Search results
Results From The WOW.Com Content Network
Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs.Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic.
Cain and Abel (often abbreviated to Cain) was a password recovery tool for Microsoft Windows.It could recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. [1]
Wireshark is very similar to tcpdump, but has a graphical front-end and integrated sorting and filtering options.. Wireshark lets the user put network interface controllers into promiscuous mode (if supported by the network interface controller), so they can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address.
dial/at, dial/drain, dial/expect, dial/pass – dialer scripting tools; netstat – summarize network connections; replica/changes, replica/pull, replica/push, replica/scan – client–server replica management; ssh, sshnet, scp, aux/sshserve – secure login and file copy from/to Unix or Plan 9; tel, iwhois – look in phone book
Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application written in C#.LOIC was initially developed by Praetox Technologies, however it was later released into the public domain [2] and is currently available on several open-source platforms.
ip addr, ip link: Address and link configuration route: ip route: Routing tables arp: ip neigh: Neighbors iptunnel: ip tunnel: Tunnels nameif, ifrename: ip link set name: Rename network interfaces ipmaddr: ip maddr: Multicast netstat: ss, ip route: Show various networking statistics brctl: bridge: Handle bridge addresses and devices
The CIPAV captures location-related information, such as: IP address, MAC address, open ports, running programs, operating system and installed application registration and version information, default web browser, and last visited URL. [1]
Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl.By 2007, the Metasploit Framework had been completely rewritten in Ruby.On October 21, 2009, the Metasploit Project announced [4] that it had been acquired by Rapid7, a security company that provides unified vulnerability management solutions.