Penetrating UNIX, Microsoft, and Novell Servers (Chapter 13)

 < Day Day Up > 

Tool

URL

Description

Bindery

http://www.packetstormsecurity.com/Netware/penetration/

Utilities for extracting, importing, and exporting bindery information.

Burglar

http://www.packetstormsecurity.com/Netware/penetration/

An NLM that will either create a Supe user or make an existing user Supe equivalent. For Netware 3.x.

Burn

http://www.packetstormsecurity.com/Netware/penetration/

A tool that burns up drive space on the SYS: volume by filling up the SYS$ERR.LOG. About 1 MB per minute.

Chknull

http://www.packetstormsecurity.com/Netware/penetration/

A tool that checks for users that have no password.

CyberCop Scanner

http://www.tlic.com/security/cybercopscanner.cfm

A vulnerability scanner that tests Windows and UNIX workstations, servers, hubs, and switches.

DelGuest

http://ntsecurity.nu/toolbox/

A tool that deletes the built-in Guest account in Windows NT.

DumpSec

http://www.somarsoft.com

A security auditing program for Microsoft Windows NT/2000. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers, and shares in a concise, readable format so that holes in system security are readily apparent.

enum

http://www.bindview.com/Services/Razor/Utilities/

A console-based Win32 information enumeration utility. Using null sessions, enum can retrieve userlists, machine lists, sharelists, namelists, group and member lists, passwords, and LSA policy information.

Essential Net Tools (ENT) 3

http://www.zone-h.com/en/download/category=28/

A tool to get NetBIOS information and remote access.

GetAcct

http://www.securityfriday.com/tools/GetAcct.html

A tool that sidesteps "RestrictAnonymous=1" and acquires account information on Windows NT/2000 machines.

Infiltrator Network Security Scanner

http://www.network-security-scan.com

An easy-to-use, intuitive network security scanner that can quickly scan and audit your network computers for vulnerabilities, exploits, and information enumerations.

InfoServer

http://www.zone-h.com/en/download/category=71/

A vulnerability scanner for Windows.

Inzider

http://ntsecurity.nu/toolbox/inzider

A tool that lists processes in your Windows system and the ports that each one listen on.

Lkminject

http://minithins.net/release.html

A tool to inject a Linux kernel module into another Linux kernel module.

Metasploit

http://www.metasploit.com/

A complete environment for writing, testing, and using exploit code. This environment provides a solid platform for penetration testing, shellcode development, and vulnerability research.

N-Stealth v3.5

http://www.zone-h.com/en/download/category=71/

A vulnerability assessment tool for Windows that scans webservers for bugs that allow attackers to gain access.

NetBrute

http://www.zone-h.com/en/download/category=71/

A tool that scans a range of IP addresses for resources that have been shared via Microsoft File and Printer Sharing.

Nbtdump

http://www.zone-h.com/en/download/category=28/

A utility that dumps NetBIOS information from Windows NT, Windows 2000, and UNIX Samba servers such as shares, user accounts with comments, and the password policy.

NBTScan

http://www.inetcat.org/software/nbtscan.html

A program for scanning IP networks for NetBIOS name information.

NCPQuery

http://razor.bindview.com/tools/index.shtml

A free, open-source tool that allows probing of a Novell NetWare server running IP to be queried to enumerate objects.

Nessus

http://www.nessus.org

A popular vulnerability scanner.

NetDDE.c

http://www.zone-h.com/en/download/category=71/

A Microsoft Windows scanner that uses a remote code execution vulnerability because of an unchecked buffer.

netinfo

http://www.zone-h.com/en/download/category=71/

A complete scanner for the Windows system.

NetRecon

http://www.symantec.com

A vulnerability scanner by Symantec.

NetViewX

http://www.ibt.ku.dk/jesper/NTtools/

A console application to list servers in a domain/workgroup that run specific services.

Novell Fake Login

http://www.packetstormsecurity.com/Netware/penetration/

A fake Novell NetWare login screen that stores the username and password in the file c:\os31337.sys.

NTLast

http://www.foundstone.com/

A security log analyzer to identify and track who has gained access to your system and then document the details.

NetView Scanner

http://www.zone-h.com/en/download/category=71/

Freeware penetration analysis software that runs on your Windows workstation.

NWPcrack

http://www.packetstormsecurity.com/Netware/penetration/

A password-cracking utility for Novell servers.

Pandora

http://www.nmrc.org/project/pandora/index.html

A set of tools for hacking, intruding, and testing the security and insecurity of Novell NetWare. It works on versions 4 and 5.

PC Anywhere Scan

http://www.zone-h.com/en/download/category=71/

A small utility that can scan any range of two IP addresses and show the list of pcANYWHERE hosts within that range.

PipeUp Admin

http://www.dogmile.com/files

A utility to execute commands with administrative privileges, even if you do not have admin rights on a Windows system.

ProbeTS

http://www.hammerofgod.com/download.htm

A utility to scan for Windows Terminal Services.

RPC Dump

http://www.zone-h.com/en/download/category=28/

A utility that dumps SUN RPC information from UNIX systems.

Sara

http://www-arc.com/sara

A popular vulnerability scanner.

Security Analyzer

http://www.netiq.com

A commercial vulnerability scanner made by NetIQ.

Shadow NW Crack

http://www.packetstormsecurity.com/Netware/penetration/

Code for breaking into Novell NetWare 4.x.

STAT Analyzer

http://www.stat.harris.com/techinfo/reskit/default.asp

A tool that automatically consolidates multiple network scanning and modeling results and provides a single, flexible reporting mechanism for reviewing those results.

TransportEnum

http://www.hammerofgod.com/download.htm

A tool that allows you to get the transport names (devices) in use on a box.

TSEnum

http://www.hammerofgod.com/download.htm

A tool that quickly scans the network for rogue terminal servers.

TSGrinder

http://www.hammerofgod.com/download.htm

A brute force terminal server tool.

unix2tcp

http://www.zone-h.com/en/download/category=28/

A connection forwarder that converts UNIX sockets into TCP sockets. You can use it to trick some X applications into thinking that they are talking to a local X server when it is remote, or moving local MySQL databases to a remote server.

User2sid / Sid2user

http://www.chem.msu.su/~rudnyi/welcome.html

Tools to determine a SID based on the username (User2sid) or determine username based on a known SID (Sid2user).

UserDump

http://www.hammerofgod.com/download.htm

A SID Walker that can dump every user in a domain in a single command line.

Userinfo

http://www.hammerofgod.com/download.htm

A tool that retrieves all available information about any known user from any NT/Windows 2000 system that you can hit 139 on.

VigilEnt

http://www.interwork.com/vendors/netiq_security_vsms.html

NetIQ's VigilEnt Security Manager Suite (VigilEnt Security Manager) proactively secures systems by assessing policy compliance, identifying security vulnerabilities, and helping you correct exposures before they result in failed audits, security breaches, or costly downtime.

Windows 2000 Resource Kit

http://www.microsoft.com/windows2000/

A suite of utilities for managing Windows 2000 networks.

Winfo

http://www.ntsecurity.nu

A Windows enumeration tool.

Yet Another NetWare Game (YANG)

http://www.packetstormsecurity.com/Netware/penetration/

A tool that loads the server and its clients with bogus broadcast packets.


     < Day Day Up > 


    Penetration Testing and Network Defense
    Penetration Testing and Network Defense
    ISBN: 1587052083
    EAN: 2147483647
    Year: 2005
    Pages: 209

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net