An application to install an operating system to a flash drive or to a hard disk by either using the pre-downloaded iso file or by downloading the operating system through the application.
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
My Personal Rating: 5/5 Yes there are better ones like AirMagnet But this one is easy to use and free combine it with commview and your well-away
Free open-source software (if you want to buy you can always get the pro version)
John has been, and continues to still be, the most famous and most widely used password cracker for linux/unix systems.
Things everyone likes about it:
It's fast, it has support for cracking a lot of different but commonly used hash types, and it's able to run on just about anything.
Encryption for Pidgin; this enables secure transmission of encrypted conversation so that you and the person you are speaking with are assured the conversation is not being hijacked by a third party.
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.
Helix is a bootable live CD. You can still boot into a customized Linux environment that includes customized linux kernels, excellent hardware detection and many applications dedicated to Incident Response and Forensics.
Helix has been modified very carefully to NOT touch the host computer in any way and it is forensically sound. Helix wil not auto mount swap space, or auto mount any attached devices. Helix also has a special Windows autorun side for Incident Response and Forensics.
Helix focuses on Incident Response & Forensics tools. It is meant to be used by individuals who have a sound understanding of Incident Response and Forensic techniques.
Slax based Wireless Live Linux CD.It has been designed to be dedicated purely to wireless auditing.
Written by Fyodor of insecure.org, nmap is one of the most common and most popularly noted tools in any hackers arsenal.
It's common abilities are port scanning host on a network to determine which ports are open and which services are running.
It has a very wide feature set of determining what device is being scanned whether it's cisco, juniper, windows98, windows 2003 server, red hat, debian, suse/novell, etc...
It does support 64bit processing now, it does support ipv4 & v6, it does support tcp & udp, it does support mac, linux, bsd, solaris, windows, and a whole bunch of other operating systems that you may pray to never have to work with.
From personal experiences it runs on my ps3, so just about anything out there.
Nmap has the ability to not only obtain information about a host by querying that host, but can also obtain information about a host by querying information for it, from it's peers on the network.
By using Nmap's TCP Idle Scanning technique it has been deemed possible to bypass filters such as access list, ip tables, and intrusion prevention systems under certain circumstances.
For more information about about Nmap please go to http://nmap.org/
For more information regarding the TCP Idle scan the link is http://nmap.org/book/idlescan.html
Netcat is a computer networking service for reading from and writing network connections using TCP or UDP. Netcat is designed to be a dependable “back-end” device that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and investigation tool, since it can produce almost any kind of correlation you would need and has a number of built-in capabilities.
In 2000, according to www.insecure.org, Netcat was voted the second most functional network security tool. Also, in 2003 and 2006 it gained fourth place in the same category. Netcat is often referred to as a "Swiss-army knife for TCP/IP." Its list of features includes port scanning, transferring files, and port listening, and it can be used as a backdoor.
Some of netcat's major features are:
* Outbound or inbound connections, TCP or UDP, to or from any ports
* Full DNS forward/reverse checking, with appropriate warnings
* Ability to use any local source port
* Ability to use any locally-configured network source address
* Built-in port-scanning capabilities, with randomization
* Built-in loose source-routing capability
* Can read command line arguments from standard input
* Slow-send mode, one line every N seconds
* Hex dump of transmitted and received data
* Optional ability to let another program service established connections
* Optional telnet-options responder
* Featured tunneling mode which allows also special tunneling such as UDP to TCP, with the possibility of specifying all network parameters (source port/interface, listening port/interface, and the remote host allowed to connect to the tunnel.
Examples
Opening a raw connection to port 25 (like telnet)
nc mail.server.net 25
Setting up a one-shot webserver on port 8080 to present a file
{ echo -ne "HTTP/1.0 200 OK\r\n\r\n"; cat some.file; } | nc -l 8080