See also DevSecOps, Cybersecurity, Cybersecurity Glossary, Privacy vs. Surveillance Topics
Penetration testing tools, network admin tools and other useful security tools:
“There are a large amount of penetration testing tools to choose from on the market. The security audit tools below have been selected to cover a range of testing techniques from vuln scanning based testing to network mapping, but the list is by no means complete, as there are hundreds of different tools to use for specific tests. We have also included download links where possible.”
This is the free version of the metasploit package, one of the best pieces of software around for Windows, Linux and Mac systems. Metasploit allows you to quickly search for and execute exploits against a target.
OpenVAS is one of the worlds most advanced open source vulnerability scanners. You can read more about the openvas online scanner here. A project contributed by many security professionals globally, this tools gives great accurate scan results, and allows you to manage and report your findings.
Although this is not a free tool, it has a bunch of incredibly effective scan engines that will rank amongst the best of the vulnerability scanners available on the market. Initially developed as an open source project up until 2008.
Snort is one of the original defsec Intrusion Detection Systems (IDS), going way back to the early security scene on the internet. It’s incredibly effective, be sure to check it out, one of the best HIPS on the market!
Formerly BackTrack, the team have now rebranded as Kali Linux, an incredible Live CD or USB security distro, with a large amount of open source tools, bundled into a user friendly Linux distribution.
Netcat (1998) now essentially replaced by Nmap’s Ncat is a simple TCP/UDP transmitter/receiver, allowing you to capture and listen for connections using it’s port binding feature, with script and debugging support.
Nmap is an advanced and extremely fast port scanner, now available in GUI form under the name of Zenmap (http://nmap.org/zenmap/). This tools is great for fast network service and port identification. We have now integrated the Nmap Online Scanner into our set of free penetration testing tools
Unlike NMAP, this tool is an actual network protocol and data packet analyzer which can analyze the Security weaknesses of the traffic in real time. For example, live information and data can be collected from:
- IEEE 802.11
- Token Ring
- Frame Relay
- Any Ethernet based connections
Some of the advantages of using Wireshark are that the analyses of the results come out in a form which can even be understood by the client at first glance. With this tool, the Pen Tester can apply such features as color coding to delve and investigate deeper the network traffic flow, as well as to isolate any individual data packet which may be of concern. Wireshark is particularly useful in analyzing the Security risks which are inherent when information and data are posted to forms on Web based applications. Some of these threats include data parameter pollution, SQL injection attacks, and memory buffer overflows. Wireshark can be downloaded for free at www.wireshark.org.” Fair Use Source: https://resources.infosecinstitute.com/category/certifications-training/pentesting-certifications/top-pentesting-tools
Burp Suite is a collection of Burp tools developed by portswigger. A fast a powerful vulnerability scanner with scripting support and debuging engines, this is a great security audit tool.
Nikto is a free opensource http/s vulnerability scanner, which is extremely fast, light and capable of identifying over 6400 web flaws on common web servers like Apache. We have now implemented the Nikto Scanner Online in our penetration testing tools
W3af – Web Application Attack and Audit Framework (also known as the “W3AF”)
W3af is growing in popularity as it’s another extremely fast web vulnerability framework to help you exploit web applications, be sure to check it out.
“This Pen Testing suite has been created by the software developers at Metasploit, and its main purpose is to find, ascertain, and exploit any Security weaknesses or holes in Web based applications. This package consists of many tools which can root out threats such as:
- User-Agent Faking
- Custom Headers to Requests
- DNS Cache Poisoning (this is also known as “DNS Spoofing,” and it occurs when the DNS Name Servers return an incorrect IP address. As a result, the legitimate network traffic is diverted to the Cyber attacker’s computer)
One of the strongest advantages of the W3AF is that the parameters and variables which were used in one Pen Test instance can be saved quickly and easily into a Session Manager file. As a result, they can be reconfigured and reused quickly for another, upcoming Pen Test on a Web application. Thus, critical time is not wasted into re-entering these parameters and variables again. The results of the Pen Test are displayed in both easy to understand graphical and text based formats. Best of all, its database also consists of the top known threat vectors along with a customizable Exploit Manager to execute an attack and exploit it to its maximum possible. The W3AF has also been created on an open source platform and can be downloaded at this website: http://w3af.org/.” Fair Use Source:
John the Ripper
“One of the biggest Cyber Security threats has been and will continue to be is that of the inherent weaknesses of the traditional password. As a result, this is one of the hottest areas in Pen Testing, and thus, many tools have evolved. One of the best-known tools is that of “John the Ripper.” It is also commonly abbreviated as “JTR.” There is nothing too complex about this tool; its elegance is its simplicity in of itself. Pen Testers have used it primarily to launch Dictionary Attacks (this is where the Cyber attacker tries to guess the cipher or the authentication mechanism which is used to lock the password database) to determine any unknown holes weaknesses in the database.
This tool accomplishes this task by taking text string samples from a word list which contains the most complex and most popular words which are found in the traditional dictionary. These samples are then encrypted in the same format as the password which is being cracked, stolen, or hijacked. The output of this analysis is then compared to the actual encryption string to ascertain the vulnerabilities and weaknesses. A strong advantage of this tools is that it can be modified to test for all the varieties of Dictionary Attacks which could occur. A key distinction of the John the Ripper is that be used to Pen Test password databases which are both online and offline. JTR has also been created and developed on an open source platform, and it can be found at this link: http://www.openwall.com/john.” Fair Use Source:
Arachni is an Open Source, feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. We have implemented the Arachni Scanner Online free edition into our penetration testing tools
The BlindElephant Web App Fingerprinter attempts to discover the version info by comparing static files at known locations against precomputed hashes for versions of those files in all all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable. BlindElephant Scanner Online is now available and on our free penetration testing tools online portal
TCP Traceroute Online
Perform a TCP traceroute online, allowing you to see the route taken in or out of a network. Traceroute online is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. TCP Traceroute Online has been incorporated into our penetration testing tools online and is now available.
A simple Linux tool designed to resolve domain names to IP addresses, and IP addresses to domain names. This tool is now in our penetration testing tool suite online, as ResolveHost Online.
IP Calc / IP Calculator
Takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. This tools is now available via IP Calculator Online.
CMSmap is a single python based tool that tests for vulnerabilities in the following CMS platforms, Joomla, Drupal and WordPress. We have integrated CMSmap Online into our free penetration testing tools portal. This tools is now available via the CMSmap Online page.
We highly advising using penetration testing tools ONLY if you know what you are doing with them. When performing a security audit with tools such as these, you need a full understanding of them to interpret the results, please be sure to contact us if you require a professional penetration test conducted on your website.
WPScan is a blackbox WordPress engine vulnerability scanning tool, capable of auditing weak usernames and passwords, versions and their vulnerabilities, wordpress plugins and various other wordpress checks. You can use WPScan online via our WPScan online tools suite.
OSSEC is one of the best open source Intrusion Detection Systems or HIDS available in network protection and intrusion systems. This tool provides an excellent forensic tool to help spot attacks via notifications and alerting.
NetAdminTools.com provides a list of Network Administration Tools and Software that is a great Resource for System and Network Administrators when it comes to network management and maintenace. They’ve compiled a large list of tools that will assist you in Monitoring your network and potentially uncovering security risks and issues within your perimeter. If your a Network Engineer or System administrator, these tools will assist in your daily tasks and greatly simplify your life.
Fair Use Source: