Kali Tools Übersicht: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(Die Seite wurde geleert.) Markierung: Geleert |
|||
| Zeile 1: | Zeile 1: | ||
| − | + | =Gemeinsames Entwickeln eines Lernnetzwerkszenarios= | |
| + | =Tools zur Informationsbeschaffung= | ||
| + | * Nmap (Portscanning) | ||
| + | * TheHarvester (Email) | ||
| + | * Dig (DNS) | ||
| + | * Fierce (DNS) | ||
| + | * MetaGooFil (Metadaten) | ||
| + | * HTTrack | ||
| + | * Maltego | ||
| + | * Sparta (Automatisierung) | ||
| + | =Tools zur Schwachstellenanalyse= | ||
| + | * OpenVAS | ||
| + | * Nikto | ||
| + | * Siege | ||
| + | =Sniffing und Spoofing Tools= | ||
| + | * Dsniff | ||
| + | * Ettercap | ||
| + | * Wireshark | ||
| + | =Tools für Attacken= | ||
| + | * aircrack-ng (Wireless) | ||
| + | * Ghost Phisher (Wireless) | ||
| + | * Kismet (Wireless) | ||
| + | * WebScarab (Website-Penetration) | ||
| + | * Skipfish (Website-Penetration) | ||
| + | * Zed Attack Proxy | ||
| + | * Metasploit (Exploit) | ||
| + | * Armitage (Exploit) | ||
| + | * Social Engineering Toolkit (Exploit) | ||
| + | * Searchsploit (Exploit) | ||
| + | * Medusa (Passwort-Angriffe) | ||
| + | * Hydra (Passwort-Angriffe) | ||
| + | * Samdump2 (Passwort-Angriffe) | ||
| + | * weitere Tools | ||
| + | =Forensik Tools= | ||
| + | * Dcfldd | ||
| + | * Autopsy | ||
| + | * Binwalk | ||
| + | * Chkrootkit | ||
| + | * weitere Tools | ||
| + | =Tools für Reporting= | ||
| + | * Cutycapt | ||
| + | * Faraday-IDE | ||
| + | * Pipal | ||
| + | * RecordMyDesktop | ||
Version vom 10. Mai 2025, 16:06 Uhr
Gemeinsames Entwickeln eines Lernnetzwerkszenarios
Tools zur Informationsbeschaffung
- Nmap (Portscanning)
- TheHarvester (Email)
- Dig (DNS)
- Fierce (DNS)
- MetaGooFil (Metadaten)
- HTTrack
- Maltego
- Sparta (Automatisierung)
Tools zur Schwachstellenanalyse
- OpenVAS
- Nikto
- Siege
Sniffing und Spoofing Tools
- Dsniff
- Ettercap
- Wireshark
Tools für Attacken
- aircrack-ng (Wireless)
- Ghost Phisher (Wireless)
- Kismet (Wireless)
- WebScarab (Website-Penetration)
- Skipfish (Website-Penetration)
- Zed Attack Proxy
- Metasploit (Exploit)
- Armitage (Exploit)
- Social Engineering Toolkit (Exploit)
- Searchsploit (Exploit)
- Medusa (Passwort-Angriffe)
- Hydra (Passwort-Angriffe)
- Samdump2 (Passwort-Angriffe)
- weitere Tools
Forensik Tools
- Dcfldd
- Autopsy
- Binwalk
- Chkrootkit
- weitere Tools
Tools für Reporting
- Cutycapt
- Faraday-IDE
- Pipal
- RecordMyDesktop