Kali Tools: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 47: | Zeile 47: | ||
=Tools für Attacken= | =Tools für Attacken= | ||
| − | *[[medusa]] (Passwordhacking) (L | + | *[[medusa]] (Passwordhacking) (L) |
| − | *[[hydra]] (Passwordhacking) (L | + | *[[hydra]] (Passwordhacking) (L) |
| − | *[[smbv2passhack]] | + | *[[smbv2passhack]] |
| − | *[[samdump2]] (Passwordhacking) | + | *[[samdump2]] (Passwordhacking) |
| − | *[[ncrack]] (Passwordhacking | + | *[[ncrack]] (Passwordhacking) |
| − | *[[aircrack-ng]] (L | + | *[[aircrack-ng]] (L) |
| − | *[[kismet]] (L | + | *[[kismet]] (L) |
| − | *[[skipfish]] (L | + | *[[skipfish]] (L) |
| − | *[[metasploit]] (Penetration) (L | + | *[[metasploit]] (Penetration) (L) |
| − | *[[armitage]] (Penetration | + | *[[armitage]] (Penetration) |
| − | *[[set]] (L | + | *[[set]] (L) |
| − | *[[searchsploit]] | + | *[[searchsploit]] |
| − | *[[Wlan Spoofing]] | + | *[[Wlan Spoofing]] |
| − | *[[MITM Router]] | + | *[[MITM Router]] |
| − | *[[Fake Access Point]] | + | *[[Fake Access Point]] ´ |
*[[adb]] | *[[adb]] | ||
*[[ghost]] (L) | *[[ghost]] (L) | ||
Version vom 16. Oktober 2023, 11:26 Uhr
Allgemeines
Grundlegendes
- Secure-Net-Konzept
- Angriffe Vorüberlegungen
- Verschleierungstaktik
- ANGRIFFE GEGEN COMPUTER IM INTERNET
Tools zur Informationsbeschaffung
- Penetrationstests
- Open Source Intelligence (OSINT)
- Spezielle Suchmaschinen
- API Keys (
- nmap (L)
- hping3
- masscan (20)
- dig (L)
- nslookup
- Fierce (L)
- Google-Hacking (20)
- TheHarvester (L)
- MetaGooFil (L) (20)
- HTTrack (Website Mirror) (L)
- maltego (L)
- recon-ng
- sparta (L)
Tools zur Schwachstellenanalyse
- nikto (L)
- Greenbone Security Manager (früher Openvas) (L)
- legion (L)
- zap (früher webscarab) (L)
- siege (L)
- Burp
- sqlmap
- wpscan
Sniffing und Spoofing Tools
Tools für Attacken
- medusa (Passwordhacking) (L)
- hydra (Passwordhacking) (L)
- smbv2passhack
- samdump2 (Passwordhacking)
- ncrack (Passwordhacking)
- aircrack-ng (L)
- kismet (L)
- skipfish (L)
- metasploit (Penetration) (L)
- armitage (Penetration)
- set (L)
- searchsploit
- Wlan Spoofing
- MITM Router
- Fake Access Point ´
- adb
- ghost (L)
Forensik Tools
- Forensik Überlegungen
- dcfldd (L)
- ftk-imager
- autospy (L)
- chkrootkit (L)
- rkhunter
- binwalk (L)
- Manuelle Kontrolle
Tools für Reporting
- cutycapt (L)
- farady (L)
- pipal (L)
- recordmydestop (L)
- obs-studio
Weitere Tools
- DefaultCreds-cheat-sheet
- sqlmap
- parsero
- uniscan
- sysdig
- zap
- netsniff-ng
- tcpflow
- https-downgrade-mitm
- Subfinder
- gua
- Whatweb
Postexplonation
Misc
- Rechtliche Grundlagen Hacking für Administratoren
- Wordpress hack
- ssh vpn remote hack
- osint
- Angriffsvektoren ISO/OSI Modell
- Wichtige Windows Dateien