Basic HTML version of Foils prepared May 19 99

Foil 6 Typical Scenario - collecting tools

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


Strobe - excellent port scanner http://rootshell.connectnet.com/
Mscan - powerful scanner http://rootshell.connectnet.com/
Scotty - protocol agent http://wwwsnmp.cs.utwente.nl/~schoenw/scotty/
Jizz - DNS poison server http://rootshell.connectnet.com/
Nmap - many types of scans http://www.insecure.org/nmap/index.html
RootKit - OS centric tools http://rootshell.connectnet.com/
QueSO - OS identification ftp://apostols.org/AposTools/snapshots/
SATAN - exposure assessment ftp://ftp.win.tue.nl/pub/security
SAINT - based on SATAN http://32bit.bhs.com/



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999