Measure the test taker's knowledge about the tools that hackers often use.

Source: Internet
Author: User
Tags ldap mssql mssql client

Name. DIC: The most common Chinese user name (see if your common user name is not in it)
Passsniffer: Non-switch sniffer software with a size of only 3 KB

Psexec: directly log on to the host through the IPC Pipeline

Pskill: Killing process experts :)

Pslist: column process master :)

RAR: The Chinese version of WinRAR under the command line (comprehensive functions)

Reboot. vbs: script for remotely restarting the host

Sdemo.zip

Shed: remotely searches for resources shared by Win9x

Sid: User name in the SID Column

Skservergui: Multiple Agent software for snake

Sksockserver: Snake proxyProgram

Smbcrack: ultra-fast IPC cracking software (suitable for cracking a machine)

Socks

Sockscap: converts a SOCKS5 proxy to a universal proxy

Spc.zip: the remote Win98 shared resource password is displayed.

Wmihack: account and password Based on the WMI Service (IPC is not required)

Skmontor: Snake registry Monitor (cool)

Sql1.exe: MSSQL overflow Program 2

Sql2.exe: MSSQL overflow Program 3

Sqlexec: MSSQL Client

Superscan: excellent scanner for GUI

SYN: Top Syn Attack expert

Upx120: excellent compression software, often used to compress Trojans to avoid anti-virus software

Wget: HTTP download software under the command line

Win2kpass2: password theft for Win2k... To use...

Winnuke: software that attacks the RPC service (win2ksp0/0/0/3 + winnt + WINXP system instability)

Smbnuke: software used to attack NetBIOS (win2ksp0/0/0/3 + winnt + WINXP system crashes)

Winpcap_2_3: Nmap, arpsnifer, and so on.

Winpcap_2_3_nogui.exe: winpcap_2_3 (command line edition) automatically installed without the installation Interface)

Scanbaby2.0: attackers can exploit this vulnerability to crack the account and password of the 80% Mail Service (Cool, see the mail vulnerability description in RFC)

Superdic_v31: a very comprehensive hacker dictionary Generator

GetAdmin: Win2k + SP3 permission escalation Program (good !!!)

Whoami: Manages your permissions.

Fssniffer: A good non-switch sniffer Tool

Twwwscan: a huge CGI scanner under the command line

Tftpd32: Transfers files to hosts that use the remote TFTP service (of course, there must be a shell)

Rangescan: Gui scanner for customizing CGI vulnerabilities

Pwdump2: Local winnt/2 k password hash value (indispensable)

Pwdump3: remotely capture the WINNT/2 k password hash value (indispensable)

Procexpnt: view the association between system processes and ports (GUI)

NC: it is no longer a simple Telnet Client

Cmd.txt: Check the CMD command if you do not understand it.

Fport: view the association between system processes and ports in the command line (procexpnt is strong without GUI)

Brutusa2: full-featured password cracking software that supports password cracking for telnet, FTP, HTTP, and other services

Cmd. Reg: The reg file with the file name automatically completed (command line: press the tab key to automatically complete sys to system, and then press it to change to system32)

Regshell: Registry Editor under the command line

Nscopy: Backup worker tool (when you are a user in the Backup Operators group, sometimes your permissions are higher than admin)

Session.rar: with the password hash value of the win/nt2000 target host, you can directly send the hash value to the host and log on to the host.

Klogger.exe: A several kb key logging tool. After running the tool, the klogger. txt file is generated in the current directory.

Smb2: a tool used to launch SMB mitm attacks. It inserts its own execution command into the session.

Xptsc.rar: Remote Terminal client of WINXP (supports Win2000/XP)

Sqlhack.zip: Fast MSSQL brute force cracking tool

MSSQL: Fast MSSQL brute force cracking tool

Ntcrack.zip: Use the obtained md4 passwd hash to crack the account password

Sqlsniffer.rar: MSSQL plaintext sniffer

Telnethack.rar: remotely enable the telnet service of Win2000 machine with administrator permissions

Rfportxp.exe: The program associated with the port and process under XP

Sqltools.rar: MSSQL Toolkit

Serviceapp.exe: remotely install/delete a service

Hgod: Options with SYN/drdos/udp/ICMP/IGMP Denial of Service test function

Hscan: Small integrated scanner (supporting Cisco, MySQL, MSSQL, CGI, RPC, IPC (SID), FTP, ssh, SMTP, etc)

Hdoor.rar: ping the backdoor (ICMP backdoor)

Siduserenum.exe: used Sid to obtain the user list (the SID of Xiao Rong cannot be completely listed)

Rpc_le.exe: Use RPC Overflow to restart Win2k (effective for SP3 + sp4hotfix)

R3389.exe: query the port changed by the terminal server (within 1 second)

Smbsniffer.exe: obtains the host hash value for accessing the webpage of the local host (supports interception of the Intranet host hash)

Netenum.exe: gets a large amount of information from the host through port 3389 + null connection.

Aspcode.exe: the second version of the most effective ASP overflow program tested (effective for SP2)

Sslproxy: For the proxy that uses the SSL encryption protocol (the scanner can scan the SSL host through it !!!!)

Lsa2: Obtain the WINNT/2 k plaintext password in the LSA registry key, including sqlserver (it is useless after patching)

Psu.exe: Open the specified program with the permission of the specified process.

LDAP. MSI: lightweight LDAP directory service client, which obtains a large number of host information such as the account list through port 389.

Rootkit: hides the specified process, service, registry secret, and kernel-level Win2k backdoor that can be bound to the port from the underlying system !!!

ArticleSource: DIY tribe (http://www.diybl.com/course/1_web/webjs/20071021/79016.html)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.