Kali Tools: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 41: | Zeile 41: | ||
=Tools für Attacken= | =Tools für Attacken= | ||
| − | *[[set]] | + | *[[aircrack-ng]] (L) |
| + | *[[kismet]] (L) | ||
| + | *[[skipfish]] (L) | ||
| + | *[[metasploit]] (Penetration) (L) | ||
| + | *[[armitage]] (Penetration)(L) | ||
| + | *[[set]] (L) | ||
| + | *[[searchsploit]](L) | ||
| + | *[[medusa]] (Passwordhacking) (L) | ||
| + | *[[hydra]] (Passwordhacking) (L) | ||
| + | *[[samdump2]] (Passwordhacking) | ||
| + | *[[ncrack]] (Passwordhacking) | ||
*[[hping3]] | *[[hping3]] | ||
*[[Wlan Spoofing]] | *[[Wlan Spoofing]] | ||
*[[MITM Router]] | *[[MITM Router]] | ||
*[[Fake Access Point]] | *[[Fake Access Point]] | ||
| − | |||
| − | |||
*[[adb]] | *[[adb]] | ||
*[[ghost]] | *[[ghost]] | ||
Version vom 19. März 2023, 18:03 Uhr
Grundlegendes
- Secure-Net-Konzept
- Angriffe Vorüberlegungen
- Verschleierungstaktik
- ANGRIFFE GEGEN COMPUTER IM INTERNET
Tools zur Informationsbeschaffung
- Penetrationstests
- Open Source Intelligence (OSINT)
- Spezielle Suchmaschinen
- API Keys
- nmap (L)
- hping3
- masscan
- dig (L)
- nslookup
- Fierce (L)
- Google-Hacking
- TheHarvester (L)
- MetaGooFil (L)
- HTTrack (Website Mirror) (L)
- maltego (L)
- recon-ng
- sparta (L)
Tools zur Schwachstellenanalyse
- nikto (L)
- siege (L)
- legion (L)2
- zap (früher webscarab) (L)
- Burp
- Greenbone Security Manager (früher Openvas) (L)
- sqlmap (x)
- wpscan
Sniffing und Spoofing Tools
Tools für Attacken
- aircrack-ng (L)
- kismet (L)
- skipfish (L)
- metasploit (Penetration) (L)
- armitage (Penetration)(L)
- set (L)
- searchsploit(L)
- medusa (Passwordhacking) (L)
- hydra (Passwordhacking) (L)
- samdump2 (Passwordhacking)
- ncrack (Passwordhacking)
- hping3
- Wlan Spoofing
- MITM Router
- Fake Access Point
- adb
- ghost