2 oct. 2009

Top 100 Open Source Security Tools

En  jeromiejackson.com han publicado un listado de las 100 mejores (según ellos) Herramieneas de Seguridad de código abieto: "Top 100 Security Assessment, Vulnerability Auditing and Security Tools":

1
Stockade
Virtual Appliance with Snort, BASE, Inprotect, CACTI, NTOP & Others
2
Open source vulnerability assessment tool
3
Snort
Intrusion Detection (IDS) tool
4
Wireshark
TCP/IP Sniffer- AKA Ethereal
5
Analyze applications that communicate using the HTTP and HTTPS protocols
6
Wikto
Web server assessment tool
7
BackTrack
Penetration Testing live Linux distribution
8
Netcat
The network Swiss army knife
9
Metasploit Framework
Comprehensive hacking framework
10
Sysinternals
Collection of windows utilities
11
Paros proxy
Web application proxy
12
Enum
Enumerate Windows information
13
P0F v2
Passive OS identification tool
14
IPPersonality
Masquerade IP Stack
15
SLAN
Freeware VPN utility
16
IKE Crack
IKE/IPSEC cracking utility
17
ASLEAP
LEAP cracking tool
18
Karma
Wireless client assessment tool- dangerous
19
WEPCrack
WEP cracking tool
20
Wellenreiter
Wireless scanning application
21
Great Google hacking tool
22
Several DDOS Tools
Distributed Denial of Service(DDOS) tools
23
Achilles
Web Proxy Tool
24
Firefox Web Developer Tool
Manual web assessment
25
Scoopy
Virtual Machine Identification tool
26
WebGoat
Learning tool for web application pentests
27
FlawFinder
Source code security analyzer
28
ITS4
Source code security analyzer
29
Slint
Source code security analyzer
30
PwDump3
Dumps Windows 2000 & NT passwords
31
Loki
ICMP covert channel tool
32
Zodiac
DNS testing tool
33
Hunt
TCP hijacking tool
34
SniffIT
Curses-Based sniffing tool
35
CactiEZ
Network traffic analysis ISO
36
Inprotect
Web-based Nessus administration tool
37
OSSIM
Security Information Management (SIM)
38
Nemesis
Command-Line network packet manipulation tool
39
NetDude
TCPDump manipulation tool
40
TTY Watcher
Terminal session hijacking
41
Stegdetect
Detects stego-hidden data
42
Hydan
Embeds data within x86 applications
43
S-Tools
Embeds data within a BMP, GIF, & WAV Files
44
Nushu
Passive covert channel tool
45
Ptunnel
Transmit data across ICMP
46
Covert_TCP
Transmit data over IP Header fields
47
THC-PBX Hacker
PBX Hacking/Auditing Utility
48
THC-Scan
Wardialer
49
Syslog-NG
MySQL Syslog Service
50
Edit WinNT 4 & Win2000 log files
51
Rootkit Detective
Rootkit identification tool
52
Rootkit Releaver
Rootkit identification tool
53
RootKit Hunter
Rootkit identification tool
54
Rootkit identification tool
55
LKM
Linux Kernal Rootkit
56
TCPView
Network traffic monitoring tool
57
NMAP
Network mapping tool
58
Ollydbg
Windows unpacker
59
UPX
Windows packing application
60
Burneye
Linux ELF encryption tool
61
GUI-Based packer/wrapper
62
EliteWrap
Backdoor wrapper tool
63
SubSeven
Remote-Control backdoor tool
64
MegaSecurity
Site stores thousands of trojan horse backdoors
65
Netbus
Backdoor for Windows
66
Back Orfice 2000
Windows network administration tool
67
Tini
Backdoor listener similar to Netcat
68
Microsoft Baseline Security Analyzer
69
OpenVPN
SSL VPN solution
70
Sguil
An Analyst Console for network security/log Monitoring
71
Honeyd
Create your own honeypot
72
Brutus
Brute-force authentication cracker
73
cheops / cheops-ng
Maps local or remote networks and identifies OS of machines
74
ClamAV
A GPL anti-virus toolkit for UNIX
75
Fragroute/Fragrouter
Intrusion detection evasion toolkit
76
Arpwatch
Monitor ethernet/IP address pairings and can detect ARP Spoofing
77
Angry IP Scanner
Windows port scanner
78
Firewalk
Advanced traceroute
79
RainbowCrack
Password Hash Cracker
80
EtherApe
EtherApe is a graphical network monitor for Unix
81
WebInspect
Web application scanner
82
Tripwire
File integrity checker
83
Ntop
Network traffic usage monitor
84
Sam Spade
Windows network query tool
85
Scapy
Interactive packet manipulation tool
86
Superscan
A Windows-only port scanner
87
Airsnort
802.11 WEP Encryption Cracking Tool
88
Aircrack
WEP/WPA cracking tool
89
NetStumbler
Windows 802.11 Sniffer
90
Dsniff
A suite of powerful network auditing and penetration-testing tools
91
John the Ripper
Multi-platform password hash cracker
92
BASE
The Basic Analysis and Security Engine- used to manage IDS data
93
Kismet
Wireless sniffing tool
94
Network authentication cracker
95
Nikto
Web scanner
96
Tcpdump
TCP/IP analysis tool
97
Windows password auditing and recovery application
98
Shell access across port 80
99
THC-SecureDelete
Ensure deleted files are unrecoverable
100
THC-AMAP
Application mapping tool

Fuente: http://jeromiejackson.com/

Author & Editor

Ingeniero Civil en Computación (Universidad de Chile FCFM) y Diplomado en Gestión y Evaluación de Proyectos TI (Universidad de Chile FEN). Actualmente trabajo como Project Manager en varios proyectos y como asesor tecnológico para empresas.

0 Notaciones:

Publicar un comentario

Nota: solo los miembros de este blog pueden publicar comentarios.

Labels

0-day (12) 1337day (1) 8.8 (2) Adobe Acrobat (1) Android (2) Anonimato (1) Anonymous (9) BackDoor (2) BackTrack (15) badUSB (1) Base64 (1) Black Hat (7) BlackHat (1) Blackploit (25) Brute Force (3) Bug (106) Bypass Password (1) Bypass Redirect (1) C99 Shell (1) Carding (1) CheatSheet (15) Chilean Way (1) Conference (10) Cryptsetup (1) CSRF (1) DDoS (11) DEF CON (3) DEFCON (7) Diapositivas (1) Diseño Web (1) Distro Linux (27) Documental (2) DoS (2) Drupal (1) DuckDuckGo (1) E-zine (18) Ekoparty (1) Escaneo (4) España (1) Exploit (64) Ezine (1) Facebook (1) Fast-Info (44) FBI (1) Ficheros Binarios (1) Firefox (4) Flash (2) Forense (9) Fuerza Bruta (11) Fuga de Datos (1) GhostShell (1) GNU/Linux (4) Google (2) Guía (1) Hack T00LZ (130) Hack Tips (63) Hacked (6) Hacking (18) Hacking Hardware (5) HashCat (1) Herramientas (121) HighSecCON (1) Humor Geek (13) Infografía (1) Ingeniería Social (5) Inj3ct0r (1) Internet Explorer (3) Java (7) JavaScript (2) Kali (3) KitPloit (1) Leaks (21) Linux OS (79) LulzSec (1) Mac OS (10) Magazine (1) Malaware (3) Malaware Tools (12) Malware (1) Man in the Middle (15) Manuales (3) MD5 CRACK (4) Metasploit (57) MSSQL (1) MySQL (6) MySQL CRACK (1) Nmap (6) Nmap NSE (2) Noticias (193) NTLM CRACK (1) Ofuscar (5) OpenSolaris OS (1) OpenSSL (1) ORACLE (1) OWASP (3) Paper (10) PDF (7) PenTest (14) Perl (2) Phearking (13) Phishing (3) PHP (13) phpMyAdmin (1) PoC (1) Premios Bitacoras (1) Presentaciones (11) PRISM (1) Privacidad (2) Programación (12) Programas Linux (41) Programas Windows (41) Pwned (1) Python (5) Reconocimiento (5) Ruby (2) s (1) Scripts (7) Seguridad (145) Seguridad Web (140) Seguridad Wireless (19) Sensitive Data Exposure (2) SHA1 CRACK (1) Shellshock (1) Slides (1) Spoofing (1) Spyware (1) SQLi (19) SQLi Tools (7) SQLMap (2) SSH (1) Textos (74) Tips (57) Troyanos y Virus (11) Trucos (7) Trucos Win (7) Turiales (56) Tutoriales (18) Twitter (1) Ubuntu (2) Underc0de (1) UnderDOCS (1) Unlock (1) URL Redirection (1) UXSS (1) vBulletin (1) Video (48) Virtualización (2) Web T00LZ (17) Wifislax (1) Wikileaks (1) WikiRebels (1) Windows OS (66) Wireless Tools (13) XSS (16) Youtube (1)

 
biz.