Appendix

Tools and Resources

To stay up-to-date with the latest and greatest security testing tools and resources, you need to know where to turn. This appendix contains my favorite security sites, tools, resources, and more that you can benefit from in your ongoing security assessment program.

tip This book’s online Cheat Sheet contains links to all the online tools and resources listed in this appendix. Check it out at www.dummies.com/cheatsheet/hacking.

Advanced Malware

Bit9 + Carbon Black Security Platform — www.bit9.com/solutions

Damballa Failsafe — www.damballa.com/solutions/damballa_failsafe.php

Bluetooth

Blooover — http://trifinite.org/trifinite_stuff_blooover.html

BlueScanner — http://sourceforge.net/projects/bluescanner

Bluesnarfer — www.alighieri.org/tools/bluesnarfer.tar.gz

BlueSniper rifle — www.tomsguide.com/us/how-to-bluesniper-pt1,review-408.html

BTScanner for XP — www.pentest.co.uk/src/btscanner_1_0_0.zip

Car Whisperer — http://trifinite.org/trifinite_stuff_carwhisperer.html

Smurf — www.gatefold.co.uk/smurf

Certifications

Certified Ethical Hacker — www.eccouncil.org/CEH.htm

Certified Information Security Manager — www.isaca.org/Certification/CISM-Certified-Information-Security-Manager/Pages/default.aspx

Certified Information Systems Security Professional — www.isc2.org/cissp/default.aspx

Certified Wireless Security Professional — www.cwnp.com/certifications/cwsp

CompTIA Security+ — http://certification.comptia.org/getCertified/certifications/security.aspx

SANS GIAC — www.giac.org

Databases

Advanced Office Password Recovery — www.elcomsoft.com/aopr.html

Advanced SQL Password Recovery — www.elcomsoft.com/asqlpr.html

AppDetectivePro — www.trustwave.com/Products/Database-Security/AppDetectivePRO

ElcomSoft Distributed Password Recovery — www.elcomsoft.com/edpr.html

Idera — www.idera.com

Microsoft SQL Server 2008 Management Studio Express — www.microsoft.com/en-us/download/details.aspx?id=7593

Nexpose — www.rapid7.com/vulnerability-scanner.jsp

Pete Finnigan’s listing of Oracle scanning tools — www.petefinnigan.com/tools.htm

QualysGuard — www.qualys.com

SQLPing3 — www.sqlsecurity.com/downloads

Denial of Service Protection

CloudFlare — www.cloudflare.com

DOSarrest — www.dosarrest.com

Incapsula — www.incapsula.com

Exploits

Metasploit — www.metasploit.com

Offensive Security’s Exploit Database — www.exploit-db.com

Pwnie Express — https://pwnieexpress.com

General Research Tools

AFRINIC — www.afrinic.net

APNIC — www.apnic.net

ARIN — http://whois.arin.net/ui

Bing — www.bing.com

DNSstuff — www.dnsstuff.com

DNS Tools — www.dnstools.com

The File Extension Source — http://filext.com

Google — www.google.com

Google advanced operators — www.googleguide.com/advanced_operators.html

Government domains — www.dotgov.gov/portal/web/dotgov/whois

Hoover’s business information — www.hoovers.com

LACNIC — www.lacnic.net

Netcraft’s What’s that site running?http://netcraft.com

RIPE Network Coordination Centre — https://apps.db.ripe.net/search/query.html

Switchboard.com — www.switchboard.com

theHarvester — https://code.google.com/p/theharvester

United States Patent and Trademark Office — www.uspto.gov

US Search.com — www.ussearch.com

United States Securities and Exchange Commission — www.sec.gov/edgar.shtml

Whois — www.whois.net

WhatIsMyIP — www.whatismyip.com

Yahoo! Finance — http://finance.yahoo.com

Zabasearch — www.zabasearch.com

Hacker Stuff

2600 The Hacker Quarterlywww.2600.com

Hacker T-shirts, equipment, and other trinkets — www.thinkgeek.com

Hakin9http://hakin9.org

(IN)SECURE Magazinewww.net-security.org/insecuremag.php

Phrack — www.phrack.org

The Jargon File — www.jargon.8hz.com

Keyloggers

KeyGhost — www.keyghost.com

SpectorSoft — www.spectorsoft.com

Laws and Regulations

Computer Fraud and Abuse Act — www.fas.org/sgp/crs/misc/RS20830.pdf

Digital Millennium Copyright Act (DMCA) — www.eff.org/issues/dmca

Gramm-Leach-Bliley Act (GLBA) Safeguards Rule — www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act

Health Insurance Portability and Accountability Act (HIPAA) Security Rule — www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html

Payment Card Industry Data Security Standard (PCI DSS) — www.pcisecuritystandards.org/security_standards/index.php

United States Security Breach Notification Laws — www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx

Linux

BackTrack Linux — www.backtrack-linux.org

GFI LanGuard — www.gfi.com/network-security-vulnerability-scanner

Kali Linux — www.kali.org

Linux Security Auditing Tool (LSAT) — http://usat.sourceforge.net

Nexpose — www.rapid7.com/vulnerability-scanner.jsp

QualysGuard — www.qualys.com

THC-Amap — www.thc.org/thc-amap

Tiger — www.nongnu.org/tiger

Various tools at SourceForge — http://sourceforge.net

Live Toolkits

Comprehensive listing of live bootable Linux toolkits — www.livecdlist.com

Kali Linux — www.kali.org

Knoppix — http://knoppix.net

Network Security Toolkit — www.networksecuritytoolkit.org

Security Tools Distribution — http://s-t-d.org

Log Analysis

ArcSight Logger — www8.hp.com/us/en/software-solutions/arcsight-logger-log-management/index.html

GFI EventsManager — www.gfi.com/eventsmanager

Messaging

Brutus — www.hoobie.net/brutus

Cain & Abel — www.oxid.it/cain.html

DNSstuff relay checker — www.dnsstuff.com

EICAR Anti-Virus test file — www.eicar.org/anti_virus_test_file.htm

GFI e-mail security test — www.gfi.com/pages/email-security.asp

mailsnarf — www.monkey.org/~dugsong/dsniff

theHarvester — https://github.com/laramies/theHarvester

smtpscan — www.freshports.org/security/smtpscan

Miscellaneous

3M Privacy Filters — www.shop3m.com/3m-privacy-filters.html

7-Zip — www.7-zip.org

SmartDraw — www.smartdraw.com

Visio — http://visio.microsoft.com/en-us/preview/default.aspx

WinZip — www.winzip.com

Mobile

BitLocker whitepapers — www.principlelogic.com/bitlocker.html

Checkmarx CxDeveloper — www.checkmarx.com

ElcomSoft Forensic Disk Decryptor — www.elcomsoft.com/efdd.html

ElcomSoft’s Phone Breaker — www.elcomsoft.com/eppb.html

ElcomSoft System Recovery — www.elcomsoft.com/esr.html

iOS Forensic Toolkit — www.elcomsoft.com/eift.html

Ophcrack — http://ophcrack.sourceforge.net

Oxygen Forensic Suite — www.oxygen-forensic.com

Passware Kit Forensic — www.lostpassword.com/kit-forensic.htm

Veracode — www.veracode.com

Microsoft BitLocker Administration and Monitoring — https://technet.microsoft.com/en-us/windows/hh826072.aspx

Networks

Arpwatch — http://linux.maruhn.com/sec/arpwatch.html

Blast — www.mcafee.com/us/downloads/free-tools/blast.aspx

Cain & Abel — www.oxid.it/cain.html

CommView — www.tamos.com/products/commview

dsniff — www.monkey.org/~dugsong/dsniff

Essential NetTools — www.tamos.com/products/nettools

Fortinet — www.fortinet.com

Getif — www.wtcs.org/snmp4tpc/getif.htm

GFI LanGuard — www.gfi.com/network-security-vulnerability-scanner

IKECrack — http://ikecrack.sourceforge.net

MAC address vendor lookup — https://regauth.standards.ieee.org/standards-ra-web/pub/view.html#registries

Nessus vulnerability scanner — www.tenable.com/products/nessus

Netcat — http://netcat.sourceforge.net

netfilter/iptables — www.netfilter.org

NetResident — www.tamos.com/products/netresident

NetScanTools Pro — www.netscantools.com

Nping — https://nmap.org/nping

Nexpose — www.rapid7.com/products/nexpose/compare-downloads.jsp

Nmap port scanner — http://nmap.org

NMapWin — http://sourceforge.net/projects/nmapwin

OmniPeek — www.savvius.com/products/overview/omnipeek_family/omnipeek_network_analysis

Post list — www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.txt

Port number lookup — www.cotse.com/cgi-bin/port.cgiPortSentryhttp://sourceforge.net/projects/sentrytools

PromiscDetect — http://ntsecurity.nu/toolbox/promiscdetect

QualysGuard vulnerability scanner — www.qualys.com

SoftPerfect Network Scanner — www.softperfect.com/products/networkscanner

SMAC MAC address changer — www.klcconsulting.net/smac

SNARE — www.intersectalliance.com/projects/Snare

sniffdet — http://sniffdet.sourceforge.net

SonicWALL — www.sonicwall.com

Synful Knock Scanner — http://talosintel.com/scanner

TamoSoft Essential NetTools — www.tamos.com/products/nettools

Traffic IQ Professional — www.idappcom.com

UDPFlood — www.mcafee.com/us/downloads/free-tools/udpflood.aspx

WhatIsMyIP — www.whatismyip.com

Wireshark — www.wireshark.org

Password Cracking

Advanced Archive Password Recovery — www.elcomsoft.com/archpr.html

BIOS passwords — http://labmice.techtarget.com/articles/BIOS_hack.htm

BitLocker security whitepapers — www.principlelogic.com/bitlocker.html

Brutus — www.hoobie.net/brutus

Cain & Abel — www.oxid.it/cain.html

Crack — ftp://coast.cs.purdue.edu/pub/tools/unix/pwdutils/crack

Default vendor passwords — www.cirt.net/passwords

Dictionary files and word lists

eBlaster and Spector Pro — www.spectorsoft.com

ElcomSoft Distributed Password Recovery — www.elcomsoft.com/edpr.html

ElcomSoft Forensic Disk Decryptor — www.elcomsoft.com/efdd.html

ElcomSoft System Recovery — www.elcomsoft.com/esr.html

Invisible KeyLogger Stealth — www.amecisco.com/iks.htm

John the Ripper — www.openwall.com/john

KeyGhost — www.keyghost.com

LastPass — https://lastpass.com

NetBIOS Auditing Tool — www.securityfocus.com/tools/543

NIST Guide to Enterprise Password Management — http://csrc.nist.gov/publications/drafts/800-118/draft-sp800-118.pdf

NTAccess — www.mirider.com/ntaccess.html

ophcrack — http://ophcrack.sourceforge.net

Oxygen Forensic Suite — www.oxygen-forensic.com

Pandora — www.nmrc.org/project/pandora

Passware Kit Forensic — www.lostpassword.com/kit-forensic.htm

Password Safe — http://passwordsafe.sourceforge.net

Proactive Password Auditor — www.elcomsoft.com/ppa.html

Proactive System Password Recovery — www.elcomsoft.com/pspr.html

Pwdump3 — www.openwall.com/passwords/microsoft-windows-nt-2000-xp-2003-vista-7

RainbowCrack — http://project-rainbowcrack.com

Rainbow tables — http://rainbowtables.shmoo.com

SQLPing3 — www.sqlsecurity.com/downloads

THC-Hydra — www.thc.org/thc-hydra

WinHex — www.winhex.com

Patch Management

Debian Linux Security Alerts — www.debian.org/security

Dell KACE Systems Management Appliance — http://software.dell.com/products/kace-k1000-systems-management-appliance/patch-management-security.aspx

Ecora Patch Manager — www.ecora.com/ecora/products/patchmanager.asp

GFI LanGuard — www.gfi.com/network-security-vulnerability-scanner

IBM BigFix — www-03.ibm.com/security/bigfix

KDE Software Updater — https://en.opensuse.org/System_Updates

Lumension Patch and Remediation — www.lumension.com/vulnerability-management/patch-management-software.aspx

ManageEngine — www.manageengine.com/products/desktop-central/linux-management.html

Microsoft Security TechCenter — https://technet.microsoft.com/en-us/security/default.aspx

Shavlik Patch — www.shavlik.com/products/patch

Slackware Linux Security Advisories — www.slackware.com/security

Windows Server Update Services from Microsoft — https://technet.microsoft.com/en-us/windowsserver/bb332157.aspx

Security Education and Learning Resources

Kevin Beaver’s information security articles, whitepapers, webcasts, podcasts, and screencasts — www.principlelogic.com/resources.html

Kevin Beaver’s Security On Wheels information security audio programs — http://securityonwheels.com

Kevin Beaver’s Security On Wheels blog — http://securityonwheels.com/blog

Kevin Beaver’s Twitter page — https://twitter.com/kevinbeaver

Security Methods and Models

Open Source Security Testing Methodology Manual — www.isecom.org/research/osstmm.html

OWASP — www.owasp.org

SecurITree — www.amenaza.com

The Open Group’s FAIR Risk Taxonomy — www.opengroup.org/subjectareas/security/risk

Social Enginering and Phishing

CheckShortURL — www.checkshorturl.com

LUCY — http://phishing-server.com

Simple Phishing Toolkit — https://github.com/sptoolkit/sptoolkit

Social Engineer Toolkit — www.trustedsec.com/social-engineer-toolkit

Where Does This Link Go? — http://wheredoesthislinkgo.com

Source Code Analysis

Checkmarx — www.checkmarx.com

Statistics

Privacy Rights Clearinghouse Chronology of Data Breaches — www.privacyrights.org/data-breach

Verizon Data Breach Investigations Report — www.verizonenterprise.com/DBIR

Storage

Effective File Search — www.sowsoft.com/search.htm

FileLocator Pro — www.mythicsoft.com

Identity Finder — www.identityfinder.com

System Hardening

Bastille Linux Hardening Program — http://bastille-linux.sourceforge.net

Center for Internet Security Benchmarks — www.cisecurity.org

Deep Freeze Enterprise — www.faronics.com/products/deep-freeze/enterprise

Fortres 101 — www.fortresgrand.com

Imperva — www.imperva.com/products/databasesecurity

Linux Administrator’s Security Guide — www.seifried.org/lasg

Microsoft Security Compliance Manager — https://technet.microsoft.com/en-us/library/cc677002.aspx

ServerDefender — www.port80software.com/products/serverdefender

Symantec PGP — www.symantec.com/products-solutions/families/?fid=encryption

WinMagic — www.winmagic.com

User Awareness and Training

Awareity MOAT — www.awareity.com

Dogwood Management Partners Security Posters — www.securityposters.net

Greenidea Visible Statement — www.greenidea.com

Interpact, Inc. Awareness Resources — www.thesecurityawarenesscompany.com

Managing an Information Security and Privacy Awareness and Training Program by Rebecca Herold (Auerbach) — www.amazon.com/Managing-Information-Security-Awareness-Training/dp/0849329639

Peter Davis & Associates training services — www.pdaconsulting.com/services.htm

Security Awareness, Inc. — www.securityawareness.com

Voice over IP

Cain & Abel — www.oxid.it/cain.html

CommView — www.tamos.com/products/commview

Listing of various VoIP tools — www.voipsa.org/Resources/tools.php

NIST’s SP800-58 document — http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf

OmniPeek — www.savvius.com/products/overview/omnipeek_family/omnipeek_network_analysis

PROTOS — www.ee.oulu.fi/research/ouspg/Protos

VoIP Hopper — http://voiphopper.sourceforge.net

vomit — http://vomit.xtdnet.nl

Vulnerability Databases

Common Vulnerabilities and Exposures — http://cve.mitre.org

CWE/SANS Top 25 Most Dangerous Programming Errors — www.sans.org/top25-software-errors

National Vulnerability Database — http://nvd.nist.gov

SANS Critical Security Contrils — www.sans.org/critical-security-controls

US-CERT Vulnerability Notes Database — www.kb.cert.org/vuls

Websites and Applications

Acunetix Web Vulnerability Scanner — www.acunetix.com

AppSpider — www.rapid7.com//products//appspider

Brutus — www.hoobie.net/brutus/index.html

Burp Proxy — https://portswigger.net/burp/proxy.html

Checkmarx CxDeveloper — www.checkmarx.com

Defaced websites — http://zone-h.org/archive

Firefox Web Developer — http://chrispederick.com/work/web-developer

Foundstone’s SASS Hacme Tools — www.mcafee.com/us/downloads/free-tools/index.aspx

Google Hack Honeypot — http://ghh.sourceforge.net

Google Hacking Database — www.exploit-db.com/google-hacking-database

HTTrack Website Copier — www.httrack.com

Netsparker — www.netsparker.com

Paros Proxy — http://sourceforge.net/projects/paros

Port 80 Software’s ServerMask — www.port80software.com/products/servermask

Qualys SSL Labs — www.ssllabs.com

SiteDigger — www.mcafee.com/us/downloads/free-tools/sitedigger.aspx

SQL Inject Me — https://addons.mozilla.org/en-us/firefox/addon/sql-inject-me

SQL Power Injector — www.sqlpowerinjector.com

THC-Hydra — www.thc.org/thc-hydra

Veracode — www.veracode.com

WebGoat — www.owasp.org/index.php/Category:OWASP_WebGoat_Project

WebInspect — www8.hp.com/us/en/software-solutions/webinspect-dynamic-analysis-dast/index.html

WSDigger — www.mcafee.com/us/downloads/free-tools/wsdigger.aspx

WSFuzzer — www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project

Windows

BitLocker security whitepapers — www.principlelogic.com/bitlocker.html

DumpSec — www.systemtools.com/somarsoft/?somarsoft.com

GFI LanGuard — www.gfi.com/network-security-vulnerability-scanner

Microsoft Baseline Security Analyzer — https://technet.microsoft.com/en-us/security/cc184924.aspx

Network Users — www.optimumx.com/download/netusers.zip

Nexpose — www.rapid7.com/products/nexpose/compare-downloads.jsp

QualysGuard — www.qualys.com

SoftPerfect Network Scanner — www.softperfect.com/products/networkscanner

Sysinternals — https://technet.microsoft.com/en-us/sysinternals/default.aspx

Winfo — www.ntsecurity.nu/toolbox/winfo

Wireless Networks

Aircrack-ng — http://aircrack-ng.org

AirMagnet WiFi Analyzer — www.flukenetworks.com/enterprise-network/wireless-network/airmagnet-wifi-analyzer

Asleap — http://sourceforge.net/projects/asleap

CommView for WiFi — www.tamos.com/products/commwifi

Digital Hotspotter — www.canarywireless.com

ElcomSoft Wireless Security Auditor — www.elcomsoft.com/ewsa.html

Homebrew WiFi antenna — www.turnpoint.net/wireless/has.html

Kismet — www.kismetwireless.net

NetStumbler — www.netstumbler.com

OmniPeek — www.savvius.com/products/overview/omnipeek_family/omnipeek_network_analysis

Reaver — https://code.google.com/p/reaver-wps

Super Cantenna — www.cantenna.com

Wellenreiter — http://sourceforge.net/projects/wellenreiter

WEPCrack — http://wepcrack.sourceforge.net

WiFinder — www.boingo.com/retail/#s3781

WiFi Pineapple — www.wifipineapple.com/index.php

WiGLE database of wireless networks — https://wigle.net

WinAirsnort — http://winairsnort.free.fr

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.226.185.87