Archive for November, 2007

h1

Aplikasi Pendukung Buku

November 4, 2007

Berikut adalah beberapa link (url) yang bisa digunakan untuk mendownload sebagian aplikasi yang disebut dan digunakan pada buku Hacker: its not about black or white:

* backtrack 2.0 Stable Release. Penetration Testing Live CD/Installer
* PHPBB ver 2.0.11. Aplikasi phpBB yang memiliki celah.
* phpBB <= 2.0.12 Session Handling Authentication Bypass
* Add n Edit Cookies, firefox Add-ons.
* Deep freeze.
* Lotus DOS game.
* Bluesnarfer for linux.
* IDA Pro freeware version4.3
* HexEdit
* pwdump2
* Pulist.exe
* Ophcrack, Windows password cracker based on rainbow table
* John the ripper, password cracker
* ffsniff Firefox password sniffer add-ons
* Metasploit framework
* swatch, activly monitoring log files produced by UNIX’s syslog facility
* Arpwatch-ng , arpwatch monitors mac adresses on your network and writes them into a file
* Cain Abel, password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols
* Xarp, Windows advanced ARP spoofing detection
* Keymail keylogger
* Kismet, Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system
* aircrack-ng, aircrack is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact, aircrack is a set of tools for auditing wireless networks.
* Sec_cloak, Security Cloak is designed to protect against TCP/IP stack fingerprinting and computer identification/information leakage via timestamp and window options by modifying relevant registry keys. The settings used are based on the results of SYN packet analysis by p0f. While the OS reported by other OS detection scanners were not identical to those of p0f, testing against Nmap, xprobe2, queso and cheops showed that they were unable to identify the correct operating system/version after Security Cloak settings had been applied.
* VMware
*BloodShed Dev C++

Untuk penggunaan semua aplikasi di atas, anda wajib mengetahui kegunaan, dan fungsi dari aplikasi tersebut. Segala kerusakan dsb akibat aplikasi diatas bukan merupakan tanggung jawab penulis ūüôā

Be carefull !

Advertisements