Skip to main content

Footprinting Scanning

Download Sam Spade from this web site and install it. Sam Spade is a graphical tool which allows you to do DNS interrogation and many other things. See a tutorial here. The features which make Sam Spade a key security tool are:
Advanced DNS – DIG tool requests all the DNS records for a host or domain
Zone Transfer – ask a DNS server for all it knows about a domain
SMTP Relay Check – check whether a mail server allows third party relaying
Scan Addresses – scan a range of IP addresses looking for open ports
Crawl Web site – search a Web site, looking for email addresses, offsite links, download a Web site
Search IP block – finds the IP block for an organization
Sam Spade also does whois, traceroute, finger and dns lookup.
SuperScan
Download SuperScan from its new location and install it. SuperScan allows you to scan a range of IP addresses and do TCP port scanning. It can check all ports, or the ones you select. It is a very fast and powerful tool. You can see a tutorial here and a youtube video, too.
Nmap
Download Nmap from its Web site. You will use it in both Windows and UNIX/Linux. It can do ping sweeps, OS identification, in addition to what can be done with SuperScan. You can see most of its options and commands at its Web site Options summary. and more details can be seen in its online book version. Of course you can also see an youtube video on the nmap basics.
TcpView
TcpView is a free tool for Windows that enables you to monitor all open TCP and UDP ports on the local computer. You can download it from the Microsoft Sysinternals download site. As you can see in this image it shows not only the open ports, but also what application in your PC is linked to the open ports. If a connection is established with a remote host you can see the remote host IP number. TcpView is not a Intrusion Detection System, but provides a picture of is going on in your computer regarding to ports and refreshes automatically, so you can see the changes that are happening.
OWASP Zed:
The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen testers toolbox.
ZAP is a popular tool because it does have a lot of support and the OWASP community is an excellent resource for those that work in Cyber Security. ZAP provides automated scanners as well as various tools that allow you the cyber pro to discover security vulnerabilities manually. Understanding and being able to master this tool would also be advantageous to your career as a penetration tester.
Wireshark:
WireShark is a very popular tool in networking. It is the network protocol analyzer tool which lets you check different things in your office or home network. You can live capture packets and analyze packets to find various things related to the network by checking the data at the micro-level. This tool is available for Windows, Linux, OS X, Solaris, FreeBSD and other platforms.
WireShark has been highly developed, and it includes filters, color-coding and other features that let the user dig deep into network traffic and inspect individual packets. If you would like to become a penetration tester or work as a Cyber Security practitioner, then learning how to use Wireshark is a must.
Nikto Website Vulnerability Scanner:
Nikto is another classic ‘Hacking Tool’ that a lot of pentesters like to use. It is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.
Interestingly, Nikto can also check server configuration items such as the presence of multiple index files, HTTP server options, and the platform will also try to identify installed web servers and web applications. Nikto will get picked up by any semi-decent IDS tool, so it is useful when conducting a white-hat/ white-box pentest.
The list of hacking tools is not limited to those discussed above; preference varies organization to organization. However, these are the most recommended tools that are preferred by the professionals. Moreover, all these tools come bundled in pentesting Linux distro’s such as Kali Linux or BackBox, so it is certainly recommended that you install an appropriate Linux hacking box to make your life easier – not least because repositories are updated automatically.
Bigbrother
It is designed to see how network is performing in near real time from any web browser.
it display status information as web ages or WML pages for WAP-enabled devices.
BiLe Suite
Itself stand for Bi-directional Link Extraction
It contains a number of PERL scripts that can be used by a Penetration Tester to aid in the enumeration phase of a test
My IP Suite
Its combines domain-to-IP Converter , Batch Ping , Tracert , Whois ,Website Scanner and Connection Monitor as well as an IP-to-country converter into a Single Interface.
Dns Enumerator
its an automatd sub-domain retrieval tool and it scan google to extract the result
Spider Foot
it will scarpe the the website on that domain as well as search Google, Netcraft,Whois and DNS to build up information
Nessus
Once you find the list of open ports, the next step is start looking for vulnerability in the servers. One of the efficient tools to vulnerability scan is Nessus. Remember that Nessus is not a free tool.

Comments

Popular posts from this blog

SUMMER INTERNSHIP TRAINING 2018

SUMMER INTERNSHIP 2018 CRAW Security  invites applicants or candidates for its 2018 Summer Internship Program in Computer Science, Information Security, Networking, Web Development , Software Development, Management and Marketing at its locations in New Delhi. We are seeking highly motivated students, who are interested in experiencing an exciting Summer of research. The selected students will have the opportunity to work closely with an outstanding research team on challenging problems that range from leading-edge exploratory work to prototyping real-world systems and applications. During the internship, the students will also have the opportunity to participate in the workshops, competitions, events, live projects of the largest industrial research organization in the world and network with other top students in different fields from other universities. We offer internship positions in various research. Benefits of Summer Internship 2018   ...

Cross Site Scripting

Cross Site Scripting XSS is a vulnerability when which present in websites or web applications, allows malicious users (Hackers) to insert their client side code (normally JavaScript) in those web pages. When this malicious code along with the original webpage gets displayed in the web client (browsers like chrome IE, Mozilla etc), and it is allows Hackers to gain greater access of that page.The goal of the CSS attack is to steal the client cookies, or any other sensitive information, which can identify the client with the web site. With the token of the legitimate user at hand, the attacker can proceed to act as the user in his/her interaction with the site – specifically, impersonate the user Example : in corsss site scrpting we can gether credit card number and private information using a CSS attack. This was achieved by running malicious Javascript code at the victim (client) browser with the access privileges of the web site These are the very limited Javascript priv...