities
and assists in prioritising threats for remediation. Featuring fast,
accurate, and non-intrusive scanning, users are able to secure their
networks against even the most recent of discovered vulnerabilities.
5. SamSpade
- SamSpade provides a consistent GUI and implementation for many handy
network query tasks. It was designed with tracking down spammers in
mind, but can be useful for many other network exploration,
administration, and security tasks. It includes tools such as ping,
nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone
transfer, SMTP relay check, website search, and more.
6. N-Stealth
- N-Stealth is a commercial web server security scanner. It is
generally updated more frequently than free web scanners such as whisker
and nikto, but you have to pay for the privilege.
7. Solarwinds
- Solarwinds contains many network monitoring, discovery and attack
tools. The advanced security tools not only test internet security with
the SNMP Brute Force Attack and Dictionary Attack utilities but also
validate the security on Cisco Routers with the Router Security Check.
The Remote TCP Reset remotely display all active sessions on a device
and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port
Scanner allows testing for open TCP ports across IP Address and port
ranges or selection of specific machines and ports.
8. Achilles
- The first publicly released general-purpose web application security
assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user
to intercept, log, and modify web traffic on the fly. Due to a cyber
squatter, Achilles is no longer online at its original home of
www.Digizen-Security.com...OOPS!
9. CookieDigger -
CookieDigger helps identify weak cookie generation and insecure
implementations of session management by web applications. The tool
works by collecting and analyzing cookies issued by a web application
for multiple users. The tool reports on the predictability and entropy
of the cookie and whether critical information, such as user name and
password, are included in the cookie values.
10. Netcat (The Network SwissArmy Knife)
- Net cat was originally a Unix utility which reads and writes data
across network connections, using TCP or UDP protocol. It is designed to
be a reliable "back-end" tool that can be used directly or easily
driven by other programs and scripts. At the same time, it is a
feature-rich network debugging and exploration tool, since it can create
almost any kind of connection you would need and has several
interesting built-in capabilities.