Packages that act as 'honeypots', ie programs that appear to be vulnerable services used to attractĪn intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Packages that exploit or manage anything to do with physical hardware. Packages that use the fuzz testing principle, ie 'throwing' random inputs at the subject to see what Packages that are used to find data on physical disks or embedded memory. Packages that exploit vulnerabilities in firmware. Packages that exploit fingerprint biometric equipment. Packages that takes advantages of exploits in other programs or services. Their main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment. Vulnerable OS, environments, software, web applications and websites. Packages that are used for managing physically engineered drones. Packages that use DoS (Denial of Service) attacks. Linux Distributions for penetration testing, computer forensics, focused on security and anonymity. This is similar to decompiler, and there will probably be a lot of programs that fall intoīoth, however these packages produce assembly output rather than the raw source code. Packages that are used to protect a user from malware & attacks from other users. Packages that attempt to reverse a compiled program into source code. Packages that allow the user to view what a particular program is 'doing' in realtime. Packages that involve database exploitations on any level. Tools for auditing the security of cryptographic algorithms and technologies. Packages that work with cryptography, with the exception of cracking. Packages used for cracking cryptographic functions, ie hashes. Packages that audit existing source code for vulnerability analysis. Packages that exploit anything concerning the Bluetooth standard (802.15.1). Packages that operate on binary files in some form. Packages that exploit or open backdoors on already vulnerable systems. Software for security audit of Controller Area Network and technologies related to vehicle safety. Packages that are used for tool or workflow automation. That makes changes to a system for the purposes of hiding information. This all includes tools to work with anything in general Packages that are used for countering forensic activities, including encryption, steganography, andĪnything that modifies files/file attributes. List of all available categories of tools for penetration testing.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |