segunda-feira, 8 de junho de 2020

Cain And Abel

"Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users." read more...

Website: http://www.oxid.it/cain.html

Continue reading


  1. Pentest Vs Ethical Hacking
  2. Hacker Anonymous
  3. Pentest Methodology
  4. Pentestmonkey Sql Injection
  5. Hacker
  6. Hacker Language
  7. Pentest Tools Framework
  8. Hacking Health
  9. Hacking Images
  10. How To Pentest A Network
  11. Pentest Framework
  12. Hacking Health

Astsu - A Network Scanner Tool


How it works
  • Scan common ports
Send a TCP Syn packet to the destination on the defined port, if the port is open, use an nmap scan to check the service running on the port and prints all the ports found.
  • Discover hosts in network
Uses as a base the router's ip to map all possible ips. It then sends an ICMP packet to each IP, and waits for a response, if it receives any response saved in an array the IP of the online host, and when it finishes checking all hosts, prints all hosts online.
  • OS Scan
Sends an ICMP packet to the destination and waits for a response. Then, extracts the TTL from the destination response and checks the possible OS in a list, if have founded, prints it.

How to install
Clone this repository git clone https://github.com/ReddyyZ/astsu.git
  • Install python 3.
    • Linux
      • apt-get install python3
      • chmod +x *
      • python3 -m pip install -r requirements.txt
      • python3 install.py
      • Done!
    • Windows

Arguments
  • -sC | Scan common ports
    • -p | Protocol to use in the scan
    • -i | Interface to use
    • -t | Timeout to each request
    • -st | Use stealth scan method (TCP)
  • -sA | Scan all ports
    • -p | Protocol to use in the scan
    • -i | Interface to use
    • -t | Timeout to each request
    • -st | Use stealth scan method (TCP)
  • -sP | Scan a range ports
    • -p | Protocol to use in the scan
    • -i | Interface to use
    • -t | Timeout to each request
    • -st | Use stealth scan method (TCP)
  • -sO | Scan OS of a target
  • -d | Discover hosts in the network
    • -p | Protocol to use in the scan
    • -i | Interface to use

OS Support
  • Windows
  • Linux
  • Mac




via KitPloitRelated word

TYPES OF HACKER

7 Types of hacker 

1-Script Kiddies-They are  just download overused software & watch youtube video on how to use it. Script kiddies don't care about hacking.

2-White Hat-They are the good guys of the hacker world. They also known as Ethical Hacker.

3-Black Hat-They finds bank or other companies with weak security and steal money or credit card information. They also known as cracker. They are dangerous because they are illegal to gain unauthorized access.

4-Gray Hat-They don't steal money or information sometimes they deface a website or they don't help people for good.

5-Green Hat-These are the hacker "noobz" but unlike Script Kiddies.They care about Hacking  and strive to become full-blown hacker.

6-Red Hat-These are the vigilantes of the hacker world. They are like White Hats in that they halt Black Hats but these folks are downright SCARY to those who have ever tried so much as penetrest.

7-Blue Hat-If a Script Kiddy took revenge he/she might become a Blue Hat.Most Blue Hats are noobz.They have no desire to learn.

More information