I’ve been gone for so long that it’s not even convenient. I will improve.
Wireshark
Wireshark is a network packet analyzer that allows you to capture and analyze data transmitted over the network. It can be used to debug network problems, analyze network traffic, and also detect network attacks. Wireshark is one of the most popular network traffic analysis tools and is widely used by system administrators, network engineers, and information security professionals.
Veil
Veil is a tool designed to create metasploit payloads that bypass common antivirus permissions.
Masscan
Masscan – TCP port scanner that transmits SYN packets. asynchronously and produces results similar to nmap, the most famous port scanner. Internally it acts more like scanrand, unicornscan and ZMap, using asynchronous transfer. This is a flexible utility that allows you to use arbitrary address and port ranges.
Mitmproxy
Mitmproxy is an interactive “middleman” proxy server for HTTP and HTTPS. It provides a console interface that allows traffic flows to be inspected and edited on the fly.
Also included is mitmdump, a command line version of mitmproxy with the same functionality but without the bells and whistles. Consider tcpdump for HTTP.
Functions:
-
intercept and modify HTTP and HTTPS requests and responses, and modify them on the fly
-
save HTTP conversations for later playback and analysis
-
replay the client side of an HTTP conversation
-
reverse proxy mode for forwarding traffic to a specified server
-
transparent proxy mode on OSX and Linux
-
make changes to HTTP traffic using scripts using Python
-
SSL/TLS certificates for interception are generated on the fly.
THC Hydra
Hydra is a parallel login cracker that supports multiple protocols. Attack. It is very fast and flexible, and new modules are easy to add.
This tool allows researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.
It supports: Cisco AAA, Cisco Authentication, Cisco Enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP- proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT) , SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.
Acknowledgement and Usage Notice
The editorial team at TechBurst Magazine acknowledges the invaluable contribution of the author of the original article that forms the foundation of our publication. We sincerely appreciate the author’s work. All images in this publication are sourced directly from the original article, where a reference to the author’s profile is provided as well. This publication respects the author’s rights and enhances the visibility of their original work. If there are any concerns or the author wishes to discuss this matter further, we welcome an open dialogue to address potential issues and find an amicable resolution. Feel free to contact us through the ‘Contact Us’ section; the link is available in the website footer.