 Wireshark (Known as Ethereal) is the world's most popular network protocol analyzer. It has a rich and powerful feature set and runs on most computing platforms including Windows, OS X, and Linux. It is freely available as open source.
Wireshark (Known as Ethereal) is the world's most popular network protocol analyzer. It has a rich and powerful feature set and runs on most computing platforms including Windows, OS X, and Linux. It is freely available as open source.
NETBUS
 NetBus is a program used to control microsoft windows computer systems over a network. (what we say as "Breaking into Computer System")
NetBus is a program used to control microsoft windows computer systems over a network. (what we say as "Breaking into Computer System")There are two components in this program a client and a server. The server must be installed and run on the computer that should be remotely controlled.
The client program allows the hacker to control the target system. Some of its features includes-
1). Keystroke Logging.
2). Capturing Screen Shots.
3). Shutting down the system, etc...
OPHCRACK
 Ophcrack is an open source program that cracks Windows password (LM HASHES) using rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well as on Linux.
Ophcrack is an open source program that cracks Windows password (LM HASHES) using rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well as on Linux.LC5
 LC 5 supports most password-cracking methods and comes in four versions (professional, administrator, site, and consultant—available features vary depending on version).
LC 5 supports most password-cracking methods and comes in four versions (professional, administrator, site, and consultant—available features vary depending on version).
LC 5 includes a remote agent that lets you centrally manage audits of multiple cross-domain computers and gather all account information at one location. After completing an audit, you can review risk scores, audit method, and character-set or password-length distribution. LC 5 also lets you disable accounts or force users to reset weak passwords.
SUPERSCAN v4.0
A Powerful TCP port scanner, pinger, resolver. Here are some of the features in this version-
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| 
 | 
 hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts. A subset of the stuff you can do using hping:
- Firewall testing
- Advanced port scanning
- Network testing, using different protocols, TOS, fragmentation
- Manual path MTU discovery
- Advanced traceroute, under all the supported protocols
- Remote OS fingerprinting
- Remote uptime guessing
- TCP/IP stacks auditing
- hping can also be useful to students that are learning TCP/IP.
 Hping works on the following unix-like systems: Linux, FreeBSD, NetBSD, OpenBSD, Solaris, MacOs X, Windows.
Brutus is one of the fastest and most flexible remote
 password crackers available for Windows 9x, NT and 2000, there is no UNIX version available. More specifically it is a remote interactive authentication agent. Brutus is used to recover valid access tokens (usually a username and password) for a given target system. Examples of a supported target system might be an FTP server, a password protected web page, a router console a POP3 server etc.
password crackers available for Windows 9x, NT and 2000, there is no UNIX version available. More specifically it is a remote interactive authentication agent. Brutus is used to recover valid access tokens (usually a username and password) for a given target system. Examples of a supported target system might be an FTP server, a password protected web page, a router console a POP3 server etc. THC HYDRA>>>Networking Login Hacking Tool
 Hydra is a software project developed by "The Hacker's Choice" (THC) that uses a dictionary attack to test for weak or simple passwords on one or many remote hosts running a variety of different service.
Hydra is a software project developed by "The Hacker's Choice" (THC) that uses a dictionary attack to test for weak or simple passwords on one or many remote hosts running a variety of different service.
Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that; it is flexible and very fast.
Currently this tool supports:TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC,
RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS,
ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2,
Cisco AAA (incorporated in telnet module).
LCP
 LCP program is used for auditing and recovering user account passwords in Windows NT/2000/XP/2003. Some other functions include Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing, etc.
LCP program is used for auditing and recovering user account passwords in Windows NT/2000/XP/2003. Some other functions include Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing, etc.
MASTER CREDIT CARD GENERATOR
By using a program such as Master Credit Card Generator, hackers could create fictitious credit card numbers to help them set up Internet accounts through online services. Once the online service verified that the credit card number wasn't valid, they would shut down the hacker's account, but with the aid of a few dozen more credit card numbers, hackers could simply create new accounts over and over again.
NMAP
Nmap runs on UNIX-based operating systems such as Linux and comes with full C/C++ source code that you can study and modify. Nmap is the most powerful scanning tool available to both system administrators and hackers.
ObiWan is written to check Webserver. The idea behind this is: Webserver with simple challenge-response authentication mechanism mostly have no switches to set up intruder lockout or delay timings for wrong passwords. In fact this is the point to start from. Every user with a HTTP connection to a host with basic authentication can try username-password combinations as long as he/she like it.
MESSENGER PASSWORD CRACKER GOES PUBLIC

This Trojan targets MSN's user and the hacking is done in real time i.e. face to face - i mean while you are chatting with someone on a messenger. This Trojan has been made public by “Our Godfather” - just a name - on the Bit Torrent network. And the worst part is that hundreds of people have already installed it.
So from now onwards be a little bit more careful while chatting with an unknown person on messenger.
YOU too CAN Become a VICTIM OF TROJAN.......Fire Master 2.1 - Firefox Master Password Recovery Tool
John the Ripper
John the Ripper is another fast password cracker available for Unix, DOS, Win32, etc.. Its primary purpose is to detect weak Unix passwords.
Cain & Abel
My favorite password cracking tool.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.





 




No comments:
Post a Comment