Skip to main content

Footprinting Scanning

Download Sam Spade from this web site and install it. Sam Spade is a graphical tool which allows you to do DNS interrogation and many other things. See a tutorial here. The features which make Sam Spade a key security tool are:
Advanced DNS – DIG tool requests all the DNS records for a host or domain
Zone Transfer – ask a DNS server for all it knows about a domain
SMTP Relay Check – check whether a mail server allows third party relaying
Scan Addresses – scan a range of IP addresses looking for open ports
Crawl Web site – search a Web site, looking for email addresses, offsite links, download a Web site
Search IP block – finds the IP block for an organization
Sam Spade also does whois, traceroute, finger and dns lookup.
SuperScan
Download SuperScan from its new location and install it. SuperScan allows you to scan a range of IP addresses and do TCP port scanning. It can check all ports, or the ones you select. It is a very fast and powerful tool. You can see a tutorial here and a youtube video, too.
Nmap
Download Nmap from its Web site. You will use it in both Windows and UNIX/Linux. It can do ping sweeps, OS identification, in addition to what can be done with SuperScan. You can see most of its options and commands at its Web site Options summary. and more details can be seen in its online book version. Of course you can also see an youtube video on the nmap basics.
TcpView
TcpView is a free tool for Windows that enables you to monitor all open TCP and UDP ports on the local computer. You can download it from the Microsoft Sysinternals download site. As you can see in this image it shows not only the open ports, but also what application in your PC is linked to the open ports. If a connection is established with a remote host you can see the remote host IP number. TcpView is not a Intrusion Detection System, but provides a picture of is going on in your computer regarding to ports and refreshes automatically, so you can see the changes that are happening.
OWASP Zed:
The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen testers toolbox.
ZAP is a popular tool because it does have a lot of support and the OWASP community is an excellent resource for those that work in Cyber Security. ZAP provides automated scanners as well as various tools that allow you the cyber pro to discover security vulnerabilities manually. Understanding and being able to master this tool would also be advantageous to your career as a penetration tester.
Wireshark:
WireShark is a very popular tool in networking. It is the network protocol analyzer tool which lets you check different things in your office or home network. You can live capture packets and analyze packets to find various things related to the network by checking the data at the micro-level. This tool is available for Windows, Linux, OS X, Solaris, FreeBSD and other platforms.
WireShark has been highly developed, and it includes filters, color-coding and other features that let the user dig deep into network traffic and inspect individual packets. If you would like to become a penetration tester or work as a Cyber Security practitioner, then learning how to use Wireshark is a must.
Nikto Website Vulnerability Scanner:
Nikto is another classic ‘Hacking Tool’ that a lot of pentesters like to use. It is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.
Interestingly, Nikto can also check server configuration items such as the presence of multiple index files, HTTP server options, and the platform will also try to identify installed web servers and web applications. Nikto will get picked up by any semi-decent IDS tool, so it is useful when conducting a white-hat/ white-box pentest.
The list of hacking tools is not limited to those discussed above; preference varies organization to organization. However, these are the most recommended tools that are preferred by the professionals. Moreover, all these tools come bundled in pentesting Linux distro’s such as Kali Linux or BackBox, so it is certainly recommended that you install an appropriate Linux hacking box to make your life easier – not least because repositories are updated automatically.
Bigbrother
It is designed to see how network is performing in near real time from any web browser.
it display status information as web ages or WML pages for WAP-enabled devices.
BiLe Suite
Itself stand for Bi-directional Link Extraction
It contains a number of PERL scripts that can be used by a Penetration Tester to aid in the enumeration phase of a test
My IP Suite
Its combines domain-to-IP Converter , Batch Ping , Tracert , Whois ,Website Scanner and Connection Monitor as well as an IP-to-country converter into a Single Interface.
Dns Enumerator
its an automatd sub-domain retrieval tool and it scan google to extract the result
Spider Foot
it will scarpe the the website on that domain as well as search Google, Netcraft,Whois and DNS to build up information
Nessus
Once you find the list of open ports, the next step is start looking for vulnerability in the servers. One of the efficient tools to vulnerability scan is Nessus. Remember that Nessus is not a free tool.

Comments

Popular posts from this blog

Certified Ethical Hacker(CEH) Official (CEH) Training and Certification Course

Certified Ethical Hacker (CEH) Official (CEH) Training and Certification Course Certified Ethical Hacker  (CEH)  Training  is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a black hate hacker, but Certified Ethical Hacker (ceh)   is work with a lawful  manner to assess the security posture of a target system(s). the  ethical hacking  certification (ceh)  have the power to provide you to better understating  of  ethical hacking  and it’s course (CEH)Certified Ethical Hacker summer Internship  Contents Introduction to Ethical Hacking Foot printing and reconnaissance Foot-printing Active (Tool Based Practical) Foot-printing Passive (Passive Approach) In-depth Network Scanning Enumeration User Identification System Hacking Password Cracking & Bypassing Viruses and Worms Trojan a...

SUMMER INTERNSHIP TRAINING 2018

SUMMER INTERNSHIP 2018 CRAW Security  invites applicants or candidates for its 2018 Summer Internship Program in Computer Science, Information Security, Networking, Web Development , Software Development, Management and Marketing at its locations in New Delhi. We are seeking highly motivated students, who are interested in experiencing an exciting Summer of research. The selected students will have the opportunity to work closely with an outstanding research team on challenging problems that range from leading-edge exploratory work to prototyping real-world systems and applications. During the internship, the students will also have the opportunity to participate in the workshops, competitions, events, live projects of the largest industrial research organization in the world and network with other top students in different fields from other universities. We offer internship positions in various research. Benefits of Summer Internship 2018   ...

Cyber Attack

Cyber Attack computer to computer attacks is called cyber attack Cyber attack is the type of attack which is targeted by the hacker for stealing sensitive information or data now days we can see that the cyber attack is the common thinks when you are on the internet the cyber attacker may be a professional or unprofessional so they may be work for the money or personal benefits the cyber attacker is attacks you when you are on the internet or transferring data on the internet like online banking ,online shopping the cyber attacker my stealing your password card number, account number information for personal benefit the cyber attack is the type of crime which is done by the human for personal benefit as well as for earning purpose so the cyber attacker my damage your hardware or system infrastructure or remote access or monitoring on the system the cyber attacker have some extra skills to find out the vulnerabilities on the system Who launches cyber attacks?  Class...