Cybersecurity, Cyber, IT, news, computer, security, hacker, whitehat, blackhat, gray hat, education, penetration tester, information security, hacking, video, operating system, OS, google,googledork, VM, online safety, internet security research, article, ethical, elearning, security+, technology, google hacking, windows administrator, tools, free tools, networking resources, SMB,help, cyber-security

Tools - Penetration Testing

Penetration and Security Testing Tools

KMBL Security provides this reference page for security administrators to identify, learn, and defense against the tools being leveraged against their networks.  In some cases these tools have become scare to locate on the internet.  In most cases, these tools are no-cost implementations removing the bar for use.  KMBL Security is not responsible for how these tools are used by visitors.  Download these tools and use them at your own risk.   

Tool Classifications

Ophcrack Password CrackerThis tool is designed to perform first a dictionary attack on password hashes, then if that fails a brute force attack.  This tools is a modification on the older Lophcrack which is no longer open source and available.
 
File or Link Purpose
Linux Extploit Suggestor v2 This is an update raises the total number of suggested exploits possible to over 100+ and includes more kernel versions.  the online version link is listed on the home page.
Web Historian Internet History Documenter. Checks Cookies, histories, and other values and generates an Excel history for the targeted user. Good for general auditing of internet usage.
 
Hiren's Boot CD v 15.0
(Warning - 550MB File)
Tired of hassling with their download site, here is the complete ISO.  This utility is the Swiss Army Knife of PC repair.  Utilities include password resetting, disk repair, AV and Malware cleaning, and much more.  Warning - Using this disk on a system you do not own could get you thrown in Jail.  File is a zipped ISO image.  If you don't know how to burn an ISO, download Deep Burner in the Productivity Tools Section.  For instructions on how to burn the ISO to a USB Drive and autoboot.
  
Visual Route A Graphical display replacement for TRACERT.  This tools will aid in visualizing the route the packet hops are tacking.
 
NetMiner A graphical packet capturing tool that is less complicated to use than Ethereal (Wireshark).  Provides for image reassembly, packet capture, password capture, etc...  A very handy tool.
 
Directory Printer This utility will document every file is a given path.  It can can print the name of every file on a drive, along with the file's size, date and time of last modification, and attributes (Read-Only, Hidden, System and Archive)! And now, the list of files can be sorted by name, size, date created, date last modified, or date of last access.
 
Nessus Vulnerability Scanner This utility provide an extensive toolkit of penetration testing resources.  Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture.  The tool is free for Home use, providing the ability to scan a network (up to 16 IP addresses) .  Installation instruction can be found here as well as the advanced user guide.  A free Home use license key is required, which can be obtained here.
 
Paraben Email Scanner Forensically examine e-mail formats such as America Online (AOL), Outlook Exchange (PST), Eudora, and many others. E-mail Examiner quickly recovers deleted messages and folders. E-mail Examiner doesn't just recover e-mail in the deleted folders; it recovers e-mail deleted from deleted items (deleted/deleted).  This is a timed demo and expires in 30 days on install unless licenses.
 
Sawmill Log File Analyzer This application provide a trial option method to connect to and analyze over 800 different log file formats from a single console.  This application is trialware and expires after 30 days if not upgraded.
 
Systernals Process Monitor Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and non-destructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more.
 
Windump WinDump is the Windows version of tcpdump, the command line network analyzer for UNIX. WinDump is fully compatible with tcpdump and can be used to watch, diagnose and save to disk network traffic according to various complex rules. It can run under Windows 95, 98, ME, NT, 2000, XP, 2003 and Vista.
 
Eeye Retina Community Vulnerability Scanner A reduced client free version of the powerful Eeye Retina vulnerability scanner.  This is the hallmark scanner for deep vulnerability scanning of systems and used by vulnerability managers and security testers.  This requires the user to obtain a free community license key.
 
Grub4Dos GRUB for DOS is the dos extension of GRUB. It enables dos users to run the configuration console directly in real mode. The project also contains an utility called WINGRUB, an GUI intends to help configuring and installing GRUB in the WINDOWS environment
Creddump This program by Massimiliano Montoro dumps passwords from user's credential files and shows them in they're clear text form.  This tool works on Windows XP and Server 2003 instances.
NBTScan This is a command-line tool that scans for open NETBIOS name servers on a local or remote TCP/IP network, and this is a first step in finding of open shares. It is based on the functionality of the standard Windows tool nbtstat, but it operates on a range of addresses instead of just one. 
McAfee Site Digger v3 This tool searches Google’s cache to look for vulnerabilities, errors, configuration issues, proprietary information, and interesting security nuggets on web sites.
Device Manager Viewer (32bit) an alternative to the standard Device Manager of Windows, which displays all devices and their properties in flat table, instead of tree viewer. In addition to displaying the devices of your local computer, DevManView also allows you view the devices list of another computer on your network, as long as you have administrator access rights to this computer.
DevManView can also load the devices list from external instance of Windows and disable unwanted devices. This feature can be useful if you have Windows operating system with booting problems, and you want to disable the problematic device.
Common English Dictionary Words A massive listing of common English dictionary works for a password dictionary feeder list
Hotmail  Dump Dictionary Feeder This is a old password dump from Hotmail, people rarely change their habits... This will include many common passwords for inclusion in a fast password dictionary list.
Most Common 4-digit PIN Numbers From a university study of common ATM and VoIP pin numbers.  This dump is for 4-digit pins. 
Win Debugger for:  x86  x64 Microsoft Binaries for Memory artifact extraction (e.g. passwords, etc...)
ReconScan v3 modified Python script for enumeration of a host/hosts for interesting services ** Intended for Pentest Use only **