Tools and Technology


Here is a list of tools discussed in this chapter and others you might find useful:

  • http://www.netstumbler.com

  • http://www.kismetwireless.net

  • Introduction to kismet: http://www.wi-fiplanet.com/tutorials/article.php/3595531

  • BackTrack: http://www.remote-exploit.org/index.php/BackTrack

  • Operator: http://www.ussysadmin.com/operator

  • PHLAK: http://www.public.planetmirror.com/pub/phlak/?fl=p

  • Knoppix-STD: http://www.knoppix-std.org/download.html

  • Wardriving hardware: http://www.wardrivingworld.com

  • Software tools: http://www.wardrive.net/security/tools

  • http://www.paraben-forensics.com



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net