Kali Tools: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 39: | Zeile 39: | ||
*[[armitage]] (Penetration) | *[[armitage]] (Penetration) | ||
*[[searchsploit]] | *[[searchsploit]] | ||
| − | *[[ncrack]] | + | *[[ncrack]] (Passwordhacking) |
| − | *[[medusa]] | + | *[[medusa]] (Passwordhacking) |
| − | *[[hydra]] | + | *[[hydra]] (Passwordhacking) |
| − | *[[samdump2]] | + | *[[samdump2]] (Passwordhacking) |
=Tools für Attacken= | =Tools für Attacken= | ||
Version vom 21. Juni 2022, 14:44 Uhr
Grundlegendes
- Secure-Net-Konzept
- Angriffe Vorüberlegungen
- Verschleierungstaktik
- ANGRIFFE GEGEN COMPUTER IM INTERNET
Tools zur Informationsbeschaffung
- Penetrationstests
- Open Source Intelligence (OSINT)
- API Keys
- nmap
- hping3
- dig
- nslookup
- Fierce
- Google-Hacking
- TheHarvester
- MetaGooFil
- HTTrack
- maltego
- recon-ng
- set (x)
Tools zur Schwachstellenanalyse
- nikto
- siege
- legion
- zap (früher webscarab)
- Burp
- Greenbone Security Manager (früher Openvas)
- sqlmap (x)
Sniffing und Spoofing Tools
- dsniff
- ettercap
- wireshark
- skipfish
- metasploit (Penetration)
- armitage (Penetration)
- searchsploit
- ncrack (Passwordhacking)
- medusa (Passwordhacking)
- hydra (Passwordhacking)
- samdump2 (Passwordhacking)