Understanding and Attempting Session Hijacking (Chapter 6)

 < Day Day Up > 

Tool

URL

Description

Arp0c

http://www.phenoelit.de/arpoc/index.html

A connection interceptor program that uses ARP spoofing.

arprelay

http://www.zone-h.com/en/download/category=28/

A tool that forwards IP packets between two machines on an Ethernet that have been told that the MAC address of the other is some random spoofed MAC address.

dsniff

http://naughty.monkey.org/~dugsong/dsniff/

A collection of tools for network auditing and penetration testing.

Fake

http://www.0xdeadbeef.info/

A utility that takes over an IP address using ARP spoofing.

fuzzy-fingerprint

http://www.thc.org/thc-ffp/

A technique that extends common man-in-the-middle (MITM) attacks by generating fingerprints that closely look like the public key fingerprint of the target.

Hjksuite

http://www.pkcrew.org/tools/hjksuite/

A collection of programs for hijacking.

IP Watcher

http://engarde.com

A network security monitor for UNIX that provides the capability to control intruders in real-time.

Juggernaut

http://www.lot3k.org/tools/spoofing/1.2.tar.gz

A network sniffer that can also be used to hijack sessions.

NBTdeputy

http://www.zone-h.com/en/download/category=28/

A tool that registers a NetBIOS computer name on the network and is ready to respond to NetBT name-query requests.

OTU

http://www.s0ftpj.org/en/site.html

MITM concept code.

Remote TCP Session Reset

http://www.solarwinds.net

A tool that allows a network administrator to remotely reset a TCP session.

SMBRelay

http://pr0n.newhackcity.net/~sd/smbrelay.html

A tool that registers a fake SMB server, which can be used for MITM attacks.

Snarp

http://www.securityfocus.com/tools/1969

A tool for Windows NT 4.0 that uses an ARP poison attack to relay traffic between two hosts, allowing sniffing of the data on switched networks.

T-Sight

http://engarde.com

An intrusion detection and network monitoring tool for Windows that can monitor transaction data, control intruders in real-time, set alarms for certain activities, and produce reports or graphs of usage.

TTY Watcher

http://engarde.com

A host security monitor with active countermeasures.


     < Day Day Up > 


    Penetration Testing and Network Defense
    Penetration Testing and Network Defense
    ISBN: 1587052083
    EAN: 2147483647
    Year: 2005
    Pages: 209

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net