Course Outline

Total Page:16

File Type:pdf, Size:1020Kb

Course Outline ProTech Professional Technical Services, Inc. EC-Council Certified Network Defense Architect (CNDA) Course Summary Description This class will immerse the student into an interactive environment where they will be shown how to scan, Outline test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking. Course This course prepares you for Certified Network Defense Architect exam 312-99 Topics • Ethics and Legality • Web Based Password Cracking • Footprinting Techniques • Scanning • SQL injection • Enumeration • Hacking Wireless Networks • System Hacking • Virus and Worms • Trojans & Backdoors • Physical Security • Sniffers • Linux Hacking • Denial of Service • Evading Firewalls, IDS and Honeypots • Social Engineering • Buffer Overflows • Session Hijacking • Cryptography • Hacking Web Servers • Penetration Testing • Web Application Vulnerabilities Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This course was specially designed for Government Agencies. Prerequisite There are no prerequisites for this course. Duration Five Days Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically. ProTech Professional Technical Services, Inc. EC-Council Certified Network Defense Architect (CNDA) Course Outline I. Ethics and Legality 13. GFI Languard A. Why Security? 14. ISS Security Scanner B. The Security, functionality and ease of use 15. Netcraft Outline Triangle 16. IPsec Scan C. Can Hacking be Ethical? 17. NetScan Tools pro 2003 D. Essential Terminology. 18. Super Scan E. Elements of Security. 19. Floppyscan F. What does a Malicious Hacker do? G. War Dialer G. Difference between Penetration Testing H. Hacking Tools and Ethical Hacking. 1. THC Scan H. Hacker Classes. 2. Friendly Pinger I. What do Ethical Hackers do? 3. Cheops J. Skill Profile of an Ethical Hacker. 4. Security Administrator’s Tool for Course K. Modes of Ethical Hacking. Analyzing Network (SATAN) L. Security Testing. 5. SAFEsuite Internet Scanner M. Deliverables. 6. IdentTCPScan N. Computer Crimes and Implications. 7. PortScan Plus O. Legal Perspective (US Federal Laws). 8. Strobe 9. Blaster Scan II. Footprinting I. OS Fingerprinting A. Defining Footprinting. J. Active Stack fingerprinting B. Information Gathering Methodology. K. Tool for Active Stack fingerprinting C. Locate the Network Range. 1. XPROBE2 D. Hacking Tools: L. Passive Fingerprinting 1. Whois M. Proxy Servers 2. Nslookup N. Hacking Tools 3. ARIN 1. Socks Chain 4. Traceroute 2. Anonymizers 5. NeoTrace 3. HTTP Tunnel 6. VisualRoute Trace 4. HTTPort 7. SmartWhois O. Countermeasures 8. Visual Lookout 9. VisualRoute Mail Tracker IV. Enumeration 10. eMailTrackerPro A. What is Enumeration? B. NetBios Null Sessions III. Scanning C. Hacking Tools A. Definition of Scanning. 1. DumpSec B. Types of scanning 2. Winfo C. Objectives of Scanning 3. NetBIOS Auditing Tool (NAT) D. Scanning Methodology D. Null Session Countermeasures E. Classification of Scanning E. NetBIOS Enumeration F. Hacking Tools F. Hacking Tool :NBTScan 1. Nmap G. Simple Network Management 2. XMAS Scan 1. Protocol (SNMP) Enumeration 3. FIN Scan H. Hacking Tools 4. Null Scan 1. Solarwinds 5. Windows Scan 2. Enum 6. Idle Scan SNScan 7. Nessus I. SNMP Enumeration Countermeasures 8. Retina J. Management Information Base (MIB) 9. Saint K. Windows 2000 DNS Zone Transfer 10. HPing2 L. Blocking Win 2k DNS Zone Transfer 11. Firewalk M. Enumerating User Accounts 12. NIKTO N. Hacking Tools Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically. ProTech Professional Technical Services, Inc. EC-Council Certified Network Defense Architect (CNDA) Course Outline (cont.) 1. User2sid and Sid2user 1. GetAdmin 2. UserInfo 2. hk.exe 3. GetAcct AA. Keystroke Loggers Outline 4. DumpReg BB. Hacking Tools 5. Trout 1. IKS Software Keylogger 6. Winfingerprint 2. Ghost Keylogger 7. PsTools 3. Hardware Key Logger 8. (PSFile,PSLoggedOn,PSGetSid,PS 4. Spyware Spector Info,PSService,P SList,PSKill, 5. eBlaster 9. PSSuspend, PSLogList, PSExec, CC. Hiding Files PSShutdown) DD. Creating Alternate Data Streams O. Active Directory Enumeration and EE. ADS creation and detection Countermeasures FF. Hacking Tools Course 1. Makestream V. System Hacking 2. ads_cat A. Administrator Password Guessing 3. Streams B. Manual Password Cracking Algorithm 4. LADS (List Alternate Data Streams) C. Automated Password Cracking GG. NTFS Streams Countermeasures D. Password Types HH. Stealing Files Using Word Documents E. Types of Password Attacks II. Field Code Countermeasures F. Hacking Tool JJ. Steganography 1. NTInfoScan (CIS) KK. Spyware Tool - Desktop Spy G. Performing Automated Password LL. Hacking Tools Guessing 1. Steganography tools H. Hacking Tool A. DiSi-Steganograph I. Legion B. EZStego J. Password Sniffing C. Gif-It-Up v1.0 Gifshuffle K. Hacking Tools D. Hide and Seek JPEG-JSTEG 1. LOphtcrack MandelSteg and GIFExtract 2. pwdump2 and pwdump3 Mp3Stego 3. KerbCrack E. Nicetext 4. NBTdeputy F. Pretty Good Envelope L. NetBIOS DoS Attack G. OutGuess M. Hacking Tools H. SecurEngine 1. NBName I. Stealth 2. John the Ripper J. Steganos N. LAN Manager Hash K. Steghide O. Password Cracking Countermeasures L. Stegodos P. Syskey Utility M. Stegonosaurus Q. Cracking NT/2000 Passwords N. StegonoWav R. Hacking Tool O. wbStego 1. NTFSDOS 2. Image Hide S. SMB Logon 3. MP3Stego T. Hacking Tool: SMBRelay 4. StegonoWav U. SMBRelay Man-in-the-Middle Scenario Snow.exe V. Hacking Tool : SMBRelay2 1. Camera/Shy MM. Steganography Detection W. SMBRelay Weaknesses and NN. Hacking Tool Countermeasures 1. diskprobe.exe X. Hacking Tools OO. Covering Tracks 1. SMBGrind PP. Disabling Auditing and clearing Event 2. SMBDie Logs Y. Privilege Escalation QQ. Hacking Tool Z. Hacking Tools 1. Dump Event Log Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically. ProTech Professional Technical Services, Inc. EC-Council Certified Network Defense Architect (CNDA) Course Outline (cont.) 2. elsave.exe O. Hard Disk Killer (HDKP 4.0) 3. WinZapper P. ICMP Tunneling 4. Evidence Eliminator Q. Hacking Tool: Loki Outline RR. RootKit R. Loki Countermeasures SS. Planting the NT/2000 RootKit S. Reverse WWW Shell – Covert Channels TT. Hacking Tools using HTTP 1. Fu T. Hacking Tools 2. Vanquish 1. fPort UU. Rootkit Countermeasures 2. TCP View VV. Hacking Tool U. Tripwire 1. Patchfinder 2.0 V. Process Viewer W. Inzider-Tracks Processes and Ports VI. Trojans and Backdoors X. System File Verification Course A. Effect on Business Y. Trojan horse Construction Kit B. What is a Trojan? Z. Anti-Trojan C. Overt and Covert Channels AA. Evading Anti-Trojan/Anti-Virus using D. Working of Trojans Stealth Tools v 2.0 E. Different Types of Trojans BB. Reverse Engineering Trojans F. What Trojan Creators look for? CC. Backdoor Countermeasures G. Different ways a Trojan can get into a system VII. Sniffers H. Indications of a Trojan Attack A. Definition of sniffing I. Some famous Trojans and ports used by B. How a Sniffer works? them C. Passive Sniffing J. How to determine which ports are D. Active Sniffing “Listening”? E. Hacking Tool: EtherFlood K. Different Trojans found in the Wild F. Man-in-the-Midle Attacks 1. Beast 2.06 G. Spoofing and Sniffing Attacks 2. Phatbot H. ARP Poisoning and countermeasures 3. Senna Spy 1. Hacking Tools 4. CyberSpy 2. Ethereal 5. Remote Encrypted Callback UNIX 3. Dsniff Backdoor (RECUB) 4. Sniffit 6. Amitis 5. Aldebaran 7. QAZ 6. Hunt 8. Back Orifice 7. NGSSniff 9. Back Orifice 2000 8. Ntop pf 10. Tini 9. IPTraf Etherape Netfilter Network 11. NetBus Probe 12. SubSeven 10. Windump 13. Netcat 11. Etherpeek 14. Subroot 12. Ettercap 15. Let me Rule 2.0 Beta 9 13. SMAC 16. Donald Dick 14. Mac Changer 17. Graffiti.exe 15. Iris 18. EliteWrap 16. NetIntercept 19. IconPlus 17. WinDNSSpoof 20. Restorator 18. NetIntercept 21. Whack-a-mole 19. Win DNSpoof 22. Firekiller 2000 20. TCPDump L. BoSniffer 21.
Recommended publications
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • CEH Study Guide
    CEH Study Guide Exam Code 312-50v8 Version 8 Study Guide Provided by TrainACE© The Certified Ethical Hacker Certification covers the fundamentals of hacking, footprinting and scanning. A CEH certification indicates than an individual possess the skills, knowledge and ability to effectively exploit and defend their own systems. This study guide focuses on Trojans, Linux, Servers, Networks and other forms of hacking to equip future Ethical Hackers with the tools to pass the CEHv8 exam and succeed in their field. Study Guide Provided by TrainACE© Q: Robert hopes to start a career in computer security. As a new college-level student, he has just learned the term ethical hacking, which is a key part of secure information systems. Of the below options, choose which will be key areas of expertise for Robert’s future career. Answer is complete. Select more than one answer if applicable. a. Robert needs to gain a large body of knowledge about how computers function, with special regard to networking and programming. b. Operating systems are very important to Robert’s career. Because companies utilize varying operating systems, including Windows (multiple versions), Mac (multiple versions), UNIX, and Linux, he must develop an advanced understanding of each of the major operating systems. c. Robert should gain familiarity with computing and hardware platforms, which are key to software development. d. Robert should be able to write reports related to his field and have great expertise in communication relating to computer security. Solution: All of the above are correct. Breakdown: Each of the above areas is important for Robert’s future career.
    [Show full text]
  • Hacking Windows-Specific Services
    Hacking / Hacking Exposed Windows Server 2003: Windows Security Secrets & Solutions / Scambray, McClure / 223061-4 / Chapter 5 CHAPTER 5 Hacking Windows-Specific Services Footprint Scan Enumerate Penetrate Applications Escalate Services: IIS, SQL, TS Get interactive CIFS/SMB Presented by: Pillage Internet clients Expand influence Physical attacks Cleanup 117 118 Hacking Exposed Windows Server 2003: Windows Security Secrets & Solutions o far in our assault on Windows Server 2003, we’ve identified targets and running services, and we have connected to certain services to enumerate system data. Now Scomes the moment you’ve all been waiting for: the break-in. As discussed in Chapter 2, the primary goal of remote Windows Server 2003 system penetration is to authenticate to the remote host. We can do this by ▼ Guessing username/password combinations ■ Eavesdropping on or subverting the authentication process ■ Exploiting a vulnerable network service or client ▲ Gaining physical access to the system This chapter will discuss the first three items on this list, while the last one will be dis- cussed in Part IV of this book. IIS, SQL Server, and Terminal Server will be discussed individually in Chapters 10, 11, and 12, respectively, due to the vast attention malicious hackers have historically paid to those services. As we saw in Chapter 2, the core of the NT family authentication system includes the LAN Manager (LM) and Windows NT LAN Manager (NTLM) protocols (including NTLM version 2). These protocols were designed primarily for a protected internal envi- ronment. With Windows 2000, Microsoft adopted the widely used standard Kerberos version 5 protocol as an alternative to LM and NTLM in an attempt to broaden the scope of its authentication paradigm, and also in part to blunt longstanding criticism of security weaknesses in the proprietary LM/NTLM suite.
    [Show full text]
  • Tesis Seguridad En Redes De Datos
    UNIVERSIDAD DON BOSCO FACULTAD DE INGENIERÍA ESCUELA DE ELECTRÓNICA SEGURIDAD EN REDES DE DATOS TRABAJO DE GRADUACIÓN PARA OPTAR AL GRADO DE INGENIERO EN ELECTRÓNICA PRESENTADO POR: LUIS ALBERTO ORELLANA BENAVIDES RAFAEL CRISTÓBAL HERNÁNDEZ VÁSQUEZ ASESOR: ING. CARLOS GIOVANNI VÁSQUEZ CUCHILLA SOYAPANGO, CIUDADELA DON BOSCO, OCTUBRE DEL 2003. UNIVERSIDAD DON BOSCO FACULTAD DE INGENIERÍA ESCUELA DE ELECTRÓNICA TRABAJO DE GRADUACIÓN SEGURIDAD EN REDES DE DATOS COMITÉ EVALUADOR: ING. CARLOS GIOVANNI VÁSQUEZ CUCHILLA ASESOR ING. EDGARDO CRUZ ZELEDÓN ING. ÁNGEL ERNESTO SORIANO JURADO JURADO ING. JUAN CARLOS CASTRO JURADO UNIVERSIDAD DON BOSCO FACULTAD DE INGENIERÍA ESCUELA DE ELECTRÓNICA RECTOR: ING. FEDERICO MIGUEL HUGUET RIVERA SECRETARIO GENERAL: LIC. MARIO OLMOS VICERRECTOR ACADÉMICO: LIC. VÍCTOR MANUEL BERMÚDEZ DECANO DE LA FACULTAD DE INGENIERÍA: ING. CARLOS BRAN ASESOR: ING. CARLOS GIOVANNI VÁSQUEZ CUCHILLA JURADOS EVALUADORES: ING. EDGARDO CRUZ ZELEDÓN ING. ÁNGEL ERNESTO SORIANO ING. JUAN CARLOS CASTRO DEDICATORIA A mi familia y amigos, especialmente a mis Padres y hermanos, a mi esposa Karla y a mis hijos Luis y Samuel. Luis Alberto Orellana Benavides. AGRADECIMIENTOS A Dios todo poderoso por haberme ayudado en toda mi carrera, a nuestro asesor, Ing. Giovanni Vásquez, mi compañero de Tesis y a Sergio Díaz por toda su ayuda recibida. Luis Alberto Orellana Benavides. DEDICATORIA A toda mi familia: Padres Ricardo y Emma de Hernández, mis hermanos: Ricardo, Mercedes, Gilberto y Claudia, Mi Abuela: María Antonia Calderón Vda. de Vásquez (Q.D.D.G), mi tía Concepción Sosa Romero y demás familiares quienes saben lo difícil y sacrificado que ha sido mi carrera, pero que en todo momento siempre confiaron en mi, no importando los sacrificios que esto implicare, a toda mi familia en general a quienes Amo y llevo en mi corazón, a todos ellos les dedico en muestra de mi agradecimiento este trabajo de graduación.
    [Show full text]
  • Mcgraw.Hacking Exposed- Network Security Secrets & Solutions, Third
    Color profile:ProLib8 Generic/ Hacking CMYK Exposed: printer profile Network Security Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Front Composite Default screen Matter HACKING EXPOSED: NETWORK SECURITY SECRETS AND SOLUTIONS, THIRD EDITION STUART McCLURE JOEL SCAMBRAY GEORGE KURTZ Osborne/McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto P:\010Comp\Hacking\381-6\fm.vp Monday, September 10, 2001 2:11:09 PM Color profile:ProLib8 Generic/ Hacking CMYK Exposed: printer profile Network Security Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Front Composite Default screen Matter Osborne/McGraw-Hill 2600 Tenth Street Berkeley, California 94710 U.S.A. To arrange bulk purchase discounts for sales promotions, premiums, or fund-raisers, please contact Osborne/McGraw-Hill at the above address. For information on transla- tions or book distributors outside the U.S.A., please see the International Contact Infor- mation page immediately following the index of this book. Hacking Exposed: Network Security Secrets and Solutions, Third Edition Copyright © 2001 by The McGraw-Hill Companies. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. 1234567890 CUS CUS 01987654321 Book p/n 0-07-219382-4 and CD p/n 0-07-219383-2 parts of ISBN 0-07-219381-6 Publisher Proofreaders Brandon A.
    [Show full text]
  • A Summary of Hacking Organizations, Conferences, Publications, and E
    A Summary of Hacking Organizations, Conferences, Publications, and E... http://www.cse.wustl.edu/~jain/cse571-07/ftp/hacking_orgs/ A Summary of Hacking Organizations, Conferences, Publications, and Effects on Society Alisha Cecil [[email protected]] Abstract Since the early 1970's, hackers have been prevalent throughout the computing world. Two main categories of Hackers have evolved: the Open Source and Free Software group and the Security Hackers group. This paper details some of the more notable groups and individuals of each 'category' of hackers, the effects of hacking on society, as well as conferences and publications that they are responsible for that have contributed to the modern hacking world. Table of Contents 1.0 Introduction 2.0 Hacking Sytles 3.0 Hacker Etiquette & Ethics 4.0 Hacking Groups & Individuals 4.1 Open Source & Free Software Hackers 4.2 Security Hackers 4.2.1 Chaos Computer Club (CCC) 4.2.2 Legion of Doom (LoD) 4.2.3 The Mentor 4.2.4 cDc Communications 4.2.5 Shadow Crew 5.0 Hacker Conferences 5.1 Chaos Communication Congress 5.2 SummerCon 5.3 HoHoCon (or Xmas Con) 5.4 DEF CON 5.5 Hackers on Planet Earth (H.O.P.E.) 5.6 Black Hat Briefiengs 6.0 Hacker Publications 6.1 2600: Hacker Quarterly 6.2 Phrack 7.0 Hackers Effects on Society 8.0 Summary List of Acronyms References 1.0 Introduction Since the early 1970's, hackers have been prevalent throughout the computing world. They come in all shapes, 1 of 16 12/19/2007 5:12 PM A Summary of Hacking Organizations, Conferences, Publications, and E..
    [Show full text]
  • Pour Une Problématisation De La Technologie En Éducation Propositions Théoriques Pour Un Espace Pédagogique Alternatif De La Technologie
    Pour une problématisation de la technologie en éducation Propositions théoriques pour un espace pédagogique alternatif de la technologie Thèse Patrick Plante Doctorat en technologie éducative Philosophiae Doctor (Ph.D) Québec, Canada © Patrick Plante, 2014 Résumé Cette thèse s’intéresse à la place alternative que pourrait prendre la technologie dans la poursuite des grandes finalités éducatives qui ont pour objectif de former des citoyens qui ont le souci des autres et qui participent à relever les défis de notre temps. Proposer un rôle alternatif à la technologie en éducation, c’est d’abord critiquer son rôle actuel, c’est faire passer la technologie du statut de solution à celui de problème. Cette critique de la technologie se fonde sur une perspective issue des théories critiques qui autorise à penser la technologie au-delà de son aspect fonctionnel en y reconnaissant un aspect politique. La démarche méthodologique empruntée dans cette recherche est théorique et spéculative, interpellant les axes que sont l’interprétation, l’argumentation et le récit. Cette thèse a pour premier objectif l’appropriation de la théorie politique de la technologie d’Andrew Feenberg. Cette théorie, qui est aussi le cadre théorique de la recherche, est présentée aux côtés des principales théories de la technologie. Un deuxième objectif consiste à dresser un idéal-type du hacker. Le hacker est ce personnage de la révolution numérique qui code, décode et recode la technologie et les réseaux. C’est cet idéal-type qui est confronté à la théorie de Feenberg. Un dernier objectif consiste à formuler des propositions théoriques qui pourraient enrichir le champ d’études de la technologie éducative en intégrant d’une manière explicite la dimension politique de la technologie en vue de constituer un espace pédagogique alternatif de la technologie.
    [Show full text]
  • Links to Tools Listed in the Book
    Color profile: Generic CMYK printer profile Composite Default screen Links to Tools Listed in the Book Chapter 1: Footprinting Wget http://www.gnu.org/software/wget/wget.html for UNIX Teleport Pro http://www.tenmax.com/teleport/home.htm for Windows FerretSoft http://www.ferretsoft.com axfr http://ftp.cdit.edu.cn/pub/linux/www.trinux.org/src/netmap/ axfr-0.5.2.tar.gz traceroute ftp://ftp.ee.lbl.gov/traceroute.tar.gz VisualRoute http://www.visualroute.com NeoTrace http://www.neotrace.com/ snort http://www.snort.org/ RotoRouter http://packetstormsecurity.org/UNIX/loggers/rr-1.0.tgz Chapter 2: Scanning fping http://packetstormsecurity.org/Exploit_Code_Archive/fping.tar.gz Legion 2.1 from Rhino9 http://www.nmrc.org/files/snt/ SolarWinds http://www.solarwinds.net WS_Ping ProPack http://www.ipswitch.com NetScanTools http://www.nwpsw.com Hping http://www.kyuzz.org/antirez/ icmpenum, from http://www.nmrc.org/files/sunix/icmpenum-1.1.1.tgz Simple Nomad Genius version 3.1 http://www.indiesoft.com/ Links to Tools Listed in the Book 1 P:\010Comp\Hacking\381-6\CD\Prelim\ToolLink.vp Tuesday, August 21, 2001 11:50:43 AM Color profile: Generic CMYK printer profile Composite Default screen BlackICE from http://www.networkice.com Network ICE Scanlog http://www.openwall.com/scanlogd Courtney1.3 http://packetstormsecurity.org/UNIX/audit/courtney-1.3.tar.Z Ippl 1.4.10 http://pltplp.net/ippl/ Protolog 1.0.8 http://packetstormsecurity.org/UNIX/loggers/protolog-1.0.8.tar.gz loki http://www.phrack.org/show.php?p=51&a=6 Pingd http://packetstormsecurity.org/UNIX/ misc/pingd-0.5.1.tgz icmpquery http://packetstormsecurity.org/UNIX/scanners/icmpquery.c icmpush http://packetstormsecurity.org/UNIX/scanners/icmpush22.tgz Strobe ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/strobe-1.06.tgz udp_scan SATAN, http://wwdsilx.wwdsi.com now called SAINT netcat or nc http://www.atstake.com/research/tools/nc11nt.zip nmap.
    [Show full text]