Top 10 vulnerabilities scanner
Vulnerability is a kind of weakness in the programming or in the security network system. Following are the some vulnerability scanning technologies that can be used to find the vulnerabilities in your operating system.
· MBSA: Microsoft Baseline Security Analyzer
· Sara : Security Auditor's Research Assistant
· SAINT : Security Administrator's Integrated Network Tool
· GFI LANguard: A commercial network security scanner for Windows
· Nessus : Premier UNIX vulnerability assessment tool
· Core Impact : An automated, comprehensive penetration testing product
· X-scan : A general scanner for scanning network vulnerabilities
· QualysGuard : A web-based vulnerability scanner
· ISS Internet Scanner : Application-level vulnerability assessment
· Retina : Commercial vulnerability assessment scanner by eEye
Top 4 Application-Specific Scanners
· THC Amap : An application fingerprinting scanner
· Nbtscan : Gathers NetBIOS info from Windows networks
· Ike-scan : VPN detector/scanner
· SPIKE Proxy : HTTP Hacking
Top Password Cracker
· Cain and Abel : The top password recovery tool for Windows
· John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
· THC Hydra : A Fast network authentication cracker which supports many different services
· Aircrack : The fastest available WEP/WPA cracking tool
· L0phtcrack : Windows password auditing and recovery application
· Airsnort : 802.11 WEP Encryption Cracking Tool
· Pwdump : A window password recovery tool
· RainbowCrack : An Innovative Password Hash Cracker
Top 4 Port Scanners
· Superscan : A Windows-only port scanner, pinger, and resolver
· Angry IP Scanner : IP address and port scanner
· Unicornscan : Not your mother's port scanner
· Scanrand : An unusually fast stateless network service and topology discovery system
Top 3 Vulnerability Exploitation Tools
· Metasploit Framework : Hack the Planet
· Core Impact : An automated, comprehensive penetration testing product
· Canvas : A Comprehensive Exploitation Framework
No comments:
Post a Comment