Tool | URL | Description |
---|
Bindery | http://www.packetstormsecurity.com/Netware/penetration/ | Utilities for extracting, importing, and exporting bindery information. |
Burglar | http://www.packetstormsecurity.com/Netware/penetration/ | An NLM that will either create a Supe user or make an existing user Supe equivalent. For Netware 3.x. |
Burn | http://www.packetstormsecurity.com/Netware/penetration/ | A tool that burns up drive space on the SYS: volume by filling up the SYS$ERR.LOG. About 1 MB per minute. |
Chknull | http://www.packetstormsecurity.com/Netware/penetration/ | A tool that checks for users that have no password. |
CyberCop Scanner | http://www.tlic.com/security/cybercopscanner.cfm | A vulnerability scanner that tests Windows and UNIX workstations, servers, hubs, and switches. |
DelGuest | http://ntsecurity.nu/toolbox/ | A tool that deletes the built-in Guest account in Windows NT. |
DumpSec | http://www.somarsoft.com | A security auditing program for Microsoft Windows NT/2000. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers, and shares in a concise, readable format so that holes in system security are readily apparent. |
enum | http://www.bindview.com/Services/Razor/Utilities/ | A console-based Win32 information enumeration utility. Using null sessions, enum can retrieve userlists, machine lists, sharelists, namelists, group and member lists, passwords, and LSA policy information. |
Essential Net Tools (ENT) 3 | http://www.zone-h.com/en/download/category=28/ | A tool to get NetBIOS information and remote access. |
GetAcct | http://www.securityfriday.com/tools/GetAcct.html | A tool that sidesteps "RestrictAnonymous=1" and acquires account information on Windows NT/2000 machines. |
Infiltrator Network Security Scanner | http://www.network-security-scan.com | An easy-to-use, intuitive network security scanner that can quickly scan and audit your network computers for vulnerabilities, exploits, and information enumerations. |
InfoServer | http://www.zone-h.com/en/download/category=71/ | A vulnerability scanner for Windows. |
Inzider | http://ntsecurity.nu/toolbox/inzider | A tool that lists processes in your Windows system and the ports that each one listen on. |
Lkminject | http://minithins.net/release.html | A tool to inject a Linux kernel module into another Linux kernel module. |
Metasploit | http://www.metasploit.com/ | A complete environment for writing, testing, and using exploit code. This environment provides a solid platform for penetration testing, shellcode development, and vulnerability research. |
N-Stealth v3.5 | http://www.zone-h.com/en/download/category=71/ | A vulnerability assessment tool for Windows that scans webservers for bugs that allow attackers to gain access. |
NetBrute | http://www.zone-h.com/en/download/category=71/ | A tool that scans a range of IP addresses for resources that have been shared via Microsoft File and Printer Sharing. |
Nbtdump | http://www.zone-h.com/en/download/category=28/ | A utility that dumps NetBIOS information from Windows NT, Windows 2000, and UNIX Samba servers such as shares, user accounts with comments, and the password policy. |
NBTScan | http://www.inetcat.org/software/nbtscan.html | A program for scanning IP networks for NetBIOS name information. |
NCPQuery | http://razor.bindview.com/tools/index.shtml | A free, open-source tool that allows probing of a Novell NetWare server running IP to be queried to enumerate objects. |
Nessus | http://www.nessus.org | A popular vulnerability scanner. |
NetDDE.c | http://www.zone-h.com/en/download/category=71/ | A Microsoft Windows scanner that uses a remote code execution vulnerability because of an unchecked buffer. |
netinfo | http://www.zone-h.com/en/download/category=71/ | A complete scanner for the Windows system. |
NetRecon | http://www.symantec.com | A vulnerability scanner by Symantec. |
NetViewX | http://www.ibt.ku.dk/jesper/NTtools/ | A console application to list servers in a domain/workgroup that run specific services. |
Novell Fake Login | http://www.packetstormsecurity.com/Netware/penetration/ | A fake Novell NetWare login screen that stores the username and password in the file c:\os31337.sys. |
NTLast | http://www.foundstone.com/ | A security log analyzer to identify and track who has gained access to your system and then document the details. |
NetView Scanner | http://www.zone-h.com/en/download/category=71/ | Freeware penetration analysis software that runs on your Windows workstation. |
NWPcrack | http://www.packetstormsecurity.com/Netware/penetration/ | A password-cracking utility for Novell servers. |
Pandora | http://www.nmrc.org/project/pandora/index.html | A set of tools for hacking, intruding, and testing the security and insecurity of Novell NetWare. It works on versions 4 and 5. |
PC Anywhere Scan | http://www.zone-h.com/en/download/category=71/ | A small utility that can scan any range of two IP addresses and show the list of pcANYWHERE hosts within that range. |
PipeUp Admin | http://www.dogmile.com/files | A utility to execute commands with administrative privileges, even if you do not have admin rights on a Windows system. |
ProbeTS | http://www.hammerofgod.com/download.htm | A utility to scan for Windows Terminal Services. |
RPC Dump | http://www.zone-h.com/en/download/category=28/ | A utility that dumps SUN RPC information from UNIX systems. |
Sara | http://www-arc.com/sara | A popular vulnerability scanner. |
Security Analyzer | http://www.netiq.com | A commercial vulnerability scanner made by NetIQ. |
Shadow NW Crack | http://www.packetstormsecurity.com/Netware/penetration/ | Code for breaking into Novell NetWare 4.x. |
STAT Analyzer | http://www.stat.harris.com/techinfo/reskit/default.asp | A tool that automatically consolidates multiple network scanning and modeling results and provides a single, flexible reporting mechanism for reviewing those results. |
TransportEnum | http://www.hammerofgod.com/download.htm | A tool that allows you to get the transport names (devices) in use on a box. |
TSEnum | http://www.hammerofgod.com/download.htm | A tool that quickly scans the network for rogue terminal servers. |
TSGrinder | http://www.hammerofgod.com/download.htm | A brute force terminal server tool. |
unix2tcp | http://www.zone-h.com/en/download/category=28/ | A connection forwarder that converts UNIX sockets into TCP sockets. You can use it to trick some X applications into thinking that they are talking to a local X server when it is remote, or moving local MySQL databases to a remote server. |
User2sid / Sid2user | http://www.chem.msu.su/~rudnyi/welcome.html | Tools to determine a SID based on the username (User2sid) or determine username based on a known SID (Sid2user). |
UserDump | http://www.hammerofgod.com/download.htm | A SID Walker that can dump every user in a domain in a single command line. |
Userinfo | http://www.hammerofgod.com/download.htm | A tool that retrieves all available information about any known user from any NT/Windows 2000 system that you can hit 139 on. |
VigilEnt | http://www.interwork.com/vendors/netiq_security_vsms.html | NetIQ's VigilEnt Security Manager Suite (VigilEnt Security Manager) proactively secures systems by assessing policy compliance, identifying security vulnerabilities, and helping you correct exposures before they result in failed audits, security breaches, or costly downtime. |
Windows 2000 Resource Kit | http://www.microsoft.com/windows2000/ | A suite of utilities for managing Windows 2000 networks. |
Winfo | http://www.ntsecurity.nu | A Windows enumeration tool. |
Yet Another NetWare Game (YANG) | http://www.packetstormsecurity.com/Netware/penetration/ | A tool that loads the server and its clients with bogus broadcast packets. |