SlideShare une entreprise Scribd logo
1  sur  7
Hackers are
innocent
in present time everybody is want to know each other personal
information and then the question is that how can we do it ,and the
answer is simple we can do it by hacking.
But on the same time the question is that hackers are innocent or
not?
In the world many type hackers are live some are use their skills for
good and some are use for money if we see technically then we
found that there r have 70% hackers who use their skills for money
and 30%USE THEIR SKILLS FOR GOOD things.
Latest hacking tools list
 The Social-Engineer Toolkit (SET) v4.7 released
 Biggest password cracking wordlist with millions of words
 Phrozen Keylogger Lite v1.0 download
 Pentoo 2013.0 RC1.1 Released
 Snort 2.9.4.1 - Network intrusion detection system
 Recon-ng : Web Reconnaisance framework for Penetration testers
 Unhide Forensic Tool, Find hidden processes and ports
 WAppEx v2.0 : Web Application exploitation Tool
 Password Cracker Tool Hashkill version 0.3.1 released
 Weevely : Stealth PHP web shell with telnet style console
 Automated HTTP Enumeration Tool
 BlindElephant – Web Application Fingerprinting
 PwnStar latest version with new Exploits released
 PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi
 SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS
 NetSleuth : Open source Network Forensics And Analysis Tools
 TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
 PySQLi - Python SQL injection framework
 ExploitShield Browser Edition - Forget about browser vulnerabilities
 Joomscan updated - now can identify 673 joomla vulnerabilities
List of top 10 hackers in world
• Kevin david mitnick
• He is an American citizen ,at the age of 16.Kevin first gained unauthorized access to a computer network in 1979.He fame to hacked the computer systems of Digital
Equipments Corporation(DEC) used for developing their operating system software.
• Kevin Poulsen
• He is a news editor at wired.com.Before entering into journalism ,he was a notorious hacker in the world. Those who cheat the technology for personal gain he is a black
hat who hacked the phone lines of los angeles radio station KIIS-FM.
• Adrian Lamo
• Adrian was born in boston ,He was a homeless hacker .You know why he is nicknamed as homeless hacker he used internet café,liberies and coffee shop as his location
for hacking. He gained to breaking into a series of high profile computer software and networks like the new York times, yahoo and Microsoft.
• Michael Calce
• Michael was the internet alias mafia boy. He gained a series of highly known denial of service attacks against the websites like yahoo!,fifa.com,amazon.com,dell.com
eBay.
• Albert Gonzalez
• Albert has been convicted masterminding the biggest credit card and ATM criminal in the world ,Albert and his team used the SQL injection to create hacking several
corporate system in order to launch packet sniffing attacks.
• Vladimir Levin
• He is a Russian citizen .This hacker done his hacking through the citi bank.While working from his apartment in st. petersburg the talented hacker transferred $10 million
from the account of Citibank clients to his own account.
• Robert tappan morris
• Buddies, Have you heard about morries worm ?Considered the first computer worm on the internet. That the worm is created by our Robert tappan. This hacker was done
the worth of $ 15 damage by using his worm.
• David Smith
• Melissa its an infamous e-mail virus is due to being the author is none another than David Smith. That the virus takes convert to it was originally hidden in a file that
contained password of 80 fame pornography websites.
• George Hotz
• He is an American hacker known for unlocking the iphone .He is the first person to hack the Sony play station 3.This is the most hacking attention in his future.
• Jonathan James
• 16 –year –old black hat hacker in the United States. He gained to implementing a series of successful intrusion into various system. He was well talented in hacking
government systems such as NASA and the department of defense. But he is no more .
hackers are always need smart phones
like:
0%
20%
40%
60%
80%
100%
1st
Qtr
2nd
Qtr
3rd
Qtr
4th
Qtr
gray hat
black hat
white hat
list of ethical hacking chapters
(including tools and everthing)
• Bluetooth
• BlueScanner
• Bluesnarfer
• BlueSniper Rifle
• Blooover
• Bluejacking community site
• BTScanner for XP
• Car Whisperer
• Detailed presentation on the various Bluetooth attacks
• NIST Special Publication 800-48
• Smurf
• Certifications
• Certified Ethical Hacker
• Certified Information Security Manager
• Certified Information Systems Security Professional
• Certified Wireless Security Professional
• CompTIA Security+
• SANS GIAC
• Databases
• Advanced Access Password Recovery
• Advanced SQL Password Recovery
• AppDetectivePro
• Elcomsoft Distributed Password Recovery
• Microsoft SQL Server Management Studio Express
• NGSSQuirreL
• Pete Finnigan's listing of Oracle scanning tools
• QualysGuard
• SQLPing3 and SQLRecon
• Exploit tools
• Metasploit
• Milw0rm
• General research tools
• AfriNIC
• APNIC
• ARIN
• Bing
• DNSstuff.com
• dnstools.com
• The File Extension Source
• Google
• Government domains
• Hoover's business information
• Log analysis
• ArcSight Logger
• GFI EventsManager
• LogAnalysis.org system logging resources
• Messaging
• Abuse.net SMTP relay checker
• Brutus
• Cain & Abel
• DNSstuff.com relay checker
• EICAR Anti-Virus test file
• GFI e-mail security test
• mailsnarf
• smtpscan
• Miscellaneous tools
• FreeZip
• WinZip
• NetWare
• Craig Johnson's BorderManager resources
• JRB Software
• NetServerMon
• Pandora
• Rcon program
• Remote
• UserDump
• Networks
• Arpwatch
• Blast
• Cain & Abel
• CommView
• dsniff
• Essential NetTools
• ettercap
• Firewalk
• Getif
• GFI LANguard
• IETF RFCs
• IKEcrack
• MAC address vendor lookup
• MAC Changer
• Nessus vulnerability scanner
• Netcat
• Netfilter/iptables
• Patch management
• BigFix Patch Management
• Debian Linux Security Alerts
• Ecora Patch Manager
• GFI LANguard
• Linux Kernel Updates
• Lumension Patch and Remediation
• Novell Patches and Security
• Microsoft TechNet Security Center
• Red Hat Linux Security Alerts
• Slackware Linux Security Advisories
• SUSE Linux Security Alerts
• Windows Server Update Services from Microsoft
• Security education and learning resources
• Kevin Beaver's information security articles, whitepapers, webcasts, podcasts
, and screencasts
• Kevin Beaver's Security On Wheels information security audio programs
• Kevin Beaver's Security On Wheels blog
• Kevin Beaver's Twitter page
• Security methods and models
• Open Source Security Testing Methodology Manual
• OWASP
• SecurITree
• Software Engineering Institute's OCTAVE methodology
• Source-code analysis
• Checkmarx
• Fortify Software
• Klocwork
• Ounce Labs
• Storage
• CHAP Password Tester
• CIFSShareBF
• Effective File Search
• FileLocator Pro
• GFI LANguard
• Google Desktop
• GrabiQNs
• Identity Finder
• NASanon
• StorScan
• SuperScan
• System hardening
• Bastille Linux Hardening Program
• User awareness and training
• Awareity MOAT
• Dogwood Management Partners Security Posters
• Greenidea Visible Statement
• Interpact, Inc. Awareness Resources
• Managing an Information Security and Privacy Awareness and Training
Program by Rebecca Herold (Auerbach)
• NIST Awareness, Training, & Education resources
• Security Awareness, Inc.
• Voice over IP
• Cain & Abel
• CommView
• Listing of various VoIP tools
• NIST's SP800-58 document
• OmniPeek
• PROTOS
• sipsak
• SiVuS
• vomit
• VoIP Hopper
• Vulnerability databases
• Common Vulnerabilities and Exposures
• CWE/SANS Top 25 Most Dangerous Programming Errors
• National Vulnerability Database
• Privacy Rights Clearinghouse's A Chronology of Data Breaches
• SANS Top 20 Internet Security Problems, Threats, and Risks
• US-CERT Vulnerability Notes Database
• Wireless Vulnerabilities and Exploits
• Web applications
• Absinthe
• Acunetix Web Vulnerability Scanner
• Brutus
• Defaced Web sites
• HTTrack Website Copier
• Firefox Web Developer
• Foundstone's Hacme Tools
• Google Hack Honeypot
• Google Hacking Database
• NGSSquirrel
• N-Stealth Web Application Security Scanner
• Paros Proxy
• Port 80 Software's ServerMask
• SiteDigger
• Created by: mohammad danish
• Speiical thanks:md craetions
• We hope u like it!

Contenu connexe

Tendances

Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
yanizaki
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
North Texas Chapter of the ISSA
 

Tendances (20)

H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
Hacking final
Hacking finalHacking final
Hacking final
 
GreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To Noise
 
History of Old School Hacking
History of Old School HackingHistory of Old School Hacking
History of Old School Hacking
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Hacking
HackingHacking
Hacking
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
 
10 notorious female hackers.pptx
10 notorious female hackers.pptx10 notorious female hackers.pptx
10 notorious female hackers.pptx
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
 
Ransomware the clock is ticking
Ransomware the clock is tickingRansomware the clock is ticking
Ransomware the clock is ticking
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 
Hacking
HackingHacking
Hacking
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 

Similaire à Hackers are innocent

Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 

Similaire à Hackers are innocent (20)

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
 
Fear, Uncertainty and Doubt
Fear, Uncertainty and DoubtFear, Uncertainty and Doubt
Fear, Uncertainty and Doubt
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
 
Hacking
HackingHacking
Hacking
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
hacking
hackinghacking
hacking
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Internet security
Internet securityInternet security
Internet security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Hackers are innocent

  • 1. Hackers are innocent in present time everybody is want to know each other personal information and then the question is that how can we do it ,and the answer is simple we can do it by hacking. But on the same time the question is that hackers are innocent or not? In the world many type hackers are live some are use their skills for good and some are use for money if we see technically then we found that there r have 70% hackers who use their skills for money and 30%USE THEIR SKILLS FOR GOOD things.
  • 2. Latest hacking tools list  The Social-Engineer Toolkit (SET) v4.7 released  Biggest password cracking wordlist with millions of words  Phrozen Keylogger Lite v1.0 download  Pentoo 2013.0 RC1.1 Released  Snort 2.9.4.1 - Network intrusion detection system  Recon-ng : Web Reconnaisance framework for Penetration testers  Unhide Forensic Tool, Find hidden processes and ports  WAppEx v2.0 : Web Application exploitation Tool  Password Cracker Tool Hashkill version 0.3.1 released  Weevely : Stealth PHP web shell with telnet style console  Automated HTTP Enumeration Tool  BlindElephant – Web Application Fingerprinting  PwnStar latest version with new Exploits released  PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi  SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS  NetSleuth : Open source Network Forensics And Analysis Tools  TXDNS v 2.2.1 - Aggressive multithreaded DNS digger  PySQLi - Python SQL injection framework  ExploitShield Browser Edition - Forget about browser vulnerabilities  Joomscan updated - now can identify 673 joomla vulnerabilities
  • 3. List of top 10 hackers in world • Kevin david mitnick • He is an American citizen ,at the age of 16.Kevin first gained unauthorized access to a computer network in 1979.He fame to hacked the computer systems of Digital Equipments Corporation(DEC) used for developing their operating system software. • Kevin Poulsen • He is a news editor at wired.com.Before entering into journalism ,he was a notorious hacker in the world. Those who cheat the technology for personal gain he is a black hat who hacked the phone lines of los angeles radio station KIIS-FM. • Adrian Lamo • Adrian was born in boston ,He was a homeless hacker .You know why he is nicknamed as homeless hacker he used internet café,liberies and coffee shop as his location for hacking. He gained to breaking into a series of high profile computer software and networks like the new York times, yahoo and Microsoft. • Michael Calce • Michael was the internet alias mafia boy. He gained a series of highly known denial of service attacks against the websites like yahoo!,fifa.com,amazon.com,dell.com eBay. • Albert Gonzalez • Albert has been convicted masterminding the biggest credit card and ATM criminal in the world ,Albert and his team used the SQL injection to create hacking several corporate system in order to launch packet sniffing attacks. • Vladimir Levin • He is a Russian citizen .This hacker done his hacking through the citi bank.While working from his apartment in st. petersburg the talented hacker transferred $10 million from the account of Citibank clients to his own account. • Robert tappan morris • Buddies, Have you heard about morries worm ?Considered the first computer worm on the internet. That the worm is created by our Robert tappan. This hacker was done the worth of $ 15 damage by using his worm. • David Smith • Melissa its an infamous e-mail virus is due to being the author is none another than David Smith. That the virus takes convert to it was originally hidden in a file that contained password of 80 fame pornography websites. • George Hotz • He is an American hacker known for unlocking the iphone .He is the first person to hack the Sony play station 3.This is the most hacking attention in his future. • Jonathan James • 16 –year –old black hat hacker in the United States. He gained to implementing a series of successful intrusion into various system. He was well talented in hacking government systems such as NASA and the department of defense. But he is no more .
  • 4. hackers are always need smart phones like: 0% 20% 40% 60% 80% 100% 1st Qtr 2nd Qtr 3rd Qtr 4th Qtr gray hat black hat white hat
  • 5. list of ethical hacking chapters (including tools and everthing) • Bluetooth • BlueScanner • Bluesnarfer • BlueSniper Rifle • Blooover • Bluejacking community site • BTScanner for XP • Car Whisperer • Detailed presentation on the various Bluetooth attacks • NIST Special Publication 800-48 • Smurf • Certifications • Certified Ethical Hacker • Certified Information Security Manager • Certified Information Systems Security Professional • Certified Wireless Security Professional • CompTIA Security+ • SANS GIAC • Databases • Advanced Access Password Recovery • Advanced SQL Password Recovery • AppDetectivePro • Elcomsoft Distributed Password Recovery • Microsoft SQL Server Management Studio Express • NGSSQuirreL • Pete Finnigan's listing of Oracle scanning tools • QualysGuard • SQLPing3 and SQLRecon • Exploit tools • Metasploit • Milw0rm • General research tools • AfriNIC • APNIC • ARIN • Bing • DNSstuff.com • dnstools.com • The File Extension Source • Google • Government domains • Hoover's business information • Log analysis • ArcSight Logger • GFI EventsManager • LogAnalysis.org system logging resources • Messaging • Abuse.net SMTP relay checker • Brutus • Cain & Abel • DNSstuff.com relay checker • EICAR Anti-Virus test file • GFI e-mail security test • mailsnarf • smtpscan • Miscellaneous tools • FreeZip • WinZip • NetWare • Craig Johnson's BorderManager resources • JRB Software • NetServerMon • Pandora • Rcon program • Remote • UserDump • Networks • Arpwatch • Blast • Cain & Abel • CommView • dsniff • Essential NetTools • ettercap • Firewalk • Getif • GFI LANguard • IETF RFCs • IKEcrack • MAC address vendor lookup • MAC Changer • Nessus vulnerability scanner • Netcat • Netfilter/iptables
  • 6. • Patch management • BigFix Patch Management • Debian Linux Security Alerts • Ecora Patch Manager • GFI LANguard • Linux Kernel Updates • Lumension Patch and Remediation • Novell Patches and Security • Microsoft TechNet Security Center • Red Hat Linux Security Alerts • Slackware Linux Security Advisories • SUSE Linux Security Alerts • Windows Server Update Services from Microsoft • Security education and learning resources • Kevin Beaver's information security articles, whitepapers, webcasts, podcasts , and screencasts • Kevin Beaver's Security On Wheels information security audio programs • Kevin Beaver's Security On Wheels blog • Kevin Beaver's Twitter page • Security methods and models • Open Source Security Testing Methodology Manual • OWASP • SecurITree • Software Engineering Institute's OCTAVE methodology • Source-code analysis • Checkmarx • Fortify Software • Klocwork • Ounce Labs • Storage • CHAP Password Tester • CIFSShareBF • Effective File Search • FileLocator Pro • GFI LANguard • Google Desktop • GrabiQNs • Identity Finder • NASanon • StorScan • SuperScan • System hardening • Bastille Linux Hardening Program • User awareness and training • Awareity MOAT • Dogwood Management Partners Security Posters • Greenidea Visible Statement • Interpact, Inc. Awareness Resources • Managing an Information Security and Privacy Awareness and Training Program by Rebecca Herold (Auerbach) • NIST Awareness, Training, & Education resources • Security Awareness, Inc. • Voice over IP • Cain & Abel • CommView • Listing of various VoIP tools • NIST's SP800-58 document • OmniPeek • PROTOS • sipsak • SiVuS • vomit • VoIP Hopper • Vulnerability databases • Common Vulnerabilities and Exposures • CWE/SANS Top 25 Most Dangerous Programming Errors • National Vulnerability Database • Privacy Rights Clearinghouse's A Chronology of Data Breaches • SANS Top 20 Internet Security Problems, Threats, and Risks • US-CERT Vulnerability Notes Database • Wireless Vulnerabilities and Exploits • Web applications • Absinthe • Acunetix Web Vulnerability Scanner • Brutus • Defaced Web sites • HTTrack Website Copier • Firefox Web Developer • Foundstone's Hacme Tools • Google Hack Honeypot • Google Hacking Database • NGSSquirrel • N-Stealth Web Application Security Scanner • Paros Proxy • Port 80 Software's ServerMask • SiteDigger
  • 7. • Created by: mohammad danish • Speiical thanks:md craetions • We hope u like it!

Notes de l'éditeur

  1. Bluetooth BlueScanner Bluesnarfer BlueSniper Rifle Blooover Bluejacking community site BTScanner for XP Car Whisperer Detailed presentation on the various Bluetooth attacks NIST Special Publication 800-48 Smurf Certifications Certified Ethical Hacker Certified Information Security Manager Certified Information Systems Security Professional Certified Wireless Security Professional CompTIA Security+ SANS GIAC Databases Advanced Access Password Recovery Advanced SQL Password Recovery AppDetectivePro Elcomsoft Distributed Password Recovery Microsoft SQL Server Management Studio Express NGSSQuirreL Pete Finnigan's listing of Oracle scanning tools QualysGuard SQLPing3 and SQLRecon Exploit tools Metasploit Milw0rm General research tools AfriNIC APNIC ARIN Bing DNSstuff.com dnstools.com The File Extension Source Google Government domains Hoover's business information LACNIC Military domains Netcraft's What's that site running? RIPE Network Coordination Centre Switchboard.com U.S. Patent and Trademark Office US Search.com U.S. Securities and Exchange Commission Wotsit's Format Whois.net Whatismyip.com Yahoo! Finance Zabasearch Hacker stuff 2600 The Hacker Quarterly Computer Underground Digest Hacker T-shirts, equipment, and other trinkets Hackin9 Honeypots: Tracking Hackers The Online Hacker Jargon File PHRACK Keyloggers Invisible KeyLogger Stealth KeyGhost SpectorSoft Laws and regulations Gramm -Leach-Bliley Act (GLBA) Safeguards Rule Health Information Technology for Economic and Clinical Health (HITECH) Act Health Insurance Portability and Accountability Act (HIPAA) Security Rule Payment Card Industry Data Security Standard ( PCI DSS) U.S. state breach notification laws Linux BackTrack freshmeat.net GFI LANguard Linux Security Auditing Tool (LSAT) QualysGuard SourceForge THC-Amap Tiger Live toolkits BackTrack Comprehensive listing of live bootable Linux toolkits Knoppix Network Security Toolkit Security Tools Distribution Log analysis ArcSight Logger GFI EventsManager LogAnalysis.org system logging resources Messaging Abuse.net SMTP relay checker Brutus Cain & Abel DNSstuff.com relay checker EICAR Anti-Virus test file GFI e-mail security test mailsnarf smtpscan Miscellaneous tools FreeZip WinZip NetWare Craig Johnson's BorderManager resources JRB Software NetServerMon Pandora Rcon program Remote UserDump Networks Arpwatch Blast Cain & Abel CommView dsniff Essential NetTools ettercap Firewalk Getif GFI LANguard IETF RFCs IKEcrack MAC address vendor lookup MAC Changer Nessus vulnerability scanner Netcat Netfilter/iptables NetResident NetScanTools Pro Nmap port scanner NMapWin OmniPeek Port number listing Port number lookup PortSentry PromiscDetect QualysGuard vulnerability scanner SMAC MAC address changer SNARE sniffdet SNMPUTIL SuperScan port scanner TCP Wrappers TrafficIQ Pro UDPFlood WhatIsMyIP Wireshark Password cracking Advanced Archive Password Recovery BIOS passwords Brutus Cain & Abel Crack Default vendor passwords Dictionary files and word lists: ftp:// ftp.cerias.purdue.edu/pub/dict ftp:// ftp.ox.ac.uk /pub/wordlists http:// packetstormsecurity.nl /Crackers/wordlists http://www.outpost9.com/files/WordLists.html http://rs159.rapidshare.com/files/184075601/BlackKnightList.rar Elcomsoft Distributed Password Recovery Elcomsoft System Recovery John the Ripper ophcrack Pandora Password Safe Proactive Password Auditor Proactive System Password Recovery pwdump3 NetBIOS Auditing Tool NIST Guide to Enterprise Password Management NTAccess RainbowCrack Rainbow tables SQLPing3 TSGrinder WinHex Patch management BigFix Patch Management Debian Linux Security Alerts Ecora Patch Manager GFI LANguard Linux Kernel Updates Lumension Patch and Remediation Novell Patches and Security Microsoft TechNet Security Center Red Hat Linux Security Alerts Slackware Linux Security Advisories SUSE Linux Security Alerts Windows Server Update Services from Microsoft Security education and learning resources Kevin Beaver's information security articles, whitepapers, webcasts , podcasts , and screencasts Kevin Beaver's Security On Wheels information security audio programs Kevin Beaver's Security On Wheels blog Kevin Beaver's Twitter page Security methods and models Open Source Security Testing Methodology Manual OWASP SecurITree Software Engineering Institute's OCTAVE methodology Source-code analysis Checkmarx Fortify Software Klocwork Ounce Labs Storage CHAP Password Tester CIFSShareBF Effective File Search FileLocator Pro GFI LANguard Google Desktop GrabiQNs Identity Finder NASanon StorScan SuperScan System hardening Bastille Linux Hardening Program Center for Internet Security Benchmarks Deep Freeze Fortres 101 How to disable SMTP relay on various e-mail servers Imperva Linux Administrator's Security Guide PGP Whole Disk Encryption Pyn Logic SecureIIS ServerDefender TrueCrypt User awareness and training Awareity MOAT Dogwood Management Partners Security Posters Greenidea Visible Statement Interpact, Inc. Awareness Resources Managing an Information Security and Privacy Awareness and Training Program by Rebecca Herold (Auerbach) NIST Awareness, Training, & Education resources Security Awareness, Inc. Voice over IP Cain & Abel CommView Listing of various VoIP tools NIST's SP800-58 document OmniPeek PROTOS sipsak SiVuS vomit VoIP Hopper Vulnerability databases Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous Programming Errors National Vulnerability Database Privacy Rights Clearinghouse's A Chronology of Data Breaches SANS Top 20 Internet Security Problems, Threats, and Risks US-CERT Vulnerability Notes Database Wireless Vulnerabilities and Exploits Web applications Absinthe Acunetix Web Vulnerability Scanner Brutus Defaced Web sites HTTrack Website Copier Firefox Web Developer Foundstone's Hacme Tools Google Hack Honeypot Google Hacking Database NGSSquirrel N-Stealth Web Application Security Scanner Paros Proxy Port 80 Software's ServerMask SiteDigger SWFScan WebInspect WebGoat WSDigger WSFuzzer Windows DumpSec GFI LANguard Microsoft Baseline Security Analyzer Network Users QualysGuard Sysinternals Winfo Wireless networks Aircrack AirMagnet WiFi Analyzer AirSnort Asleap Cantenna war-driving kit CommView for Wi-Fi Digital Hotspotter Elcomsoft Wireless Security Auditor Homebrew WiFi antenna KisMAC Kismet NetStumbler OmniPeek SeattleWireless Hardware Comparison page Super Cantenna Wellenreiter WEPCrack WiGLE database of wireless networks WifiMaps WiFinder WildPackets' OmniPeek WinAirsnort