Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
10-31-2004, 11:09 AM
|
#1
|
Member
Registered: May 2004
Distribution: REDHAT 9.0 FREEBSD 4.10, WinBlowsXP for its prettyness ;)
Posts: 42
Rep:
|
Security Tools best of the best
I think it would be neat if everyone who uses the massive amounts of security tools put what they consider to be the best of the best. So first I decided to go through and decide which categories there are. So thats step one feel free to add on anything you think that should go here as well.
Packet Sniffers:
Crackers:
Packet Builders:
Port Scanners:
Vulnerability scanner LOUD and Powerful:
Quiet and Stealthy Vulnerability scanners:
Vulnerability exploiting tools: * This one if its unclear would be the script kiddie tools that exploit the system for you * Or you ones that can help you take a vulnerability report and form the packet you need to send to exploit it.* I havent found any really good ones at this point*
Wardriving Software:
Stegonagraphy software:
Speciality Tools of all kinds:
Ok Those are the categories that I think are important for now I am a little dead in the head right now. Also if you guys haven't checked out Honeyd project its pretty sweet right now.. They have allowed you to do alot of customization and create a pretty sweet honeynet.
I would add in the tools I use but I would rather see what everyone else is using.
|
|
|
10-31-2004, 02:48 PM
|
#2
|
LQ Guru
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672
Rep:
|
Packet sniffers = SNORT
Port scanner = Nmap (for your own machines only)
as for the rest of the software, i dont see how wardriving software would be used by anybody here.
it serves no good use apart from for kids pretending to be Zero Cool.
|
|
|
10-31-2004, 09:24 PM
|
#3
|
Member
Registered: Oct 2004
Location: Queen Charlotte B. C. Canada
Distribution: openSUSE 11.1
Posts: 42
Rep:
|
Quote:
Originally posted by qwijibow
as for the rest of the software, i dont see how wardriving software would be used by anybody here.
it serves no good use apart from for kids pretending to be Zero Cool.
|
I do see a need for the rest of the software.
But only for a system admin to test his security from the out side with the tools a hacker uses so that the holes can be found and fixed
|
|
|
11-01-2004, 04:28 AM
|
#4
|
Member
Registered: May 2004
Distribution: REDHAT 9.0 FREEBSD 4.10, WinBlowsXP for its prettyness ;)
Posts: 42
Original Poster
Rep:
|
I can say this with pleanty of confidence right now. Any good security officer/ ethical hacker/ security admin, uses most of these tools on a regular basis. It is usually for auditing purposes to find the vulnerabilities that most people can find if they did a similar form of recon. Anyway I was just curious to see what some of the other people are using...
Packet sniffing your using SNORT huh any particular reason for SNORT instead of somthing like Ethereal or sniffit, and HPiNG or any of those common ones out there?
|
|
|
11-01-2004, 01:20 PM
|
#5
|
LQ Guru
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672
Rep:
|
I like the way snort runs in the background logging packets accourding to rules...
PLUS, snortsnarf generates excellent http pages with statistics and information and links on the attacks snort logs.
but be be honest, ive never seriously used etherial.
|
|
|
11-01-2004, 07:24 PM
|
#6
|
Member
Registered: Jul 2004
Location: USofA
Distribution: Whatever runs accordingly.
Posts: 200
Rep:
|
nessus and about 50 others for vulnerability assesment
crackers? I guess john or thc hydra
Vulnerability exploiting tools? metasploit is really cool. You should try it, but you have to read the docs it's not just point and click. I've used it on some of my own unpacthed windows boxes before and it tore right through em.
|
|
|
11-02-2004, 05:08 AM
|
#7
|
Member
Registered: Dec 2002
Location: California
Distribution: Slackware & LFS
Posts: 799
Rep:
|
I think it would be neat if someone made chocolate pumpkin flavored ice cream . . . but that's beside the point.
Check out this survey.
Enjoy!
--- Cerbere
Last edited by Cerbere; 11-05-2004 at 04:24 AM.
|
|
|
11-03-2004, 01:18 PM
|
#8
|
Member
Registered: Nov 2004
Distribution: FC1, Gentoo, Mdk 8.1, RH7-8-9, Knoppix, Zuarus rom 3.13
Posts: 98
Rep:
|
Re: Security Tools best of the best
Quote:
Originally posted by JonChristmas
Packet Sniffers:
Crackers:
Packet Builders:
Port Scanners:
Vulnerability scanner LOUD and Powerful:
Quiet and Stealthy Vulnerability scanners:
Wardriving Software:
Stegonagraphy software:
Speciality Tools of all kinds:
|
Sniffers:
Tcpdump, ethereal.
Crackers:
john, some rainbow tables for those pesky LM hashes
Packet Builders:
PacGen (its on source forge)
Vuln scanners:
nessus (pretty loud)
Wardriving:
kismet
Specialtiy tools:
too many to list. check packetstorm.
-b
Last edited by bignerd; 11-03-2004 at 01:19 PM.
|
|
|
All times are GMT -5. The time now is 09:45 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|