Term
|
Definition
|
|
Term
|
Definition
| Buffer overflow detection / Malware analysis / x86 tool that emphasizes binary code analysis |
|
|
Term
|
Definition
| The compiler suite from Microsoft also implements buffer overflow protection since version 2003 with this tool |
|
|
Term
|
Definition
|
|
Term
|
Definition
| SYN Flood detection and mitigation; introduced in Cisco IOS Version 11.3 and is available on all Cisco Routers. |
|
|
Term
|
Definition
| Malware / a DDOS remote administration tool (RAT) |
|
|
Term
|
Definition
| A tool to audit DHCP networks to determine vulnerability to the DHCP starvation attack. |
|
|
Term
|
Definition
| Automatically scan all devices within specified subnets, draw and layout a map of your networks monitor services of your devices and alert you in case some service has problems. |
|
|
Term
| FLUKE Networks EtherScope Series II |
|
Definition
| Hardware Protocol analyzer |
|
|
Term
|
Definition
| Hardware Protocol analyzer |
|
|
Term
|
Definition
| Hardware Protocol analyzer |
|
|
Term
|
Definition
| Hardware Protocol analyzer |
|
|
Term
|
Definition
| Host based Intrusion Detection System (IDS) which acts as a **honey pot** to attract and detect hackers by simulating vulnerable system services |
|
|
Term
|
Definition
| Host-based Intrusion Detection System (HIDS) that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. |
|
|
Term
|
Definition
| Most widely deployed IDS/IPS technology worldwide, developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection |
|
|
Term
|
Definition
| A host-based intrusion detection system, it detects changes to file system objects. |
|
|
Term
|
Definition
| Floods the local network with random MAC addresses (causing some switches to fail open in repeating mode, facilitating sniffing) |
|
|
Term
|
Definition
| Low-level protocol attack tool useful for penetration testing. |
|
|
Term
|
Definition
| Network Analyzer / WiFi Packet Sniffer |
|
|
Term
|
Definition
| Packet Fragment Generator |
|
|
Term
|
Definition
| Free and open source network security tool for man-in-the-middle attacks on LAN |
|
|
Term
|
Definition
| Most popular password cracker, fast, and available on 15 different platforms. |
|
|
Term
|
Definition
| Vulnerability and patch management solution |
|
|
Term
| ElcomSoft System Recovery |
|
Definition
|
|
Term
|
Definition
| Detects if the a switch is receiving all traffic on the subnet / collision domain. |
|
|
Term
|
Definition
| Detects if the a switch is receiving all traffic on the subnet / collision domain. |
|
|
Term
|
Definition
| A Java application that can be used to secure or crack web applications, it consists of different tools, such as a proxy server, a web spider, intruder and repeater. |
|
|
Term
|
Definition
| Used for security and vulnerability testing. it can spider/crawl entire sites, then execute canned vulnerability scanner tests. It also comes with a built in utility that can proxy traffic. It also can be used to tamper or manipulate any http or https traffic on the fly. |
|
|
Term
|
Definition
| Session hijacking / Web Application/Server Exploitation |
|
|
Term
|
Definition
| Sidejacking (form of session hijacking) / Web Application/Server Exploitation |
|
|
Term
|
Definition
| A set of password sniffing and network traffic analysis tools written by security researcher and startup founder Dug Song to parse different application protocols and extract relevant information |
|
|
Term
|
Definition
| Tool for capturing and reporting packet headers in network traffic for further analysis |
|
|
Term
|
Definition
| A network protocol analyzer, it is the standard in many industries. |
|
|
Term
|
Definition
| Web application security scanning tool, it performs dynamic black box testing, which detects the vulnerabilities by actually performing the attack. |
|
|
Term
|
Definition
| Windows-based backdoor Trojan horse, more commonly known in the underground hacking community as a Remote Administration Tool or RAT. |
|
|
Term
|
Definition
| Often referred to as a "Swiss-army knife for TCP/IP", its list of features includes port scanning, transferring files, and port listening, and it can be used as a backdoor. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Trojan Detection: Port monitoring |
|
|
Term
|
Definition
| It is a web site downloader, site mapping tool, a site ripper, a site mirroring tool, a website scanner, an offline browser and a download manager. Use it to scan a site and create a complete profile of the site's structure, files, external links and even link errors. |
|
|
Term
|
Definition
| An open source framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java |
|
|
Term
|
Definition
| Web Application Attack and Audit Framework, it is developed using Python to be easy to use and extend, and licensed under GPLv2.0 |
|
|
Term
|
Definition
| A heuristic, non-signature based web vulnerability scanner used to help companies combat web site hacking. |
|
|
Term
|
Definition
| A tool for developing and executing exploit code against a remote target machine. |
|
|
Term
|
Definition
| One of the most popular remote online password cracking tools, it claims to be the fastest and most flexible password cracking tool. This tool is free and is only available for Windows systems. It was released back in October 2000. |
|
|
Term
|
Definition
| Used to brute force crack remote authentication services, it is often the tool of choice, supported on many platforms. |
|
|
Term
|
Definition
| Allows you to fully customize an HTTP request and send it to a Web server so that you can see the raw HTTP request and response data. It is included in the Internet Information Services (IIS) 6.0 Resource Kit Tools in the Microsoft Download Center |
|
|
Term
|
Definition
| Since 1995, has explored the internet and is a respected authority on the market share of web servers, footprinting web servers, operating systems, hosting providers, ISPs, encrypted transactions, electronic commerce, scripting languages and content technologies on the internet. |
|
|
Term
|
Definition
| Web vulnerability scanner; a portable pen-test oriented multi-tabbed web browser with extensions support developed by the Syhunt team |
|
|
Term
|
Definition
| An easy-to-use offline browser utility, it allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| White Space Steganography; used to conceal messages in ASCII text by appending whitespace to the end of lines. |
|
|
Term
|
Definition
| Wifi Discovery; displays information about the wireless networks in proximity to you, including an access point’s MAC address, encryption type, signal strength, and channel. |
|
|
Term
|
Definition
| Wifi Discovery: Broadcast probes only (passive scanning not available) |
|
|
Term
|
Definition
| Wifi discovery: it has tools suitable for measuring signal quality, among other features |
|
|
Term
|
Definition
| Wifi Discovery; monitor the status of wireless WiFi adapter(s) and gather information about nearby wireless access points and hot spots in real time. |
|
|
Term
|
Definition
| WiFi Packet Sniffer: WPA / WPA2 cracking; password recovery tool for Microsoft Windows / Arp poisoning, Windows |
|
|
Term
| Elcomsoft Wireless Security Auditor |
|
Definition
| WiFi Packet Sniffer: Uses AirPcap adapter |
|
|
Term
|
Definition
| A wireless network discovery tool for Mac OS X, it has a wide range of features, similar to those of Kismet (its Linux/BSD namesake) |
|
|
Term
|
Definition
| A network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs, it will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic. The program runs under Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. |
|
|
Term
|
Definition
| Sniffing / Wi-Fi Raw Packet Capturing |
|
|
Term
|
Definition
| Wi-Fi Raw Packet Capturing / Sniffing |
|
|
Term
| Internet Worm Maker Thing |
|
Definition
|
|
Term
| AirPcap Dongle with Wireshark |
|
Definition
| WiFi Packet Sniffer (Passive) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Checks C code to make sure it meets requirements |
|
|
Term
|
Definition
| Used to test for heap overflow conditions |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Open source web server scanner |
|
|
Term
| Microsoft Baseline Security Analyzer (MBSA) |
|
Definition
|
|
Term
|
Definition
| Compression/decompression tool useful in malware analysis |
|
|
Term
|
Definition
| Finds Ascii, Unicode and Resource strings in a file. A small, very fast and powerful text extractor that will be of particular interest to programmers. |
|
|
Term
|
Definition
| Takes a buffer overflow exploit and poly-morphs it so it can bypass signatures |
|
|
Term
|
Definition
|
|