介绍十个安全工具

简介:

 1:wireshark 这个做网络的不能不知道的东西。就跟中国人不能不知道毛主席一样

数据包分析工具。

2:metasploit 

渗透测试工具2004年发布的工具,现在由rapid 7维护,翻译太麻烦了 还是沾原文吧Metasploit took the security world by storm when it was released in 2004. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their list of modules. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality.

Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon sprouted commercial variants. The Framework itself is still free and open source, but they now also offer a free-but-limited Community edition, a more advanced Express edition ($3,000 per year per user), and a full-featured Pro edition ($15,000 per user per year). Other paid exploitation tools to consider areCore Impact (more expensive) and Canvas (less).

The Metasploit Framework now includes an official Java-based GUI and also Raphael Mudge's excellent Armitage. The Community, Express, and Pro editions have web-based GUIs. Read 5 reviews.

3Nessus 漏洞扫描工具

Nessus is one of the most popular and capable vulnerability scanners, particularly for UNIX systems. It was initially free and open source, but they closed the source code in 2005 and removed the free "Registered Feed" version in 2008. It now costs $1,200 per year, which still beats many of its competitors. A free “Home Feed” is also available, though it is limited and only licensed for home network use.

Nessus is constantly updated, with more than 46,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a web-based interface, and an embedded scripting language for writing your own plugins or understanding the existing ones. The open-source version of Nessus was forked by a group of users who still develop it under the OpenVASname

4:Aircrack 无线破解攻击工具

Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

5 Snort 入侵检测工具,这里说下这个真的很好用,但是不建议分析大流量。比如国内某盟公司的漏洞扫描垃圾的不行,在政府采购平台上还10W+ 而且升级还要续费,用句网友的话,国外一开源我们就自主研发了,

This network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts.

While Snort itself is free and open source, parent company SourceFire offers their VRT-certified rules for $499 per sensor per year and a complementary product line of software and appliances with more enterprise-level features. Sourcefire also offers a free 30-day delayed feed

6:cain & abel 密码破解工具,真的很好用,对于我这个cisco funs 用了感觉就是

cisco 根本不是安全厂商。。。。

UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols

7:Backtrack 5 现在最新的版本应该是rt1 这个不应该是tools 应该是os 这个os里面包含了好多tools,但是sectools.org这样拍的我也没意见,用几个词性用 就是 wonderfull,excellent,perfect

This excellent bootable live CD Linux distribution comes from the merger of Whax and Auditor. It boasts a huge variety of Security and Forensics tools and provides a rich development environment. User modularity is emphasized so the distribution can be easily customized by the user to include personal scripts, additional tools, customized kernel

8:netcat 传说中的瑞士军刀,很小的一个工具有几个不同的版本linux 和windows 都有 但是用的时候有具体查看下区别

This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool to use directly or easily drive by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections.

The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its popularity. It can sometimes even be hard to find a copy of the v1.10 source code. The flexibility and usefulness of this tool prompted the Nmap Project to produce Ncat, a modern reimplementation which supports SSL, IPv6, SOCKS and http proxies, connection brokering, and more. Other takes on this classic tool include the amazingly versatile SocatOpenBSD's ncCryptcatNetcat6pnetcat,SBD, and so-called

9:tcpdump 这个也是抓包工具当没有gui的时候就用这个搞定或者tshark 很简单使用的工具

10John the Ripper

John the Ripper is a fast password cracker for UNIX/Linux and Mac OS X.. Its primary purpose is to detect weak Unix passwords, though it supports hashes for many other platforms as well. There is an official free version, a community-enhanced version (with many contributed patches but not as much quality assurance), and an inexpensive pro version. You will probably want to start with some wordlists linux 上的cain &able 



本文转自 song8575 51CTO博客,原文链接:http://blog.51cto.com/song8575/752350

相关文章
|
人工智能 运维 监控
|
JSON NoSQL 安全
漏洞赏金猎人笔记-使用自动化工具搭建攻击面监控平台的一般性思路
前言 本文是一篇笔记,原文作者是@pry0cc(已经50多岁了),本文内容主要是对原文相关内容做的笔记,出于易读性考虑,对部分字句有所删改。
303 0
漏洞赏金猎人笔记-使用自动化工具搭建攻击面监控平台的一般性思路
|
智能硬件
周鸿祎:不符合人性的需求都是伪需求
  在移动互联网时代,产品的可选择性实在太大,各类网站琳琅满目,App(应用程序)层出不穷,任何一个用户都会在网络上不断地进行切换和刷新。   乱花渐欲迷人眼,用户到底凭什么选中你的产品,并为之买单?   谈到这个话题,我不得不提到人性。一个好的产品,往往能够反映人性中最本质的需求,换言之,不符合人性的需求都是伪需求。最本质的需求是人类原始的本能欲望,在《圣经》中,人类有七宗罪:淫欲(lust)、懒惰(sloth)、贪婪(greed)、饕餮(gluttony)、傲慢(pride)、暴怒(wrath)和妒忌(envy)。一款好的产品,需要对人性做透彻的分析,才能完成其设计。且让我们分而论之。
239 0
|
存储 安全 机器人
关于机器人流程自动化 不可不知的十个秘密
机器人流程自动化工具通过添加可智能处理旧代码和有助于延长其使用期限的新图层,为遗留系统赋予了新的生命。许多机器人流程自动化工具还可以由非编程人员来部署,从而使那些使用旧工具感到苦恼的人能够通过拖放新图标来改善其工作流程。通过选择恰当的工具和实现方法,任何能够编写电子表格宏的人都可以使用机器人流程自动化来简化工作流程。但在机器人流程自动化为您的系统带来的这些好处背后,还隐藏着一些问题,随着时间的推移,这些问题可能会带来麻烦。
160 0
|
安全 数据安全/隐私保护
十个步骤使您免受勒索软件伤害
本文讲的是 十个步骤使您免受勒索软件伤害,如果您在过去几周一直对安全方面的新闻有所关注,应该听说多家公司受到勒索软件,特别是“Locky”的影响,其中不乏国内知名公司。
1347 0
|
安全 网络安全 API
这家公司通过模拟攻击检验网络安全
本文讲的是这家公司通过模拟攻击检验网络安全,一家名为Verodin的安全初创公司,基于软件平台模拟网络攻击现场,向企业安全人员展示其操作中心应对攻击的全过程,帮助安全人员检查防御的有效性并对操作人员加以培训。
1306 0
|
测试技术 数据中心 云计算
企业加快云计算应用有十个主要理由
本文讲的是企业加快云计算应用有十个主要理由,最近,有人在博客中总结出企业加快云计算应用的十个主要理由。这些理由是
1029 0

热门文章

最新文章