------------------BACK TRACK 5 R3 GENERAL REVIEW------------------

*information Gathering:
A perfect tool to networking analysis, WLAN Analysis, Bluetooth, DNS, host analysis, network scaners, network trafic to made a vulnerabilities in this area.
*Vulnerability Assessment:
To check the open ports to find vulnerabilities, to open packages, and you can check a vulnerabilitie data base, and find shells ,you can do this whit (Cisco tools, Net fuzers, Open source Assessment, VOIP fuzer, vulnerability scaner ).
*Explotation Tools:
like his name says this tools works to find some bugs in network devices to explot then, whit your own objetives and purpouses.
*Privilege Escalation:
With this tool you can make a password attack redirecting the network trafic to your own computer, with the purpouse to obtain privileges up, all this whit snifers like ettercap, wireshark, and spoofing apps
*Maintaining Access:
It is to maintain the access whit back doors to evade a detection when you can save some privileges in a network server or another host.
*Reverse Engineering:
This apps can help you to open an instalation package like .exe, msi, msp, jar, nds, n64, etc. and check his code to see how works to you own purpouse
*RFID Tools:
With this radio frecuency identification you can make an analisys for this personal chips.
*Stress Testing
To attack servers speciali with DoS purpouse.
*Forencics:
Specially to encrypt your HD or find lose files and make a network analisys and save a RAM log
*Reporting Tools:
To make a report of an analisys
*Services:
Works to run Daemons of some servers.
*Miscelaneous:
This option has some network apps (Clients, networ and web).
------------------ARP SPOOFING OR ARP POISON ROUTING------------------
*Concept:
This type of attack can help you to be an intermediate in a network to see the trafic, change the trafic or stop the trafic DoS with some clicks, yhe packages to make the connection can be sended like a broadcast packages this type of packages can run in to the WLAN or LAN without previous identification and once inside the package can poison the traffic route.
*Personal point of view:
------------------DNS SPOOFING------------------
*Concept:
In this attak you can make a fake web server and you can redirect the trafic for this page to you server with the bjective to
*Personal point of view:
------------------CONCLUSION------------------
No hay comentarios:
Publicar un comentario