Basic HTML version of Foils prepared May 19 99

Foil 6 Typical Scenario - collecting tools

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


1 Strobe - excellent port scanner http://rootshell.connectnet.com/
2 Mscan - powerful scanner http://rootshell.connectnet.com/
3 Scotty - protocol agent http://wwwsnmp.cs.utwente.nl/~schoenw/scotty/
4 Jizz - DNS poison server http://rootshell.connectnet.com/
5 Nmap - many types of scans http://www.insecure.org/nmap/index.html
6 RootKit - OS centric tools http://rootshell.connectnet.com/
7 QueSO - OS identification ftp://apostols.org/AposTools/snapshots/
8 SATAN - exposure assessment ftp://ftp.win.tue.nl/pub/security
9 SAINT - based on SATAN http://32bit.bhs.com/

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999