.

Penetration Tool list

<<

T_Bone

Full Member
Full Member

Posts: 199

Joined: Sat Feb 21, 2009 7:11 am

Post Sat Sep 04, 2010 1:57 pm

Penetration Tool list

I came across the list below the other day and thought I would share it as it is pretty good

http://resources.infosecinstitute.com/k ... ools-list/
<<

dynamik

Recruiters
Recruiters

Posts: 1119

Joined: Sun Nov 09, 2008 11:00 am

Location: Mile High City

Post Sat Sep 04, 2010 2:27 pm

Re: Penetration Tool list

Keatron is 100% the reason I'm in infosec. That dude needs to return an email, so I can buy him a beer!

I'm definitely going to have to follow that site if that's where he's active now.
The day you stop learning is the day you start becoming obsolete.
<<

sil

User avatar

Hero Member
Hero Member

Posts: 551

Joined: Thu Mar 20, 2008 8:01 am

Location: ::1

Post Sat Sep 04, 2010 3:48 pm

Re: Penetration Tool list

@dynamik keatron is doing some IACRB classes, so search him out there. He has a new web application class coming up
<<

sil

User avatar

Hero Member
Hero Member

Posts: 551

Joined: Thu Mar 20, 2008 8:01 am

Location: ::1

Post Sun Sep 05, 2010 10:27 am

Re: Penetration Tool list

*slap* Realized the link to IACRB has been posted. Shoot me a message if you need his contact info dynamik, be advised though, he's slow to respond to emails.
<<

dynamik

Recruiters
Recruiters

Posts: 1119

Joined: Sun Nov 09, 2008 11:00 am

Location: Mile High City

Post Sun Sep 05, 2010 12:27 pm

Re: Penetration Tool list

Nah, I've got it. I know he's busy, and I don't have anything important to say, so I don't want to bother him. Thanks though.
The day you stop learning is the day you start becoming obsolete.
<<

facsimil3

Newbie
Newbie

Posts: 6

Joined: Wed Oct 20, 2010 10:44 am

Post Wed Oct 20, 2010 11:40 am

Re: Penetration Tool list

great post :D
and thanks for sharing!!
i was looking for something like this, thank you.
;D
<<

MaXe

User avatar

Hero Member
Hero Member

Posts: 671

Joined: Tue Aug 17, 2010 9:49 am

Post Thu Oct 21, 2010 7:59 am

Re: Penetration Tool list

Very nice list though it only aims at software exploitation (aka service exploitation) which can contain many bugs of course, but web applications nowadays are also entry points into the target system.

Knowing PHP and or ASP is a good idea in my opinion but besides that, there's my tool list for Web App Sec:
- FireFox with Firebug, Live HTTP Headers, Tamper Data and Add 'N' Edit Cookies.
- Burp Suite (free) - For more advanced stuff
- Nikto - A very nice active web application scanner which is good if you don't have any obvious entry points.
- Maltego - Information gathering, it's a must to have installed.
- Whois, Netcraft and Google - Useful services to find information about the target.

Extras:
- W3AF - Open source web application scanner
- Acunetix - Commercial but quite efficient web app scanner.
- Pangolin - SQL Injection "Assistant". I am not sure if you can fully trust this program but it is very nice.
- SQLmap - Nice open source SQL Injection Assistant tool. (It it quite good, but knowledge about SQLi is a must.)
- Metasploit - It has some nice Web App Sec modules and scanners but I hardly ever use them.

Whenever it is possible to execute PHP code on the target system I tend to use this:
HaXxd00r - http://intern0t.net/haxxd00r/ (it's a backdoor creator, it's used when I need to create and encode a backdoor in php fast.)
XSSOR - http://intern0t.net/xssor/ (mostly used for XSS encoding, but I use it to encode backdoors too.)

And of course custom Python and PHP scripts written on-the-fly. (Mostly simple yet helpful stuff.)

I hope someone will benefit from this list even though it looks incomplete but Web App Sec, doesn't really require that many tools because most of the tools available, are just made to speed up the process or aid during a pentest.

Keep in mind that some hosts filters vulnerability scanners and denies them access by looking at the user-agent so if you modify that then this limitation shouldn't affect you. Furthermore, vulnerability scanners produces a lot of traffic including logs, keep that in mind if you need to be stealthy, stay away from these scanners.

If it's only a matter of traffic, simply use these scanners while there's a lot of traffic towards the target site. However sometimes, "attacking" while there really isn't any traffic can be a good idea too.
Last edited by MaXe on Thu Oct 21, 2010 8:01 am, edited 1 time in total.
I'm an InterN0T'er

Return to Network Pen Testing

Who is online

Users browsing this forum: No registered users and 0 guests

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software