Скачиваний:
57
Добавлен:
15.03.2015
Размер:
5.14 Mб
Скачать

hopefully, when you look back over several years, you can say, “Wow what a journey!” Remember not to get overwhelmed—the more knowledge you have, the better off you are.

Good luck and Godspeed with your journey through the ever-changing and wild world of network security.

Appendix A. References

This appendix lists several URLs that contain useful information on hacking and network security. It will also list information on newsgroup mailing lists and various aspects of security

Hacker/Security Related URLs

These sites and information are listed for reference purposes only and the tools should be used at your own risk. One word of caution: Some of these sites contain information that could be offensive.

2600.com

A hacker magazine that gives a good perspective of the hacker mindset.

allhack.com

This Web site features a library and download area. Library features readmes on hacking and learning computer basics for the beginner. Download area contains everything from scanners to flooders to crackers to denial of service (DoS) attacks.

Alw.nih.gov

Security directory that contains a large amount of security tools.

Hackers Beware “ New Riders Publishing

800

anticode.com

Exploits, DoS attacks, key loggers, mail bombs, mirc scripts, scanners, sniffers, password crackers, trojans, and so on. This site is well maintained and updated often.

auscert.org.au

Australian computer emergency response team that contains a lot of information on exploits and how they work.

Astalavista.com

A great search engine for hacker tools and exploits.

bugtraq.com

A database of useful information on security and exploits.

CERIAS.CS.PURDUE.EDU

This site contains a large amount of information and tools on network security—used to be called coast.

Cert.org

Computer emergency response team’s web site run out of Carnegie Mellon University. It contains useful information on attacks and how to protect against them.

CIAC.LLNL.GOV

A site that contains virus information, up-to-date bulletins, mailing lists, security resources, tools, and operating systems. This is a white hat site, especially considering the government runs it.

cultdeadcow.com

Home page for a hacking group, features their program Back Orifice, which is a remote administrative tool.

ftp.cert.dfn.de

FTP site with tools, cryptography, dictionaries, viruses, and so on.

Hackers Beware “ New Riders Publishing

801

deny.de

Web page full of hacking utilities, texts, scripts, and programs. This page has many resources and some information for beginners.

elitehackers.com

Message board with knowledgeable hackers—very useful for finding out the latest known exploits and getting advice.

ENSLAVER.COM

Exploits and scripts all listed on FTP site.

firosoft.com/security/philez

Features exploits, tools, and text files, split into directories labeled as such; categories are labeled according to operating system.

First.org

Organization of incident response teams.

ftp.nec.com

Contains a large repository of tools in the /pub/security directory.

ftp.porcupine.org

Lots of security tools, unlabeled and unsorted.

ftp.win.tue.nl

The /pub/security directory contains a large repository of security tools.

geek-speak.net

A site dedicated largely to whitepapers on different computer security topics. Allows you to search the site for what you are looking for.

hack.co.za

Tons of exploits placed under categories by operating system or exploit type. Constantly updated with latest exploits.

Hackers Beware “ New Riders Publishing

802

Hackernews.com

Daily news about the hacker community.

hackersclub.com

Enormous amount of resources and text files from as far back as 1998, but still kept up-to-date. File area is dedicated to operating systems and types (hacking, cracking, phreaking, and wordlists).

infosyssec.net

Plenty of news resources from viruses to exploits to overall security. There is a search engine for virus, security, and anti-virus products. Includes tons of other search engines—too many to list.

infowar.co.uk

This Web site is dedicated to articles, advisories, and tools.

insecure.org

News, exploits (Win, Linux, Solaris, and so on), security tools, and whitepapers, updated regularly.

L0pht.com

Contains a great deal of useful tools and papers on network security and hacking.

net.tamu.edu

Security tools located in http://net.tamu.edu/network/public.html.

neworder.box.sk

A well maintained site featuring all sorts of computer hacking programs subdivided by area—phreaking, cryptography, operating system, and so on. The searchable database for exploits is constantly updated.

ntobjectives.com

Security tools oriented site with several products for free download.

Hackers Beware “ New Riders Publishing

803

packetstorm.securify.com

News/exploit site with constantly updated database of exploits. Comes with explanation as well as actual exploit. Searchable database of papers, exploits, and so on.

Phrack.com

An online network security magazine that contains a lot of useful information.

porcupine.org

Tools and papers on auditing the security of a network.

rogenic.com

Very large and frequently updated site with loads of exploits.

rootshell.com

This site features custom made exploits on different systems. The site researches and implements many different exploits. There is also a searchable database and documentation.

SANS.ORG

The SANS Institute home page contains a lot of information on security conferences and certification, and the Global Incident Analysis Center (GIAC) offers a lot of information on exploits and what can be done to prevent against them. It also has an excellent security poster that it updates each year.

securiteam.com

Web site featuring news articles regarding security-related issues. Lists exploits and tools as well of all sorts of different software. Tools include scanners, operating system detects, and DoS tools.

Securityfocus.com

Home of BugTraq and other useful information on exploits.

Securitysearch.net

Useful security portal.

Hackers Beware “ New Riders Publishing

804

Sysinternals.com

Contains a large repository of tools.

technotronic.com

Contains a large archive on security vulnerabilities and exploits.

torus.ndirect.co.uk

Multiple resource hacking site with information on hacking, encryption, viruses, and even papers.

ussrback.com

Self-discovering exploit site. Offers p-to-date exploits, advisories, library, and cryptography.

warmaster.de

Exploits and hacks divided by operating system. Features text files and interviews. This site has a large selection, some obsolete.

whitehats.com

Contains a large repository of hacking tools.

Wiretrip.net/rfp

Rainforest puppy’s web site that contains CGI vulnerability information and NT exploits.

www-arc.com

System and network scanners available for download. Exploit bulletin board.

xforce.iss.net

Home of security program for ISS offers security alerts, bulletins, mailing lists, and so on.

Hacker/Security Tools

Here are some great tools for the security professional who wants to learn how hackers do it:

Hackers Beware “ New Riders Publishing

805

Achilles. Used to edit http sessions: http://www.digizensecurity.com

Adore. Kernel level rootkit: http://packetstorm.securify.com/UNIX/penetration/rootkits

Back Orifice 2000. Back-door program for Windows: http://www.bo2k.com

Cheops. Network mapping tool: http://www.marko.net/cheops/

Covert TCP. Hides data in the TCP protocol: http://packetstorm.securify.com

CPU Hog. DOS attack: http://206.170.197.5/hacking/DENIALOFSERVICE/

Crack. Password cracker for UNIX: ftp://cerias.cs.purdue.edu/pub/tools/unix/crack

Dsniff. Advanced sniffer program: http://www.monkey.org/~dugsong/dsniff

Dumpsec. Extracts information from NT null sessions: http://www.systemtools.com/somarsoft

Enum. Extracts information from NT null sessions: http://razor.bindview.com

Firewalk. Determines a firewall ruleset: http:// packetstorm.securify.com/UNIX/audit/firewalk

Fragrouter. Used to fragment packets: http://www.anzen.com/research/nidsbench

Getadmin. Privilege escalation for NT: http://www.infowar.co.uk/mnemonix/utils.htm

Hunt. Session hijacking tool: http://www.cri.cz/kra/index.html

IIS Unicode Exploit. Exploits an IIS server: http://www.wiretrip.net/rfp/p/doc.asp?id=57&face=2

Imap Buffer Overflow. Buffer overflow for UNIX: http://packetstorm.securify.com

IP Watcher. Commercial session hijacking tool: http://www.engarde.com

ITS4. Security reviewer: http://www.cigital.com/its4/

Jizz. DNS cache poisoning tool: http://www.rootshell.com

John the Ripper. Password cracker: http://www.openwall.com/john

Jolt2. Denial of Service tool: http://razor.bindview.com

Juggernaut. Session hijacking tool: http://www.rootshell.com

Knark. Kernel level rootkit: http://packetstorm.securify.com/UNIX/penetration/rootkits

Land. Denial of Service attack: http://packetstorm.securify.com/9901-exploits/eugenics.pl

Loki. Covert channel for creating a back door: http://www.phrack.com/Archives/phrack51.tgz

L0phtcrack. Password cracker: http://www.l0pht.com

Lrk5. Rootkit: http://packetstorm.securify.com/UNIX/penetration/rootkits

Hackers Beware “ New Riders Publishing

806

Nessus. Free vulnerability scanner: http://www.nessus.org

NetBus. Back-door program for Windows: http://www.netbus.org

Netcat. Swiss army knife of security tools: http://www.l0pht.com/

NetMeeting Buffer Overflow. Buffer overflow: http://packetstorm.securify.com/9905exploits/microsoft.netmeeting.txt

Nmap. Port scanner: http://www.insecure.org/nmap

NT Rootkit. Rootkit for NT: http://www.rootkit.com

Ping of Death. Denial of Service attack: http://packetstorm.securify.com/9901-exploits/eugenics.pl

Queso. Operating system fingerprinting tool: http://www.apostols.org/projectz/queso

RDS Exploit. IIS exploit: http://www.wiretrip.net/rfp/p/doc.asp?id=1&iface=2

RedButton. NT exploit: http://packetstorm.securify.com/NT/audit/redbutton.nt.weakness.sh ower.zip

Redir. Packet redirector: http://oh.verio.com/~sammy/hacks

Reverse WWW shell. Back-door program: http://r3wt.base.org

Rstatd exploit. Buffer overflow: http://packetstorm.securify.com/0008-exploits/rpc.statd.x86.c

Rootkits. Rootkits for UNIX: http://packetstorm.securify.com/UNIX/penetration/rootkits

Sam Spade. General tool for Windows: http://www.samspade.org

Sechole. Privilege escalation exploit: http://www.ntshop.net

Smurf. Denial of Service exploit: http://packetstorm.securify.com/new-exploits/papasmurf.c

Sniffit. Sniffer: http://reptile.rug.ac.be/~coder/sniffit/sniffit.html

Snort. Sniffer IDS: http://www.clark.net/~roesch/security.html

Solaris LKM Rootkit. Back-door program: http://thc.inferno.tusculum.edu/files/thc/slkm-1.0.html

SSPing. Denial of Service exploit: http://packetstorm.securify.com/9901-exploits/eugenics.pl

SYN Flood. Denial of Service exploit: http://packetstorm.securify.com/spoof/unix-spoof-code/synk4.zip

Targa. Tool for running multiple Denial of Service exploits: http://packetstorm.securify.com

TBA. War dialer for Palm Pilots: http://www.l0pht.com/~kingpin/pilot.html

THC Scan. War dialer: http://thc.inferno.tusculum.edu

Tini. Backdoor for NT: http://ntsecurity.nu/toolbox/tini

ToolTalk Buffer Overflow. Buffer overflow: http://www.securityfocus.com

TFN2K. Distributed Denial of Service attack tool: http://packetstorm.securify.com/distributed/

Trinoo. Distributed denial of service attack tool: http://packetstorm.securify.com/distributed/

Hackers Beware “ New Riders Publishing

807

TTY Watcher. Session hijacking tool: ftp://coast.cs.purdue.edu/pub/tools/unix/ttywatcher

Whisker. CGI vulnerability scanner: http://www.wiretrip.net/rfp

WinDump. Sniffer for Windows: http://netgroupserv.polito.it/windump/

WinNuke. Denial of Service exploit: http://www.anticode.com

WinZapper. Log cleaner for NT: http://ntsecurity.nu/toolbox/winzapper

General Security Related Sites

This section will cover sites that contain general security information. It's broken down by type of information like newsgroups, mailing lists, or web sites.

Sites and Newsgroups of Interest

This section lists sites that contain security information in a particular area and also lists newsgroups on various areas of security.

http://www.ciac.org/ciac/CIACHome.html

http://home.cyberarmy.com/fuzion/index.html

http://www.cynet1.com/blindsight/

http://members.aol.com/madzombie/

http://www.tower.net.au/~hellfire/RTFM/rtfm.html

http://skynet.ul.ie/~flynng/security/

http://www.escape.com/~samk/

http://www.rhino9.org

http://www.io.com/~ritter/NETLINKS.HTM#CryptoDesigns

http://www.io.com/~ritter/NETLINKS.HTM

http://www.ftech.net/~monark/crypto/

http://www.guninski.com/

http://page.to/hackzone

http://icat.nist.gov/icat.taf

http://www.snort.org

http://www.techbroker.com/happyhacker.html

http://www.rootshell.com

http://www.genocide2600.com

http://visigoth.isCool.net

http://www.unitedcouncil.org

http://www.infowar.com

http://www.phrack.com

http://www.cybercom.com/~bsamedi/hack.html

http://www.hackers.com

http://www.thtj.com

http://sun.soci.niu.edu/~cudigest

http://www3.l0pht.com/~oblivion/blackcrawlarch.html

Hackers Beware “ New Riders Publishing

808

http://www.2600.com

http://www.mit.edu/hacker/hacker.html

http://www.krew.org/H.html

http://www.arts.unimelb.edu.au/Dept/Crim/Hack/pap.htm

http://www.l0pht.com

http://www.thecodex.com/hacking.html

ftp://ds.internic.net/rfc/

http://www.sysone.demon.co.uk/

http://www.con.wesleyan.edu/~triemer/network/docservs.html

http://www.jabukie.com/Hacking.html

http://www.txdirect.net/users/wall/cgisec.htm

http://www.antionline.com/archives/windows/passwdcrack/

ftp://ftp.ox.ac.uk/pub/wordlists/

http://www.7thsphere.com/hpvac/index.html

http://www.inil.com/users/doug/hold.htm

http://www2.fwi.com/~rook/

http://www.pagewerx.com.au/nitroland/

http://easyweb.easynet.co.uk/~davegraham/ukarena/ukarena.htm

http://www.phreak.co.uk/datathief/home.html

http://www.feist.com/~tqdb/

http://www.hfactorx.org/

http://www.lordsomer.com/

http://main.succeed.net/~kill9/hack/

http://www.xmission.com/~ryder/hack.html

http://www.clark.net/pub/srokicki/linux/

http://www.hfactorx.org:80/user_pages/syntaxerror/

http://l0pht.com/~weld/index.html

http://www.sonic.net/~group42/

http://loa.ml.org

http://thepsyko.home.ml.org

http://prozac.iscool.net

http://www.legions.org

http://www.cotse.com

http://www.nmrc.org

Mailing Lists

Mailing lists are a great way to keep up on the wide range of security information that is constantly being discovered. You can subscribe to a mailing list and automatically receive information when it is generated.

http://www.ntsecurity.net/. Subscribe to the NTSecurity list with the online sign-up page.

Alert. Send an email to mailto:request-alert@iss.net with

Subscribe alert in the body of the message.

BugTraq. Send an email to mailto:LISTERV@NETSPACE.ORG with

SUBSCRIBE BUGTRAQ in the body of the message.

Hackers Beware “ New Riders Publishing

809