Nessus Vulunerability Scanner is one of the more famous & Active Scanner with high speed discovery. It gives sensitive recovery data & vulnerability analysis of your security posture.
FOR MICROSOFT WINDOWS download click here
Monday, September 27, 2010
Saturday, September 11, 2010
Using Hydra 5.4 to crack FTP passwords
source : Group51& youtube
Tuesday, August 10, 2010
Angry IP scanner
FAST AND FRIENDLY NETWORK SCANNER
This is an older generation of Angry IP Scanner.
Download version 2.21 below (120 kb) or browse all 2.x releases
ipscan.exe for Windows 98/ME/2000/XP
If you get warnings about viruses or trojans, read this FAQ entry and please sign the petition. at http://www.angryip.org/w/Download
No installation is needed. However, you may use the Install program... from the Utils menu in order to create shortcuts, etc.
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features.
It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies.
It runs on Linux, Windows, and Mac OS X, possibly supporting other platforms as well
DOWNLOAD HERE
Source : http://www.angryip.org/w/Home
This is an older generation of Angry IP Scanner.
Download version 2.21 below (120 kb) or browse all 2.x releases
ipscan.exe for Windows 98/ME/2000/XP
If you get warnings about viruses or trojans, read this FAQ entry and please sign the petition. at http://www.angryip.org/w/Download
No installation is needed. However, you may use the Install program... from the Utils menu in order to create shortcuts, etc.
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features.
It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies.
It runs on Linux, Windows, and Mac OS X, possibly supporting other platforms as well
DOWNLOAD HERE
Source : http://www.angryip.org/w/Home
Thursday, August 5, 2010
Gooscan
Google is the world's most powerful tool by itself. but if we need an acturate and appropriate result, we need to use some tool to get more accurate. This run against Google itself in direct violation of their terms and services.
GOOSCAN - one of the best tool by http://johnny.ihackstuff.com/
also can be downloaded in torrents and software collection blos, websites. currently link not available here...
Google Hacks
Google Hacks is one of the best free tool available at google code. This Google hacks view timeline of the search results.
also , USE this program to use Google as proxy.
for more info, visit http://www.code.google.com/p/googlehacks/
also , USE this program to use Google as proxy.
for more info, visit http://www.code.google.com/p/googlehacks/
Google Hacking Database
Google Hacking Database ( GHDB ) is one of the best Database to identify the sensitive data. This database can be found at http://johhny.ihackstuff.com/
The best colection of Google realted stuff will be available only at johhny.ihackstuff.com ... Explore the things and enjoy learning .. :)
The best colection of Google realted stuff will be available only at johhny.ihackstuff.com ... Explore the things and enjoy learning .. :)
Locating Network range - Traceroute, Neo trace
TraceRoute
c:/> tracert http://www.livehackingtools.blogspot.com/
Neo Trace
also called McAfee Visual Trace ..
It delivers a powerful tool for checking information on internet locations
McAfee NeoTrace Pro delivers a powerful tool for checking information on internet locations.
You can trace any computer on the internet simply by entering an email, IP address or URL. The display shows you the route between you and the remote site including all intermediate nodes and their registrant information.
McAfee NeoTrace is the world`s most popular Internet tracer, used by law enforcement, ISPs, and network professionals, yet easy enough for the home user. Explore the powerful new features designed to make our most popular product even easier to use!
NeoTrace.ZIP (30-days trail version)
c:/> tracert http://www.livehackingtools.blogspot.com/
Neo Trace
also called McAfee Visual Trace ..
It delivers a powerful tool for checking information on internet locations
McAfee NeoTrace Pro delivers a powerful tool for checking information on internet locations.
You can trace any computer on the internet simply by entering an email, IP address or URL. The display shows you the route between you and the remote site including all intermediate nodes and their registrant information.
McAfee NeoTrace is the world`s most popular Internet tracer, used by law enforcement, ISPs, and network professionals, yet easy enough for the home user. Explore the powerful new features designed to make our most popular product even easier to use!
NeoTrace.ZIP (30-days trail version)
Extract DNS Inforamation
www.dnsstuff.com
DNSstuff offers DNS tools, Network tools, Email tools, DNS reporting and IP information gathering
DNSstuff offers DNS tools, Network tools, Email tools, DNS reporting and IP information gathering
DNS Enumeration
DNS ENUMERATION scans Google to extract the results..
DNSenum – Domain Information Gathering Tool
The first stage of penetration testing is usually passive information gathering and enumeration (active information gathering). This is where tools like dnsenum come in, the purpose of DNSenum is to gather as much information as possible about a domain.
The program currently performs the following operations:
A.Get the host’s addresse (A record).
B.Get the namservers (threaded).
C.Get the MX record (threaded).
D.Perform axfr queries on nameservers (threaded).
E.Get extra names and subdomains via google scraping (google query = “allinurl: -www site:domain”).
F.Brute force subdomains from file, can also perform recursion on subdomain that have NS records (all threaded).
G.Calculate C class domain network ranges and perform whois queries on them (threaded).
H.Perform reverse lookups on netranges ( C class or/and whois netranges) (threaded).
I.Write to domain_ips.txt file ip-blocks.
The output file domain_ips.txt will contain non-contiguous IP blocks:
127.0.0.1/32
127.0.0.8/31
You can download DNSenum v1.2 here:
DNSenum v1.2
for more information on this : follow http://code.google.com/p/dnsenum/
DNSenum – Domain Information Gathering Tool
The first stage of penetration testing is usually passive information gathering and enumeration (active information gathering). This is where tools like dnsenum come in, the purpose of DNSenum is to gather as much information as possible about a domain.
The program currently performs the following operations:
A.Get the host’s addresse (A record).
B.Get the namservers (threaded).
C.Get the MX record (threaded).
D.Perform axfr queries on nameservers (threaded).
E.Get extra names and subdomains via google scraping (google query = “allinurl: -www site:domain”).
F.Brute force subdomains from file, can also perform recursion on subdomain that have NS records (all threaded).
G.Calculate C class domain network ranges and perform whois queries on them (threaded).
H.Perform reverse lookups on netranges ( C class or/and whois netranges) (threaded).
I.Write to domain_ips.txt file ip-blocks.
The output file domain_ips.txt will contain non-contiguous IP blocks:
127.0.0.1/32
127.0.0.8/31
You can download DNSenum v1.2 here:
DNSenum v1.2
for more information on this : follow http://code.google.com/p/dnsenum/
Tuesday, July 27, 2010
Online Whois Tools
Online whois Tools gives you the information related to web, ip address and registered customer details and it's server address company details ..
www.samspade.org
www.geektools.com
www.whois.net
www.demon.net
www.geektools.com
www.whois.net
www.demon.net
Have a look on above websites and start gathering information on target.
Labels:
Foot Printing,
Websites
Friday, July 23, 2010
Sunday, July 18, 2010
Competative Intellegence Gathering Website's Collection
Here are few websites links collection from EC-Council and other's by these websites we get :
WEBSITES ARE LISTED BELOW:
Data gathering
Data analysis
Information Verification
Information SecurityWEBSITES ARE LISTED BELOW:
Carratu International
www.carratu.com
CI Center
www.cicentre.com
Corporate Crime Management
www.assesstherisk.com
Marven Consulting group
www.marwen.com
Security sciences corporation
www.securitysciences.com
lubrinco
www.lubrinco.comAWARE Competitive Intelligence
www.marketing-intelligence.co.uk/
Pharma CI
www.pharmaciconference.com/
People Search, job sites website's
There are many many website, which helps in finding information about common people as well as well known people. This helps for the benefit as Social Engineering, information gathering, personal information.
www.bestpeoplesearch.com
www.people-search-america.com
www.switchboard.com
www.12.co.uk/anacubis/
www.finance.google.com/finance
www.finance.yahoo.com
Foot printing through Job sites.
www.jobsdb.com
People Search website's only for U.S.
There are many many website, which helps in finding information about common people as well as well known people. Most of the websites will search only american population. but still there are few sites, which can help in greater. this helps for the benefit as Social Engineering, information gathering, personal information.
www.people.yahoo.com - only for U.S
www.intellius.com - only for U.S
SEARCH PEOPLE ONLY AS A INFORMATION GATHERING. NO PERSON SHOULD ATTACK ON HIM AFTER GAINING INFORMATION. WE ARE NOT RESPONSIBLE.
www.people.yahoo.com - only for U.S
www.intellius.com - only for U.S
SEARCH PEOPLE ONLY AS A INFORMATION GATHERING. NO PERSON SHOULD ATTACK ON HIM AFTER GAINING INFORMATION. WE ARE NOT RESPONSIBLE.
Tuesday, July 6, 2010
Online whois tools
Here is the new Tool by samspade which gives much more information related to Domain or IP.
Official Website : www.samspade.org
You can download samspade 1.14 beta version for free from softpedia.com
Screenshot 2 of Sam Spade
Screenshot 3 of Sam Spade
Official Website : www.samspade.org
You can download samspade 1.14 beta version for free from softpedia.com
Screenshot 1 of Sam Spade
"Ping utility : enables you to send packets to a host and see the response time."
Screenshot 2 of Sam Spade
"Traceroute: shows time in miliseconds and also a graphical indicator. You can log the results."
Screenshot 3 of Sam Spade
"Basic progrma options: you can input your e-mail adress, your ISP and you can use DHCP."
Images watermarked with the Softpedia logo are screenshots taken by our editors and cannot be reproduced without prior written consent.
Thanks to softpedia.com
If any doubts regarding this Tool - then post comments here ..
Labels:
Foot Printing
Monday, July 5, 2010
archive.org
This website is one of the best way back machines. This shows us the webpages of any selected url's in past. It's simple. Just check a field to enter a website to check way back (past ) of it's website.
WWW.ARCHIVE.ORG
This snapshot is a current live website. This helps a lot for checking any company's website in past. with this you also can understand what exactly security measures taken by them. as well as in programming side view.
so, what you are waiting for... check this out !!
WWW.ARCHIVE.ORG
This snapshot is a current live website. This helps a lot for checking any company's website in past. with this you also can understand what exactly security measures taken by them. as well as in programming side view.
so, what you are waiting for... check this out !!
Securitytracker.com
latest security updates. here this will keep track of the latest vuneralbilities.
You can signup and get weekly updates from securitytracker.com
http://www.securitytracker.com/signup/signup_now.html
you can also follow Twitter updates : follow the link below
http://www.twitter.com/securitytracker
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
www.securitytracker.com
update yourself..
You can signup and get weekly updates from securitytracker.com
http://www.securitytracker.com/signup/signup_now.html
you can also follow Twitter updates : follow the link below
http://www.twitter.com/securitytracker
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
www.securitytracker.com
update yourself..
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
- Sun Tzu, Art of war ...
About me
hello,
This is Sankar from India. Intrested to give all the resources I have and help the people from attackers. Now a days there are lots and lots of black hat hackers are available. May useful resources, information are coming out. So, with this intention i have started this blog. so that the people who are intrested to learn new techniques and tools for Ethical hacking Purpose. We should help the World from Criminal Hackers. Ofcourse even if we dont have much knowledge about this. still we can learn new tips from top ethical hackers and utilize those for Good ones.
Share your information :) :)
sankar.
This is Sankar from India. Intrested to give all the resources I have and help the people from attackers. Now a days there are lots and lots of black hat hackers are available. May useful resources, information are coming out. So, with this intention i have started this blog. so that the people who are intrested to learn new techniques and tools for Ethical hacking Purpose. We should help the World from Criminal Hackers. Ofcourse even if we dont have much knowledge about this. still we can learn new tips from top ethical hackers and utilize those for Good ones.
Share your information :) :)
sankar.
Ethical hacking Tools Intro
Hey,
Do you know that there are lots and lots of computer ethical hacking Tools & Tutorials available in Internet. This Blog gives you a proper Tools information and official download links :)
If any one want to attack or trying to compromise others systems, then this Resources is not for them. These resources and tools given here should be used only for saving people from Viruses, attackers and black hat hackers.
If you want to know what the enemy is thinking, you should be like enemy and get all the tricks from them and then attack them. never try to attack if you are a beginner.
Come on... let's Start the Game now :) :)
Share information via comments. If we like your way of thinking, then you may get permissions to post any Tools and information.
© 2010 Live Hacking Tools
Do you know that there are lots and lots of computer ethical hacking Tools & Tutorials available in Internet. This Blog gives you a proper Tools information and official download links :)
If any one want to attack or trying to compromise others systems, then this Resources is not for them. These resources and tools given here should be used only for saving people from Viruses, attackers and black hat hackers.
If you want to know what the enemy is thinking, you should be like enemy and get all the tricks from them and then attack them. never try to attack if you are a beginner.
Come on... let's Start the Game now :) :)
Share information via comments. If we like your way of thinking, then you may get permissions to post any Tools and information.
© 2010 Live Hacking Tools
Subscribe to:
Posts (Atom)