Because it is a selection made in the NMAP-HACKERS mail list, there is no selection of the NMAP security scanner (http://www.insecure.org/nmap/). This selection of 75 best security tools are some of the very representative software in the network security, which has considerable reference value for them for those who have started from the newcomers. .
Tools: Nessus (the best open source code risk assessment tool)
Website: http://www.nessus.org/
Category: Open source
Platform: Linux / BSD / UNIX
Introduction: Nessus is a remote security scan software that can run in Linux, BSD, Solaris, and some other systems. It is multi-thread, based on inserted software, has a good GTK interface, can complete more than 1,200 remote security checks, have powerful report output capabilities, can generate security reports in HTML, XML, Latex, and ASCII text And will solve the recommendations for each discovered security issue.
Tools: Ethereal (Network Protocol Detection Tool)
Website: http://www.ethereal.com/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: Ethereal is a free network protocol analysis program that supports UNIX, Windows. With this program, you can analyze both directly from the network, or you can analyze the data saved on the hard disk after grabbing other sniffer. You can view the captured packets interactively, see summary and details of each packet. Ethereal has a variety of powerful features, such as supporting almost all protocols, rich filtering languages, easy to see data streams after the TCP session is reconstructed.
Tools: Snort (Free Intrusion Detection System)
Website: http://www.snort.org/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: Snort is a lightweight network intrusion detection system that enables real-time traffic analysis and packet records on an IP network. It can not only make protocol analysis, content retrieval, content matching, but also to detect a large number of attacks or illegal probes such as buffer, hidden port scan, CGI attack, SMB detection, operating system fingerprint identification. Snort uses flexible rules to describe which traffic should be collected or ignored, and a modular detection engine is provided.
Tools: Netcat (Network Swiss Army Knife)
Website: http://www.atstake.com/research/tools/network_utilities/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: A simple and useful tool that reads and writing data through a network connection using TCP or UDP protocol. It is designed to be a stable back door tool that can be easily driver directly from other programs and scripts. At the same time, it is also a powerful network debugging and detection tool that can build almost all types of network connections you need, and there are several very interesting built-in features.
Tools: TCPDump / WINDUMP (Excellent sniffer for network monitoring and data collection)
Website: http://www.tcpdump.org/, http://windump.polito.it/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Description: TCPDUMP is a well-known and popular command-based network packet analysis and sniffing tool. It can display the header of the packet of the matching rule. You can use this tool to find a network problem or monitor the situation on the network. WINDUMP is a transplant version of TCPDUMP on a Windows platform. Tool: HPING2 (Similar to Ping Network Detection Tool)
Website: http://www.hping.org/
Category: Open source
Platform: Linux / BSD / UNIX
Introduction: HPING2 can send a custom ICMP / UDP / TCP package to the destination address and the response of the package is displayed. It has a convenient Traceroute mode and supports IP fragmentation. This tool is particularly useful when traceroute, ping, and probing firewall.
Tools: DSNIFF (first-class network audit and penetration test tool)
Website: http://naugh.m& # 111nkey.org/~ DUGSONG/DSNIFF /
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: DSNIFF is a set of software developed by Dug Song. Among them, DSNIFF, Filesnarf, Mailsnarf, Msgsnarf, Rlsnarf, and WebSPY can be used to monitor data we are interested in the network (such as passwords, e-mail, files, etc.), Arpspoof, DNSSPOOF and Macof can easily load attackers. Network information (such as two-layer exchange data), SSHMITM and WebMitm can be used to rewrite SSH and HTTPS sessions to reach the M & # 111NKEY-IN-The-Middle attack. At http://www.datanerds.net/~mike/dsniff.html, you can find the transplant version on the Windows platform.
Tools: GFI Languard (Commercial Network Security Scanning Software)
Website: http://www.gfi.com/lannetscan/
Category: Business
Platform: Windows
Introduction: Languard scans the network and draws a service pack level such as each machine, a lack of security patches, open shared, open ports, running services and applications, registry keys, weak passwords, users, and groups, etc. Scan information report. The scan results are output to an HTML format report, and the report can be customized.
Tools: etcap (more security for your exchange environment)
Website: http: //ttercap.sourceforge.net/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: ettercap is a network monitoring, blocking and recording tool in an Ethernet environment, supporting multiple active or passive protocol analysis (even SSH, HTTPS, etc. related to encryption), data insertion, filtration, and keep connection synchronization All kinds of functions, there is also a powerful and complete sniffing kit, support plug-in, can check if the network environment is swaping the LAN, and can use the active or passive operating system fingerprint identification technology to let you Understand the current situation of the current LAN.
Tools: WHINKER / LIBWHISKER (CGI defect scanning software and library)
Website: http://www.wiretrip.net/rfp/p/doc.asp/d21.htm
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: WHisker is a very good HTTP server defect scanning software that scans a large number of known security vulnerabilities, especially some dangerous CGI vulnerabilities. Libwhisker is a library used by Whiskerr with Perl, which you can create your own HTTP scanner. Tools: John the Ripper (exceptionally powerful, flexible, fast multi-platform hash mouth debrillers)
Website: http://www.openwall.com/john/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: John The Ripper is a fast password breakner that supports multiple operating systems such as UNIX, DOS, WIN32, BEOS, and OpenVMS. The main purpose of its design is to check the weak password of the UNIX system, support the password hash type with Crypt function encrypted on almost all UNIX platforms, and also supports Kerberos AFS and Windows NT / 2000 / XP LM Hash.
Tools: OpenSSH / SSH (a security method for accessing remote computers)
Website: http://www.openssh.com/ ,http://www.ssh.com/commerce/index.html
Category: Open Source / Business
Platform: Linux / BSD / UNIX / Windows
Introduction: SSH (Secure Shell) is a program for logging in to the remote server and executes a command on the remote server. It provides secure and reliable encrypted communication between two mutually untrusted hosts on the remote server. The X11 connection and other other TCP / IP port connections can be forwarded to a secure channel via SSH. The interation of SSH development is to replace these unsafe programs in Rlogin, RSH, and RCP, and provide secure channels for RDIST and RSYNC. It should be noted that OpenSSH is an alternative software of SSH, SSH is to charge for some purposes, but OpenSS is always free.
Tool: SAM Spade (Free Network Query Tools on Windows Platform)
Website: http://www.samspade.org/ssw/
Category: Free software
Platform: Windows
Introduction: Samspade provides a friendly GUI interface that can easily complete a variety of network query tasks. It is intended to trace spam manufacturer, but can also be used for other large number of network probes, network management and security. Related tasks, including ping, nslook, WHOIS, DIG, TRACEROUTE, FINGER, RAW HTTP Web Browser, DNS ZONE TRANSFER, SMTP RELAY CHECK, Website Search and other tools, there are online versions of most query tools in its website ( http://www.samspade.org/t/).
Tools: ISS Internet Scanner (Application Layer Risk Assessment Tool)
Website: http://www.iss.net/products_services/enterprise_protection
/Vulnerability_assessment/scanner_internet.php
Category: Business
Platform: Windows
Introduction: Internet Scanner starts in 1992 a small open source scanner, it is quite good, but the price is expensive, using open source software NESSUS instead of it is also a good choice. Tools: TripWire (powerful data integrity check tool)
Website: http://www.tripwire.com/
Category: Business
Platform: Linux / BSD / UNIX / Windows
Description: TripWire is a file and directory integrity check tool that helps system administrators and users monitor any changes that are important files and directories. By developing some basic system strategies, the system administrator is notified by the tripwire when the file is destroyed or tampered with it, so that it can be handled in time. Tripwire's commercial version is very expensive, there is a free open source Linux version in the TripWire.org website, UNIX users may also need to consider AIDE (http://www.cs.tut.fi/~rammer/aide.html) It is a free alternative for Tripwire.
Tools: Nikto (a very comprehensive web scanner)
Website: http://www.cirt.net/code/nikto.shtml
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: Nikto is a scanning software that can be tested by a variety of security items of a web server, which can scan more than 2,000 potentially dangerous files, CGIs and other issues on more than 200 servers. It also uses the libwhiske library, but usually more frequent than the WHINKER update.
Tools: Kismet (powerful wireless sniffer)
Website: http://www.kismetwireless.net/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: Kismet is an 802.11b network sniffing and analysis program, which supports most wireless network cards, can automatically implement network IP block detection via UDP, ARP, and DHCP packets, can list Cisco devices through the Cisco Discovery protocol, Weak encrypted packet records, and Ethereal, TCPDump compatible packet Dump files, draw the detected network diagrams and estimated network ranges.
Tools: SuperScan (TCP port scanner on the Windows platform)
Website: http://www.foundstone.com/index.htm? Subnav = Resources /
Navigation.htm & subcontent = / resources / proddesc / superscan.htm
Category: Free
Platform: Windows
Introduction: SuperScan is a tool with functions such as TCP Connect port scan, ping, and domain name resolution, which can easily do ping and port scans for IP addresses within the specified range. The source code is not disclosed.
Tools: L0PHTCRACK 4 (Windows Password Audit and Recovery)
Website: http://www.atstake.com/research/lc/
Category: Business
Platform: Linux / BSD / UNIX / Windows
Introduction: L0PHTCRACK tries to solve the Windows password according to the unified Windows NT / 2000 workstation, web server, main domain controller, or Active Directory or from the encrypted hash value sniffed on the line, contains dictionary attacks, combinations Attack, forcibly attacking many passwords. Tools: Retina (Eeye's risk assessment scanning tool)
Website: http://www.eeye.com/html/Products/Retina/index.html
Category: Business
Platform: Windows
Summary: Like the NESSUS and ISS Internet Scanner mentioned above, Retina's function is also used to scan all hosts in the network and each defect found for discovery.
Tools: Netfilter (Packet filter firewall used in the current Linux kernel)
Website: http://www.netfilter.org/
Category: Open source
Platform: Linux
Introduction: Netfilter is a powerful package filter firewall that is implemented in a standard Linux kernel, and iptables are firewall configuration tools. It now supports a state or stateless package filter that supports all kinds of NAT and package fractions. Correspondingly, for the firewall on the non-Linux platform, there is PF on the openbsd platform, and there is IPFilter on the UNIX platform. There is Zone Alarm personal firewall on the Windows platform.
Tool: Traceroute / Ping / Telnet / WHOIS (basic command)
Website:
Category: Free
Platform: Linux / BSD / UNIX / Windows
Summary: When we use a large number of high-level tools to assist in security audits, don't forget these most basic tools. Each of us should be very familiar with these tools, almost all operating systems with these tools, but there is no WHOIS tool on the Windows platform, and Traceroute is renamed to Tracert.
Tools: Fport (Enhanced NetStat)
Website: http://www.foundstone.com/index.htm? Subnav = Resources /
Navigation.htm & subcontent = / resources / proddesc / fport.htm
Category: Free
Platform: Windows
Introduction: Fport can display all the processes where all open TCP / IPs, UDP ports, and ports on the host are used, so it is a good tool to find Trojans by using it to instantly discover unknown open port and the application to which the port belongs is. . However, fport only supports Windows systems, there is a netstat command on many UNIX systems to implement similar functions, and use the "NetStat -Pan" command on the Linux system. The source code is not disclosed.
Tools: SAINT (integrated network tool for security administrator)
Website: http://www.saintcorporation.com/saint/
Category: Business
Platform: Linux / BSD / UNIX
Description: Saint is a commercial risk assessment tool, but it is different from those tools that only support Windows platform, and Saint runs on the UNIX class platform. It has been free and open source, but is now a commercial product. .
Tools: Network Stumpler (Free Windows Platform 802.11 Snifting) URL: http://www.stumbler.net/
Category: Free
Platform: Windows
Introduction: NetStumbler is the most famous tool for looking for wireless access points, and another WinCe platform that supports PDA is called Ministumbler. This tool is now free and only supports Windows systems, and the source code is not disclosed, and the developer of the software also retains the right to modify the authorization protocol in the appropriate case. Users on the UNIX system can use Kismet instead.
Tools: SARA (security administrator's aid)
Website: http://www-arc.com/sara/
Category: Open source
Platform: Linux / BSD / UNIX
Introduction: Sara is a risk assessment tool developed based on Satan security scan tools, updated twice a month.
Tools: N-Stealth (Web Server Scanning Tool)
Website: http://www.nstalker.com/nstealth/
Category: Business
Platform: Windows
Introduction: N-Stealth is a commercial Web server security scanning software, usually it is more frequent than whisker, Nikto and other free web scanner upgrades. The N-Stealth developer claims that "more than 20,000 defects and Exploit data" and "a large amount of defects every day" are very suspicious. We must also note that all common risk assessment tools such as Nessus, ISS, Retina, Saint and Sara have already contained Web scanning components, but they may not have flexible and frequent and updated in N-Stealth. N-Stealth does not publicly open source.
Tools: Airsnort (802.11 WEP Password Crack Tool)
Website: http://airsnort.shmoo.com/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: AirSNORT is a wireless LAN key recovery tool developed by the SHMOO team. It monitors transmission data in the wireless network, and the key can be calculated when a sufficiently packet is collected.
Tools: NBTSCAN (Collect NetBIOS information from Windows Network)
Website: http://www.inetcat.org/software/nbtscan.html
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: NBTSCAN is a program for scanning NetBIOS name information on the network. This program sends a NetBIOS status query for each address within the range, and listed the received information with easy-to-read tables, for each response host, it lists its IP address, NetBIOS computer name, login user Name and MAC address.
Tools: GNUPG / PGP (Protect your files and advanced encryption programs)
Website: http://www.gnupg.org/, http://www.pgp.com/
Category: Open Source / Business
Platform: Linux / BSD / UNIX / Windows
Introduction: The PGP is a famous encrypted program developed by Phil Zimmerman. It combines the public key encryption algorithm and conventional encryption technology to secure the encrypted file to another, thereby protecting the user's data from Eaveste or other security risks. GNUPG is an open source program developed in accordance with PGP standards. The GNUPG is always free, and PGP is charged for some purposes. Tools: FireWalk (Advanced Traceroute)
Website: http://www.packetfactory.net/projects/firewalk/
Category: Open source
Platform: Linux / BSD / UNIX
Introduction: FireWalk uses technologies similar to Traceroute to analyze the response of the IP packet, thus measuring the access control list of the gateway and the drawing network diagram. In October 2002, this first-class tool was re-developed on the original basis. It should be noted that most of the features of FireWalk can also be implemented by the HPING2 TRAUTE option.
Tools: Cain & Abel (the poor L0PHTCRACK)
Website: http://www.oxid.it/cain.html
Category: Free
Platform: Windows
Summary: Cain & Abel is a free password recovery tool for Microsoft operating systems. It easily enables password recovery by multiple ways: network sniffing, cracking the password (using a dictionary or forced attack), decoding the chaos, display the password box, the display cache password, and the analysis routing protocol. The source code is not disclosed.
Tools: Xprobe2 (active operating system fingerprint identification tool)
Website: http://www.sys-security.com/html/projects/x.html
Category: Open source
Platform: Linux / BSD / UNIX
Introduction: Xprobe is a tool for determining remote host operating system types. It relies on the fuzzy matching and reasonable speculation of a signature database to determine the type of remote operating system, using the ICMP protocol to operate the system fingerprint identification is its uniqueness.
Tools: Solarwinds Toolsets (Large Quantities Network Discovery, Monitoring, Attack Tools)
Website: http://www.solarwinds.net/
Category: Business
Platform: Windows
Introduction: SolarWinds contains a large number of tools that are suitable for system administrators, and security-related tools include many network discovery scanners and a SNMP power cutter.
Tools: NGREP (convenient bag matching and display tool)
Website: http://www.packetfactory.net/projects/ngrep/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: NGREP implements most of the GNU GREP in the network layer, based on PCAP, allows you to match the data traffic on the network by specifying extended regular expressions or hex expressions. It is currently recognized in TCP, UDP, and ICMP packets on the Ethernet, PPP, SLIP, FDDI, token network, and loopback devices, and understand BPF filtering as other common sniffings (such as TCPDUMP and SNOOP). mechanism.
Tool: Perl / Python (Script language)
Website: http://www.perl.org, http://www.python.org/ Category: Open Source
Platform: Linux / BSD / UNIX / Windows
Introduction: When we use those security tools that have developed good security tools, don't forget that you can write (or modify) security programs is also a very important thing. Using Perl and Python, you can easily write scripts for system testing, exploit, and patches, using CPANs containing NET:: RAWIP and protocol implementation, etc. (CompReensive Perl archive network: http: //www.cpan.org /) Or similar files can help us relatively easier to develop.
Tools: THC-AMAP (Application Fingerprint Identification Scanner)
Website: http://www.thc.org/releases.php
Category: Open source
Platform: Linux / BSD / UNIX
Summary: AMAP developed by THC is a powerful scanner that identifies applications and services by detecting port responses to application fingerprint data, which is far via default port number to determine applications and services.
Tools: OpenSSL (Master SSL / TLS Encrypted Library)
Website: http://www.openssl.org/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: OpenSSL project is a healthier, commercial, fully open and open source toolkit, which is developed, is used to implement a toolkit for security socket (SSL V2 / V3) and transport layer security protocols (TLS V1 ) And form a completely complete universal encryption library. The project is managed by a group consisting of volunteers worldwide, and they use Internet to communicate, design, and develop this OpenSSL tool and related documentation.
Tools: NTOP (Network Usage Control Software)
Website: http://www.ntop.org/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: NTOP is a traffic monitoring software that displays network usage, similar to the TOP command to monitor system processes on UNIX platforms. In interactive mode, NTOP will display the usage status of the network on the user's terminal; in Web mode, NTOP will be a web server, create an HTML page containing network conditions to return to users.
Tools: Nemesis (Unix Network Packet Insert Kit))
Website: http://www.packetfactory.net/projects/nemesis/
Category: Open source
Platform: Linux / BSD / UNIX
Introduction: The Nemesis project is to develop a command line based on a UNIX / Linux system, which is convenient for people to use the IP stack. It can customize packets, insert packets, protocol attacks, etc., is a good test firewall, invading Tools for detecting systems, routers and other network devices. If you are interested in Nemesis, then you may also need to see HPING2, which makes each other.
Tools: LSOF (Listing Opened File)
Website: ftp://vic.cc.purdue.edu/pub/tools/unix/lsof/
Category: Open source
Platform: Linux / BSD / UNIX
Introduction: LSOF is a diagnostic and analysis tool for UNIX, which shows the files opened by the process being running in the system, and can display the communication socket for each process. Tools: hunt (advanced bag sniffing and session tool on Linux platform)
Website: http://lin.fsid.cvut.cz/~kra/index.html#hunt
Category: Open source
Platform: Linux
Introduction: hunt can monitor, hijack, reset the TCP connection on the network, use only active mechanisms for monitoring exchange connections, and advanced features including optional ARP broadcast and hijacking successful connection synchronization .
Tools: Honeyd (your personal honeynet, http://www.honeynet.org/)
Website: http://www.citi.umich.edu/u/provos/honeyd/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: Honeyd is a small background program that creates a virtual host on the web. The virtual host can be configured to run any service, and if the service TCP feature, they look like running on a particular version. Operating system. Honeyd can make a host with multiple addresses in a simulated local area network environment, and you can ping, traceroute. Any type of service on a virtual host can simulate in accordance with a simple profile. Honeyd can also make a proxy service for a host instead of simulating it.
Tools: Achilles (you can modify the HTTP session package agent)
Website: http://packetStormsecurity.nl/filesc/achilles-0-27.zip.html
Category: Open source
Platform: Windows
Introduction: Achilles is a tool for designing security for Web application security. It is a proxy server that plays a "man-in-middle" role in an HTTP session. A typical HTTP proxy server will forward packets between the client browser and the web server, but Achilles is supplied to the HTTP session data to either party and allows the user to modify the data before forwarding the data.
Tools: Brutus (forcibly cracking tools for network certification)
Website: http://www.hoobie.net/brutus/
Category: Free
Platform: Windows
Summary: Brutus is a tool for a network service for remote servers, supports dictionary attacks and combined attacks, supported network applications include HTTP, POP3, FTP, SMB, Telnet, IMAP, NTP, etc. The source code is not disclosed. ThC-HYDRA on the UNIX system has a similar function.
Tools: Stunnel (a variety of SSL encryption housings)
Website: http://www.stunnel.org/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: The Stunnel program is designed to be used as a SSL encryption case between the local client and the remote server. It can add SSL functions on the server using the inetd background process, etc. in POP2, POP3, IMAP, and will not affect the program source code. It establishes an SSL session connection using the OpenSSL or SSLE library.
Tools: Paketto KeiRetsu (extreme TCP / IP)
Website: http://www.doxpara.com/paketto Category: Open Source
Platform: Linux / BSD / UNIX
Introduction: Paketto KeiRetsu is a set of tools for using new uncommon policies to operate TCP / IP networks. The initial intention of development is to implement some features in existing TCP / IP architecture, but now far beyond. Originally. The tools include: scanrand, a rare fast network service and topology discovery system; MineWT, a NAT / MAT router; linkcat, use the Ethernet link as a standard input and output; Paratrace, no new connection You can track the network path; Phentropy, using OpenQVIs in the 3D topology to draw the data source graphics of the total amount.
Tools: Fragroute (the most powerful tool for intrusion detection system)
Website: http://www.m& # 111nkey.org/~ DUGSONG/Fragroute/
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: Fragroute can intercept, modify, and rewritten the outward message, which has implemented most of the IDS attack. Fragroute's important role is a simple rule setting language that implements delays, copy, discard, debris, overlapping, printing, rearrangement, segmentation, source routing or other attacks to the target host. The purpose of this tool development is to test intrusion detection systems, firewalls, basic TCP / IP stacks. Like DSNIFF, LIBDNET, this excellent tool is also developed by Dug Song.
Tool: Spike Proxy
Website: http://www.immunitysec.com/spikeproxy.html
Category: Open source
Platform: Linux / BSD / UNIX / Windows
Introduction: Spike Proxy is an open source HTTP agent that discovers security defects in the Web site. It is part of the Spike Application Test Suite (http://www.immunitysec.com/spike.html), supports SQL insert detection, Web site detection, login form violence, overflow detection, and dictionary attack detection, etc. .
Tools: THC-HYDRA (Network Certified Cracking Tool)
Website: http://www.thc.org/releases.php
Category: Open source
Platform: Linux / BSD / UNIX
Introduction: This tool can quickly dictionary attacks on systems that need to be logged in, including FTP, POP3, IMAP, NetBIOS, Telnet, HTTP AUTH, LDAP NNTP, VNC, ICQ, SOCKS5, PCNFS, etc., support SSL, and now is NESSUS Part of the risk assessment tool.
Other 25 best security tools:
OpenBSD, http://www.openbsd.org/: Security and Reliable operating system.
TCP wrappers, ftp: //ftp.porcupine.org/pub/security/index.html: First-class IP access control and log implementation mechanism.
PWDUMP3, http://www.polivec.com/pwdump3.html: Get the password Hobs of the local or remote Windows host, regardless of whether syskey is installed.
Libnet, http://www.packetfactory.net/libnet/: Allow programmers to construct and insert a high level development function library for network packets .iptraf, http://cebu.mozcom.com/riker/iptraf/: IP Network monitoring software.
FPING, http://www.fping.com/: You can ping multiple IP addresses for multiple IP addresses.
Bastille, http://www.bastille-linux.org/: Enhance system security script, support Linux, Mac OS X, and HP-UX operating systems.
WinfingerPrint, http://winfingerprint.sourceforge.net/: a Win32-based advanced remote system scanner.
TCPTraceRoute, http:/michael.toren.net/code/tcptraceroute/: Use TCP SYN to implement Tools for Traceroute.
Shadow security scanner, http://www.safety-lab.com/en2/products/1.htm: a commercial risk assessment tool.
PF, http://www.benzedrine.cx/pf.html: The open filter firewall is very features in the openbsd system.
LIDS, http://www.lids.org/: Intrusion Detection and Intrusion Defense System on Linux Nucleus.
Hfnetchk, http://www.microsoft.com/technet/treeView/default.asp?
URL = / tech / security / Tools / Tools / Hfnetk.asp: Microsoft released tools for checking the Windows host patch installation on the network.
Etherape, http: //therape.sourceforge.net/: The flow monitoring software Etherman is another graphical network status monitoring software that supports Unix.
DIG, http://www.isc.org/products/bind/: bind The DNS query tool comes with.
CRACK / CRACKLIB, http://www.users.dircon.co.uk/~crypto/: First-class local password breakner.
Cheops / Cheops-Ng, http://www.marko.net/cheops/, http: //cheops-ng.sourceforge.net/: Draw a local or remote network network diagram, and also recognize the operating system type of the host .
ZONE ALARM, http://www.zonelabs.com/: Personal Firewall Software on the Windows platform.
Visual Route, http://www.visualware.com/visualroute/index.html: Get Traceroute / WHOIS data, and draws the location of the network route through the data package in the world map.
The Coroner's Toolkit (TCT), http://www.fish.com/tct/: File System Check and Emergency Repair Tool Set on the UNIX system.
TCPReplay, http: //tcpreplay.sourceforge.net/: You can play back the traffic monitoring files saved in Tcpdump or Snoop.
Snoop, http://www.spitzner.net/snoop.html: The network sniffing tool included with the Solaris system.
PuTTY, http://www.chiark.greenend.org.uk/~sgtatham/putty/: The excellent SSH client on the Windows platform. PSTools, http://www.sysinternals.com/ntw2k/freeware/pstools.shtml: A free command line tool for managing Windows systems.
Arpwatch, http://www-nrg.ee.lbl.gov/: Mainly used to detect tools for the MAC address and IP address correspondence.