Advertisement
Online Test Banks
Score higher
See Online Test Banks
eLearning
Learning anything is easy
Browse Online Courses
Mobile Apps
Learning on the go
Explore Mobile Apps
Dummies Store
Shop for books and more
Start Shopping

Ethical Hacker's Guide to Tools and Resources

Stay up-to-date with the latest and greatest ethical hacking tools and resources. Finesse your ethical hacking skills by visiting these sites for security, tools, resources, and more.

Bluetooth

BlueScanner

Bluesnarfer

BlueSniper Rifle

Blooover

Bluejacking community site

BTScanner for XP

Car Whisperer

Detailed presentation on the various Bluetooth attacks

NIST Special Publication 800-48

Smurf

Certifications

Certified Ethical Hacker

Certified Information Security Manager

Certified Information Systems Security Professional

Certified Wireless Security Professional

CompTIA Security+

SANS GIAC

Databases

Advanced Access Password Recovery

Advanced SQL Password Recovery

AppDetectivePro

Elcomsoft Distributed Password Recovery

Microsoft SQL Server Management Studio Express

NGSSQuirreL

Pete Finnigan's listing of Oracle scanning tools

QualysGuard

SQLPing3 and SQLRecon

Exploit tools

Metasploit

Milw0rm

General research tools

AfriNIC

APNIC

ARIN

Bing

DNSstuff.com

dnstools.com

The File Extension Source

Google

Government domains

Hoover's business information

LACNIC

Military domains

Netcraft's What's that site running?

RIPE Network Coordination Centre

Switchboard.com

U.S. Patent and Trademark Office

US Search.com

U.S. Securities and Exchange Commission

Wotsit's Format

Whois.net

Whatismyip.com

Yahoo! Finance

Zabasearch

Hacker stuff

2600 The Hacker Quarterly

Computer Underground Digest

Hacker T-shirts, equipment, and other trinkets

Hackin9

Honeypots: Tracking Hackers

The Online Hacker Jargon File

PHRACK

Keyloggers

Invisible KeyLogger Stealth

KeyGhost

SpectorSoft

Laws and regulations

Gramm-Leach-Bliley Act (GLBA) Safeguards Rule

Health Information Technology for Economic and Clinical Health (HITECH) Act

Health Insurance Portability and Accountability Act (HIPAA) Security Rule

Payment Card Industry Data Security Standard (PCI DSS)

U.S. state breach notification laws

Linux

BackTrack

freshmeat.net

GFI LANguard

Linux Security Auditing Tool (LSAT)

QualysGuard

SourceForge

THC-Amap

Tiger

Live toolkits

BackTrack

Comprehensive listing of live bootable Linux toolkits

Knoppix

Network Security Toolkit

Security Tools Distribution

Log analysis

ArcSight Logger

GFI EventsManager

LogAnalysis.org system logging resources

Messaging

Abuse.net SMTP relay checker

Brutus

Cain & Abel

DNSstuff.com relay checker

EICAR Anti-Virus test file

GFI e-mail security test

mailsnarf

smtpscan

Miscellaneous tools

FreeZip

WinZip

NetWare

Craig Johnson's BorderManager resources

JRB Software

NetServerMon

Pandora

Rcon program

Remote

UserDump

Networks

Arpwatch

Blast

Cain & Abel

CommView

dsniff

Essential NetTools

ettercap

Firewalk

Getif

GFI LANguard

IETF RFCs

IKEcrack

MAC address vendor lookup

MAC Changer

Nessus vulnerability scanner

Netcat

Netfilter/iptables

NetResident

NetScanTools Pro

Nmap port scanner

NMapWin

OmniPeek

Port number listing

Port number lookup

PortSentry

PromiscDetect

QualysGuard vulnerability scanner

SMAC MAC address changer

SNARE

sniffdet

SNMPUTIL

SuperScan port scanner

TCP Wrappers

TrafficIQ Pro

UDPFlood

WhatIsMyIP

Wireshark

Password cracking

Advanced Archive Password Recovery

BIOS passwords

Brutus

Cain & Abel

Crack

Default vendor passwords

Dictionary files and word lists:

Elcomsoft Distributed Password Recovery

Elcomsoft System Recovery

John the Ripper

ophcrack

Pandora

Password Safe

Proactive Password Auditor

Proactive System Password Recovery

pwdump3

NetBIOS Auditing Tool

NIST Guide to Enterprise Password Management

NTAccess

RainbowCrack

Rainbow tables

SQLPing3

TSGrinder

WinHex

Patch management

BigFix Patch Management

Debian Linux Security Alerts

Ecora Patch Manager

GFI LANguard

Linux Kernel Updates

Lumension Patch and Remediation

Novell Patches and Security

Microsoft TechNet Security Center

Red Hat Linux Security Alerts

Slackware Linux Security Advisories

SUSE Linux Security Alerts

Windows Server Update Services from Microsoft

Security education and learning resources

Kevin Beaver's information security articles, whitepapers, webcasts, podcasts, and screencasts

Kevin Beaver's Security On Wheels information security audio programs

Kevin Beaver's Security On Wheels blog

Kevin Beaver's Twitter page

Security methods and models

Open Source Security Testing Methodology Manual

OWASP

SecurITree

Software Engineering Institute's OCTAVE methodology

Source-code analysis

Checkmarx

Fortify Software

Klocwork

Ounce Labs

Storage

CHAP Password Tester

CIFSShareBF

Effective File Search

FileLocator Pro

GFI LANguard

Google Desktop

GrabiQNs

Identity Finder

NASanon

StorScan

SuperScan

System hardening

Bastille Linux Hardening Program

Center for Internet Security Benchmarks

Deep Freeze

Fortres 101

How to disable SMTP relay on various e-mail servers

Imperva

Linux Administrator's Security Guide

PGP Whole Disk Encryption

Pyn Logic

SecureIIS

ServerDefender

TrueCrypt

User awareness and training

Awareity MOAT

Dogwood Management Partners Security Posters

Greenidea Visible Statement

Interpact, Inc. Awareness Resources

Managing an Information Security and Privacy Awareness and Training Program by Rebecca Herold (Auerbach)

NIST Awareness, Training, & Education resources

Security Awareness, Inc.

Voice over IP

Cain & Abel

CommView

Listing of various VoIP tools

NIST's SP800-58 document

OmniPeek

PROTOS

sipsak

SiVuS

vomit

VoIP Hopper

Vulnerability databases

Common Vulnerabilities and Exposures

CWE/SANS Top 25 Most Dangerous Programming Errors

National Vulnerability Database

Privacy Rights Clearinghouse's A Chronology of Data Breaches

SANS Top 20 Internet Security Problems, Threats, and Risks

US-CERT Vulnerability Notes Database

Wireless Vulnerabilities and Exploits

Web applications

Absinthe

Acunetix Web Vulnerability Scanner

Brutus

Defaced Web sites

HTTrack Website Copier

Firefox Web Developer

Foundstone's Hacme Tools

Google Hack Honeypot

Google Hacking Database

NGSSquirrel

N-Stealth Web Application Security Scanner

Paros Proxy

Port 80 Software's ServerMask

SiteDigger

SWFScan

WebInspect

WebGoat

WSDigger

WSFuzzer

Windows

DumpSec

GFI LANguard

Microsoft Baseline Security Analyzer

Network Users

QualysGuard

Sysinternals

Winfo

Wireless networks

Aircrack

AirMagnet WiFi Analyzer

AirSnort

Asleap

Cantenna war-driving kit

CommView for Wi-Fi

Digital Hotspotter

Elcomsoft Wireless Security Auditor

Homebrew WiFi antenna

KisMAC

Kismet

NetStumbler

OmniPeek

SeattleWireless Hardware Comparison page

Super Cantenna

Wellenreiter

WEPCrack

WiGLE database of wireless networks

WifiMaps

WiFinder

WildPackets' OmniPeek

WinAirsnort

blog comments powered by Disqus
Advertisement
Advertisement

Inside Dummies.com

Dummies.com Sweepstakes

Win an iPad Mini. Enter to win now!