100 likes | 208 Views
Explore key hacking tools like Ollydbg and John the Ripper for reverse engineering, cracking attacks, fuzzing, injection, and more in the world of cybersecurity. Enhance your knowledge and skills with practical applications.
E N D
Knowledge! • milw0rm.org • OWASP.org • governmentsecurity.org • packetstormsecurity.org • securiteam.com -A few of these sites are considered “Archive” sites, but many of these older (exploitable) software suites are still in production environments
Reverse Engineering • Spices.net • Ollydbg • Trillix -Useful for decompiling entry-point software (custom secure tunnels) -Often poorly designed, leaving weaknesses easily accessible to the code-savvy
Cracking/Bruting/Dict. Attacks • Ophcrack -A livecd, based on a linux distro, which allows the system to use as much resources as possible for bruteforcing. • John the Ripper -DES, DDR1 & DDR2, Kerberos AFS, MD5, Blowfish, Windows LM • Wordlists (plain-text.info)
Fuzzing/Stressing • WSFuzzer • neuroFUZZ -Used to provide “random data” (“fuzz”) to web applications, in order to determine the handling of such information. • QEngine -Can be utilized to perform monotonous tasks at a blazing speed, often resulting in a fail-open mode
Injection • Sqlninja -Uses carefully crafted SQL injection methods to fully expose the structure and entries of a MSSQL database • SQL power injector -Automates the process of crafting sql injection queries, simplifies blind SQL injection • Learn the various languages -just enough to learn how to craft queries
Mirroring|gnirorriM • Wget • Xenu (lol) -Able to download entire structures of websites directly. -If target has not properly enabled security, server-side scripts (php) often come down as well.
Forensic Exploration • PMDump&TestDisk -Allows dumping of an active process' memory to a file without interrupting the process. • Photorec -Recovery of “lost” files, supporting almost all filesystem types, able to piece broken sectors together into known filetypes
MITM/Spoofing • dsniff • Ettercap -Easily manage MITM, allowing you to become an AP or DHCP server. • Karma -Used in “Evil Twin” MITM attacks, which allow all responses sent from external web apps to be sent you the target, as well as the “Evil Twin” (you).