background preloader

Hacker Attack Tools

Hacker Attack Tools

ActivePerl is Perl for Windows, Mac, Linux, AIX, HP-UX & Solaris ActivePerl Business and Enterprise Editions feature our precompiled, supported, quality-assured Perl distribution used by millions of developers around the world for easy Perl installation and quality-assured code. When you're using Perl on production servers or mission-critical applications, ActivePerl Business and Enterprise Editions offer significant time savings over open source Perl for installing, managing, and standardizing your Perl . If you are using ActivePerl for production, redistribution, on terminal servers, for thin client for app deployment (i.e. on MS Terminal Services, Citrix XenApp or File Servers), or for use on HP-UX/AIX/Solaris then ActivePerl Community Edition is not the right license for you. Please contact us for Business Edition or Enterprise Edition options. Not sure which edition is right for you? Tested, Timely and Compatible ActivePerl Business and Enterprise Editions include: Reduce Risk with Commercially Supported Perl Extended Platform and Version Support

Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping 12. burpsuite 13. 14. sqlmap

How to phish(tutorial inside) How to-make a phishing page by Grayboy  What is a phishing page? A phishing page is a fake login page, for example a fake facebook login. Instead of logging you into facebook, it keeps the password! Preparation work A journey of a thousand miles starts with a first step, here is yours. Step one-choose your target. To phish, you need a website to phish. Step two-make the index page. This is like the home page of the phishing site, which the target will see. Ok now open up one of your notepad documents. Step three-make the php file. Save this as “post.php”. Step 4-hitting the World Wide Web! Whilst this is all well and good, it won’t do anything sat on your computer! Step 5-Getting it out their! Okay now for this you are going to need a fake email. You need people to send it to. Go on google and type in”” .This should give you lots of targets. Now you need to get the actual content sorted. Do you want to control which emails you receive from Facebook?

Essential Wireless Hacking Tools By Daniel V. Hoffman, CISSP, CWNA, CEH Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant to be comprehensive in nature but rather to provide some general guidance on recommended tools to build your toolkit. Finding Wireless Networks Locating a wireless network is the first step in trying to exploit it. Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. (NetStumbler Screenshot) Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. (Kismet Screenshot) Attaching to the Found Wireless Network Once you’ve found a wireless network, the next step is to try to connect to it. (Screenshot of Airsnort in Action)

Hidden iframe injection attacks | Structured Randomness [Updated on October 27, 2009 with new a version of the script] It is a shame that after all those posts about security, some of my websites were under attack today. Shoban and Anand emailed me about this today morning (Thanks guys) and I tried to understand what was going on. To my utter disbelief more than 10 websites hosted in the same server were affected by the attack. All the index.* files in the server were infected with a piece of code that loaded a hidden iframe in the page. To the html pages the following piece of code was added: To php pages it added: echo “<iframe src=\” Asha took the effort and cleaned most of the infected files. How did the worm inject the hidden iframes to my files? There are two ways through which the worm is believed to infect your files: 1) Server is compromised This is the most common way. 2) Client side FTP The worm resides in some/any of the client side PCs you use for accessing the ftp/control panel accounts of your hosting server.

Play And Convert Any Multimedia File In this post I will list some problems many people have with multimedia formats and one solution. But let's start with the problems: * I have a video file and I want to extract the audio part.* I have an AVI video and I want to put it on my web page in a format optimized for the web.* How can I transfer videos from my PC to my mobile phone that supports only 3gp format?* I have an AVI/MOV/ MP4/WMV file and I want to convert it to AVI/MOV/ MP4/WMV.* How can I save on my disk MMS and RTSP streams?* Ok, I downloaded a file from YouTube as a flv file, but how can I encode it in a format that can be viewed in any player?* I got a file in a strange format: 3gp/amr/mp4/ogg/mpc. There's only one answer to these frustrations and many others: SUPER. SUPER is a free program that lets you view and convert almost any multimedia format you've ever heard. Let's see how easy is to save a YouTube video as an AVI file. Step 1. Although SUPER has a very basic interface, it's very powerful. Update.

How to surf anonymously without a trace Skip to comments. How to surf anonymously without a trace ComputerWorld ^ | 12 March 2007 | Preston Gralla Posted on Tue Mar 13 14:29:37 2007 by ShadowAce The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. What they know about you Whenever you surf the Web, you leave yourself open to being snooped upon by Web sites. Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Protect yourself: Surf anonymously To: ShadowAce

SecurityXploit: Pentest web-sorrow - Linux Am Saturday, 19. May 2012 im Topic 'Pentest' A perl based tool used for checking a Web server for misconfiguration, version detection, enumeration, and server information. I will build more Functionality in the future. what is's NOT: Vulnerably scanner, inspection proxy, DDoS tool, exploitation framework. It's entirely focused on Enumeration and collecting Info on the target server basic: perl -host -S look for login pages: perl -host -auth CMS intense scan: perl -host -Ws -Cp all -I most intense scan possible: perl -host -e -ua "I come in peace" Permalink HackBar 1.6.1 - Add-on Am Friday, 4. This toolbar will help you in testing sql injections, XSS holes and site security. " # Load url ( alt a ) This loads the url of the current page into the textarea. Permalink

Ophcrack Free Password Crackers A password cracker program, often called a password recovery tool or a password unlocker/reset tool, is a software program used to "crack" a password, either by discovering the password outright, bypassing the encryption by removing the password, or bypassing the need for a password by changing the way the program or file works. If you've lost your password to something like Windows or an encrypted file, and the normal means to change the password won't work, a password cracker program might be able to help. Fully functional, completely free password crackers do exist alongside the many premium password crackers that you might find doing a quick search. The best of these free passwords crackers are included in the various password cracker categories below: Important: Password crackers and other kinds of password recovery and finder tools are legitimate programs to help discover or reset lost passwords.

Untraceable Computer Techniques So I can imagine a time when (if it is not already happening) that posts to the internet such as this will be actively traced to the source computer and the poster put under scrutiny at the least or jailed at the most. First off there are not any sure proof untraceable techniques that the average man can employ, but there are somethings that we can do to make it harder for those who would want to track activity. What are some techniques that one might use to go online to continue to gather information in regards to survival preparedness, government actions and or communicating with others? Computer Registration - All computers are serial numbered and it is easy enough to also track the MAC addresses of the Network Interface Cards within the laptop or etc. Most people buy a laptop with their credit card so it does not take a rocket scientist to figure out who has what laptop. IP Proxy Surfing This is a way to hide your IP address while browsing the internet.

Offensive Computer Security Home Page (CIS 4930 / CIS 5930) Spring 2014 - Vimperator Instructors Prof. Xiuwen Liu (homepage: W. Course Time and Location Mondays and Wednesdays (Not Fridays) at 3:35PM-4:50PM, HCB 0216. This web site contains the up-to-date information related to this class such as news, announcements, assignments, lecture notes, and useful links to resources that are helpful to this class. Office Hours Prof Liu - Tuesdays and Thursdays from 11AM - 12noon LOV 166(Love building). Also available is Joshua Lawrence - Tuesday and Thursdays from 2PM-3PM in LOV 167. Rationale: The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). License This work is licensed under a Creative Commons license.

Cryptocat The TCP/IP Guide The TCP/IP Guide Welcome to the free online version of The TCP/IP Guide! My name is Charles and I am the author and publisher. I hope you will find the material here useful to you in your studies of computing, networking, and programming. Here are a few tips, links and reminders to help you out: Introduction: Newcomers to The TCP/IP Guide may wish to read the Introduction and Guide to the Guide, which will explain what the Guide is about and provide you with useful information about how to use it. Last but definitely not least: this site is provided as an online reference resource for casual use. If you like The TCP/IP Guide enough to want your own copy in convenient PDF format, please license the full Guide. Thanks again and enjoy the site! Charles Home - Table Of Contents - Contact Us