Aircrack-ng
focuses on different areas of WiFi security:
- Monitoring: Packet
capture and export of data to text files for further processing by third
party tools.
- Attacking: Replay
attacks, deauthentication, fake access points and others via packet
injection.
- Testing: Checking WiFi
cards and driver capabilities (capture and injection).
- Cracking: WEP and WPA PSK
(WPA 1 and 2).
All tools are command line which allows for heavy scripting.
Wireshark
Let’s you see what’s
happening on your network at a microscopic level. You
can see what flows through the network and it captures all network data.
Metasploit
Nmap
it useful for tasks such as network inventory, managing service upgrade
schedules, and monitoring host or service uptime. Nmap uses raw IP packets in
novel ways to determine what hosts are available on the network, what services
(application name and version) those hosts are offering, what operating systems
(and OS versions) they are running, what type of packet filters/firewalls are
in use, bypass firewall for port scanning and IDS detection.
NetCat
Netcat is a featured networking utility which reads and writes data
across network connections, using the TCP/IP protocol.
It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.
It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.
Snort
Snort is an open
source network intrusion prevention system, capable of performing real-time
traffic analysis and packet logging on IP networks. It can perform protocol
analysis, content searching/matching, and can be used to detect a variety of
attacks and probes.
Tor
Tor's users employ this network by connecting through a series of
virtual tunnels rather than making a direct connection, thus allowing both
organizations and individuals to share information over public networks without
compromising their privacy. Along the same line, Tor is an effective censorship
circumvention tool, allowing its users to reach otherwise blocked destinations
or content.
0 commentaires:
Post a Comment