|
Winfo.exe |
Winfo
IPADDRESS -n |
Description: Gets userids
and shares from the server. |
|
|
|
|
NAT |
Nat
-o list -u userlist.txt -p passlist.txt IPADDRESS |
Description: Netbios
Auditing Tool |
|
|
|
|
Tcpnv.exe |
Tcpnv |
Description: Gets information
of all machines in the network. |
|
|
|
|
SuperScanner |
SuperScanner |
Description: Port scan
a machine or a subnet |
|
|
|
|
Lc_gui |
Lc_gui |
Description: L0phtcrack
used to crack NT passwords. |
|
|
|
|
Dumpevt |
DUMPEVT /LOGFILE=SEC
/OUTFILE=C:\SECLIST /COMPUTER=COMPUTERNAME |
Description: Dump event
viewer log to a file for analysis |
|
|
|
|
Dumpreg |
Dumpreg |
Description: Dumps registry
to a text file for analysis |
|
|
|
|
AckCMD |
AckCMD |
Description: Tool to
begin the process of bypassing Firewall security using ACK Tunneling. |
|
|
nmapnt |
nmap for Windows NT |
Description: Another
Swiss army knife for scanning and much much more. |
|
CIS |
Cerberus Internet Scanner
5.0 |
Description: Known Vulnerabilities
Scanner. |
|
HPING |
HPING2 |
Description: hping is
a command-line oriented TCP/IP packet assembler/analyzer |
|
Snarf |
Snarf |
Description: Command
Line Resource Grabber |
|
Snort |
Snort |
Description: Snort is
a lightweight network intrusion detection system, capable of performing
real-time traffic analysis and packet logging on IP networks. |
|
chntpw |
chntpwd |
Description: This is
a utility to (re)set the password of any user that has a valid (local)
account on your NT system |
|
Fport |
Fport |
Description: Port to
Process mapper. Great when you have no idea what service or application
has a specific port open. |
|
Promiscan |
Promiscan |
Description: Searches
for promiscuous nodes on the network. |
|
COPS |
Computer
Oracle and Password System |
Description:
Unix Security issue identification system. |
|
Cgichk |
Cgichk |
|
|
Description:
CGI scanner. |
|
Coroner's
Toolkit |
Coroner's
Toolkit |
Description:
Break in post mortem analysis. |
|
Crack |
Crack |
Description:
Password cracker |
|
Dsniff |
Dsniff |
Description:
Network Auditing and Pen Testing Tools |
|
JASS |
Solaris
Security Toolkit |
Description:
Sun Microsystems provided system hardening utility. |
|
MetaSploit |
MetaSploit |
Description:
Proof of Concept Exploit Demonstrations |
|
Nikto |
Nikto |
Description:
Web Server Scanner which performs comprehensive scans of over 3100
potentially dangerous files. |
|
|
|