►Wireshark -has been around for ages and is extremely popular. Wireshark allows the pentester to put a network interface into a promiscuous mode and therefore see all traffic. This tool has many features such as being able to capture data from live network connection or read from a file that saved already-captured packets. Wireshark is able to read data from a wide variety of networks, from Ethernet, IEEE 802.11, PPP, and even loopback. Like most tools in our 2013 Concise Courses Security List the captured network data can be monitored and managed via a GUI – which also allows for plug-ins to be inserted and used. Wireshark can also capture VoIP packets (like Cain & Able ) and raw USB traffic can also be captured.:
Related Posts
WebPwn3r - WebApps Security Scanner
Not long ago a group of researchers at computer security reported a RCE (Remote Control Ejecution) v[...]
Apr 19, 2014Metasploit,Nessus and Nmap Detail
►Metasploit -The Metasploit Project is a security project which delivers information about security [...]
Jan 27, 2014John The Ripper Tool Uses:
John The Ripper -is a free password cracking software tool. Originally created for the UNIX operatin[...]
Jan 27, 2014Ettercap tool uses:
Ettercap - is a free and open source network security tool for man-in-the-middle attacks (MITM) on L[...]
Jan 27, 2014Cain & Abel Uses:
Cain & Abel - has a reputation of being a bit of a script-kiddie tool, but it is still awesome n[...]
Jan 27, 2014
Subscribe to:
Post Comments (Atom)
Post a Comment
EmoticonI Love Hearing What My Readers Have To Say!
People Like You Have Helped To Make The Blog What Is Today!
So I Wanted To Thank You Personally For Sharing Your Thoughts.
I Read Comments First Thing In The Morning So Helpfully Yours Will Help Brighten Up My Day!
Click to see the code!
To insert emoticon you must added at least one space before the code.