Linux

Linux

NSAT

NSAT is a robust scanner which is designed for:

* Different kinds of wide-ranging scans, keeping stable for days
* Scanning on multi-user boxes (local stealth and non-priority scanning options)
* Professional-grade penetration testing and comprehensive auditing
* Easy full-scale archiving of vulnerability and version information for further purposes
* Time-less configuration - as a banner scanner for many known services and protocols
* Virtual host support, host/network exclusion support
* Flexibility and configurable scanning
* Distributed scanning (new feature; beta status)

Works on:
All BSD Platforms (FreeBSD/NetBSD/OpenBSD/Apple Mac OS X),
All POSIX (Linux/BSD/UNIX-like OSes),
Linux, Solaris

Wellenreiter

Wellenreiter is a GTK/Perl program that makes the discovery, penetration and auditing of 802.11b wireless networks as easy as possible. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. Usability is one of the main goal.

WINE

Wine lets you run Windows software on other operating systems. With Wine, you can install and run these applications just like you would in Windows.

Wine is still under active development. Not every program works yet, however there are already several million people using Wine to run their software

Download page includes WINE for many popular Distributions of linux.

Tiger

Tiger is a security tool that can be use both as a security audit and intrusion detection system. It supports multiple UNIX platforms and it is free and provided under a GPL license. Unlike other tools, Tiger needs only of POSIX tools and is written entirely in shell language.

Tiger has some interesting features that merit its resurrection, including a modular design that is easy to expand, and its double edge, it can be used as an audit tool and a host intrusion detection system tool. Free Software intrusion detection is currently going many ways, from network IDS (with Snort), to the kernel (LIDS, or SNARE for Linux and Systrace for OpenBSD, for example), not mentioning file integrity checkers (many of these: aide, integrit samhain, tripwire...) and logcheckers (even more of these, check the Log Analysis pages). But few of them focus on the host-side of intrusion detection fully. Tiger complements this tools and also provides a framework in which all of them can work together. Tiger it is not a logchecker, nor it focused in integrity analysis. It does "the other stuff", it checks the system configuration and status. Read the manpage for a full description of checks implemented in Tiger. A good example of what Tiger can do is, for example, check_findelete, a module that can determine which network servers running in a system are using deleted files (because libraries were patched during an upgrade but the server's services not restarted).

Free software Linux/*BSD distributions have a myriad of security tools to do local security checks: Debian's checksecurity, Mandrake's msec, OpenBSD's /etc/security, SUSE's Seccheck... but, even if they do similar checks they have suffered from fragmentation. Tiger is being developed in the hopes that it could substitute them at some point in the future. For a list of system security checks that Tiger provides that others do not you can read this (short) comparison.

Find more information in the project page at Savannah.

checksec.sh

Modern Linux distributions offer some mitigation techniques to make it harder to exploit software vulnerabilities reliably. Mitigations such as RELRO, NoExecute (NX), Stack Canaries, Address Space Layout Randomization (ASLR) and Position Independent Executables (PIE) have made reliably exploiting any vulnerabilities that do exist far more challenging. The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used.

Mini MySqlat0r

Mini Mysqlat0r provides a graphical user interface for enumerating MySQL databases through SQL injection.

Mini Mysqlat0r is basically composed of 3 parts: Crawler, Injection Finder, Exploiter.

AutoScan-Network

AutoScan-Network is a fast graphical network scanner. Useful for detecting unauthorized network access as well mapping known network devices. AutoScan has been ported to run on OSX, Linux, and Windows among other operating systems.

• Fast network scanner
• Automatic network discovery
• TCP/IP scanner
• Wake on lan functionality
• Multi-threaded Scanner
• Port scanner
• Low surcharge on the network
• VNC Client
• Telnet Client
• SNMP scanner
• Simultaneous subnetworks scans without human intervention
• Realtime detection of any connected equipment
• Supervision of any equipment (router, server, firewall...)
• Supervision of any network service (smtp, http, pop, ...)
• Automatic detection of known operatic system (brand and version), you can also add any unknown equipment to the database
• The graphical interface can connect one or more scanner agents (local or remote)
• Scanner agents could be deployed all over the network to scan through any type of equipment (router, NAT, etc)
• Network Intruders detection (in intruders detection mode, all new equipments blacklisted)
• Complete network tree can be saved in a XML file.
• Privileged account is not required

ProxyChains

ProxyChains allows TCP and DNS tunneling through proxies. Different types of proxies can be mixed together to form a "chain" of proxies through which connections can be tunneled in order to help maintain anonymity.

About proxychains tool:
* It's a proxifier.
* Latest version: 3.1
* Dedicated OS: Linux and other Unices.
* Allows TCP and DNS tunneling through proxies.
* Supports HTTP, SOCKS4 and SOCKS5 proxy servers.
* Different proxy types can be mixed in the same chain.
* Proxy chain: user-defined list of proxies chained together.

Usability :
* Run any program through proxy server.
* Access the Internet from behind a restrictive firewall.
* Hide your IP
* Run SSH, telnet, wget, ftp, apt, vnc, nmap through proxy servers.
* Access Intranets (192.168.*.*/10.*.*.*) from outside through reverse proxy.

Arpalert

Arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

This software is used for monitoring ethernet networks.
It listens on a network interface (without using 'promiscuous' mode) and catches all conversations of MAC address to IP request.
It then compares the mac addresses it detected with a pre-configured list of authorized MAC addresses. If the MAC is not in list, arpalert launches a pre-defined user script with the MAC address and IP address as parameters.
This software can run in deamon mode; it's very fast (low CPU and memory consumption).
It responds at signal SIGHUP (configuration reload) and at signals SIGTERM, SIGINT, SIGQUIT and SIGABRT (arpalert stops itself)

Sun VirtualBox

VirtualBox is a general purpose full virtualizer for x86 hardware. VirtualBox was developed by Sun Microsystems Inc and is distributed free of charge.

VirtualBox will basically run any operating system. The source code as well as the SDK (Software Developer Kit) has been made available for public download on the VirtualBox web site. Compiled binaries for common operating systems such as Windows, Solaris, OS X, and Linux have also been made available for download on the VirtualBox site.

Syndicate content