Network Defense

IDS/IPS/etc

Olive - JUNOS on PC

Excerpt from site:

"The most common use of the Olive platform is for creative and UNIX-competent hackers to learn the JUNOS CLI on a low-cost platform. It is capable of forwarding a small amount of traffic, but does not support many of the features found on real Juniper routers. Essentially the forwarding on an Olive is the same as routing traffic via your fxp0 or em0 management interface on a real Routing Engine."

-----------------
While not a Juniper FW, the above pretty much sums it up, there are some prebuilt VM's existing for folks interested in JUNOS CLI without additional hardware somewhere on the internet Wink

There is no support. Juniper says it doesn't exist. See page for more info.

--Said all OS's since you can vm it.

Ettercap

I believe, ettercap was a tool used a lot more often before things like wireshark and cain and abel came out or at least "got big".
It has support for a lot of different platforms, but it's main job is sniffiing the network and manipulating where the traffic goes or how it gets there thus allowing you to perform MiTM attacks easily. It features filtering just like wireshark and is able to dissect protocols just as well.

GHBA

GHBA or "Get Host By Address" is a reverse DNS lookup tool that can scan a class B or C network range and determine the correct hostname where a potentially fake/false record could normally be hiding the real name.

As you may have noticed I say this is compatible with all OS's because it's a c program and you should, given enough time, be able to compile it on anything even windows using cygwin!

Hping

Hping is a command-line TCP/IP assembler that supports TCP, ICMP, UDP and RAW-IP protocols.

also works on Unix systems, Windows, Sun and MacOS's.

See hping3 for latest info.
https://www.soldierx.com/tools/Hping-3

Nmap

Written by Fyodor of insecure.org, nmap is one of the most common and most popularly noted tools in any hackers arsenal.
It's common abilities are port scanning host on a network to determine which ports are open and which services are running.
It has a very wide feature set of determining what device is being scanned whether it's cisco, juniper, windows98, windows 2003 server, red hat, debian, suse/novell, etc...

It does support 64bit processing now, it does support ipv4 & v6, it does support tcp & udp, it does support mac, linux, bsd, solaris, windows, and a whole bunch of other operating systems that you may pray to never have to work with.
From personal experiences it runs on my ps3, so just about anything out there.

Nmap has the ability to not only obtain information about a host by querying that host, but can also obtain information about a host by querying information for it, from it's peers on the network.
By using Nmap's TCP Idle Scanning technique it has been deemed possible to bypass filters such as access list, ip tables, and intrusion prevention systems under certain circumstances.

For more information about about Nmap please go to http://nmap.org/
For more information regarding the TCP Idle scan the link is http://nmap.org/book/idlescan.html

Syndicate content