Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
networking [2008/10/14 10:32]
a
networking [2008/12/08 01:32]
a
Line 13: Line 13:
  
 </box> </box>
 +
 +<box 60% round red right|**RFC and other stuff on need to know basis**>
 +   * [[http://tools.ietf.org/html/rfc5375|IPv6 Unicast Address Assignment Considerations]]
 +   * [[http://tools.ietf.org/html/rfc1930|Guidelines for creation, selection, and registration of an Autonomous System (AS)]]
 +</box>
 +
 <html></div></html> <html></div></html>
  
Line 34: Line 40:
 | **[[http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html|PuTTY]]** | Windows SSH Client - [[http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe| download - latest x86]]| | **[[http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html|PuTTY]]** | Windows SSH Client - [[http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe| download - latest x86]]|
 | **[[http://puttycm.free.fr/|PuTTY Connection Manager]]** | PuTTY Connection Manager is a free PuTTY Client add-on for Windows platforms which goal is to provide a solution for managing multiple PuTTY instances in tabs. | | **[[http://puttycm.free.fr/|PuTTY Connection Manager]]** | PuTTY Connection Manager is a free PuTTY Client add-on for Windows platforms which goal is to provide a solution for managing multiple PuTTY instances in tabs. |
-| **[[http://voiphopper.sourceforge.net/|VoIP hopper]]**  | VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific Ethernet switches.  VoIP Hopper does this by mimicking the behavior of an IP Phone, in both Cisco and Avaya IP Phone environments.  |+| **[[http://voiphopper.sourceforge.net/|VoIP hopper]]**  | VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific Ethernet switches.  VoIP Hopper does this by mimicking the behavior of an IP Phone, in both Cisco and Avaya IP Phone environments. 
 | **[[http://segfault.gr/projects/lang/en/projects_id/14/secid/28/|CDPSnarf]]** | CDPSnarf if a network sniffer exclusively written to extract information from CDP packets. It provides all the information a "show cdp neighbors detail" command would return on a Cisco router and even more. | | **[[http://segfault.gr/projects/lang/en/projects_id/14/secid/28/|CDPSnarf]]** | CDPSnarf if a network sniffer exclusively written to extract information from CDP packets. It provides all the information a "show cdp neighbors detail" command would return on a Cisco router and even more. |
 +| **[[http://ucsniff.sourceforge.net/|UCSniff]]** | - is a nice tool developped as a PoC to demonstrate the risks of VoIP. It can be used to conduct audits or penetration tests on VoIP networks. --> more here: http://ucsniff.sourceforge.net/usage.html |
 | **[[http://w3.antd.nist.gov/tools/nistnet/index.html|NIST Net]]** | NIST Net is a network emulation package that runs on Linux. NIST Net allows a single Linux PC set up as a router to emulate a wide variety of network conditions. | | **[[http://w3.antd.nist.gov/tools/nistnet/index.html|NIST Net]]** | NIST Net is a network emulation package that runs on Linux. NIST Net allows a single Linux PC set up as a router to emulate a wide variety of network conditions. |
 | **[[http://code.google.com/p/dnsenum/|DNSenum - Domain Information Gathering Tool]]**|The first stage of penetration testing is usually passive information gathering and enumeration (active information gathering). This is where tools like dnsenum come in, the purpose of DNSenum is to gather as much information as possible about a domain.| | **[[http://code.google.com/p/dnsenum/|DNSenum - Domain Information Gathering Tool]]**|The first stage of penetration testing is usually passive information gathering and enumeration (active information gathering). This is where tools like dnsenum come in, the purpose of DNSenum is to gather as much information as possible about a domain.|
Line 41: Line 48:
 | **[[http://midnightresearch.com/local/packages/depant/depant-0.1a.tgz|Depant]]** | MRL has a new tool we’re releasing that will check your network for services with default passwords. The tool is called depant ((DE)fault (PA)ssword (N)etwork (T)ool).  more on: http://midnightresearch.com/pages/depant-your-network/ | | **[[http://midnightresearch.com/local/packages/depant/depant-0.1a.tgz|Depant]]** | MRL has a new tool we’re releasing that will check your network for services with default passwords. The tool is called depant ((DE)fault (PA)ssword (N)etwork (T)ool).  more on: http://midnightresearch.com/pages/depant-your-network/ |
 | **[[http://freeworld.thc.org/thc-hydra/|THC-Hydra]]** | A very fast network logon cracker which support many different services| | **[[http://freeworld.thc.org/thc-hydra/|THC-Hydra]]** | A very fast network logon cracker which support many different services|
 +| **[[http://www.nta-monitor.com/tools/ike-scan/|ike-scan]]** | ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPsec VPN servers. It is available for Linux, Unix, MacOS and Windows under the GPL license. |
  
  
networking.txt · Last modified: 2012/01/17 21:51 by greebo
CC Attribution-Share Alike 4.0 International
Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0 ipv6 ready