Prepararsi per il Penetration Test? Ecco la lista della spesa prima di presentarsi:
Enumeration Tools
nmap
nmap -A -n -p- -P0 ip_address
nmap -sU -n -p- ip_address
firewalk
firewalk -p [protocol] -d [destination_port] -s [source_port] [internal_IP] [gateway_IP]
amap
amap [-A|-B|-P|-W] [-1buSRHUdqv] [[-m] -o
nbtscan
nbtscan [-v] [-d] [-e] [-l] [-t timeout] [-b bandwidth] [-r] [-q] [-s separator] [-m retransmits] (-f filename) | (
hping
hping ip_address
scanrand
scanrand ip_address:all
sinfp.pl
./sinfp.pl -i -p
unicornscan
unicornscan [options `b:B:d:De:EFhi:L:m:M:pP:q:r:R:s:St:T:w:W:vVZ:’ ] IP_ADDRESS/ CIDR_NET_MASK: S-E
General Vulnerability Scanning Tools
GFI
Nessus
NSG tool
MatriXay
SARA
Exploit Engine Tools
Metasploit
SQL Power Injector
SecurityForest
Netwox
Hijetta
Test FTP Security
hydra brute force
Brutus
Test SSH Security
Scanssh
scanssh -p -r -e excludes random(no.)/Network_ID/Subnet_Mask
hydra brute force
Password cracking
John the Ripper
Network Backbone
Wireshark (Ethereal)