Ethical Hacking and Attack Tools

Links from the class materials and other supplemental information, grouped by chapter:

Class files for labs



Chapter 1: Introduction



Chapter 2: Ethical hacking introduction

Links from the text:



Chapter 3: Intelligence about the target

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

EvolutionGUI-beta2-nix.tgz
EvolutionGUI-beta2-win.zip



Chapter 4: Network mapping

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

hping3-20051105.tar.gz
tcptraceroute-1.5beta7.tar.gz
trout.zip
nmap-4.53-1.i386.rpm
nmap-4.53-setup.exe
zenmap-4.53-1.noarch.rpm



Chapter 5: Host mapping

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

winfingerprint-0.6.2.zip
xprobe2-0.3.tar.gz
p0f.tgz



Chapter 6: SNMP mapping

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

snmpcheck-1.6



Chapter 7: Network Monitoring and Eavesdropping

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

dsniff-2.3.tar.gz
etherflood.zip
ettercap-NG-0.7.3.tar.gz
warpwatch.zip (WinARPWatch)
putty-0.60-installer.exe (PUTTY, a ssh for Windows)

The following two programs are unsupported by Netscape after March 1, 2008 and may contain serious serurity bugs. Only install them for use locally.
netscape-navigator-9.0.0.5.exe
netscape-navigator-9.0.0.5.tar.gz



Chapter 8: Attacking the network protocols

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

SYN flood attack tools (from http://www.niksula.cs.hut.fi/~dforsber/synflood/):
SYNpacket.tgz
clog-0.0.2.tgz
synk4.c
tocsin.tgz
neptune.c

Other tools:
hping3-20051105.tar.gz udpflood.zip
fudp-0.1.tar.gz

These TCP session hijack and reset tools did not work for me, but might still be interesting:
path.tgz
hunt-1.5.tgz
juggernaut.tar.gz



Chapter 9: Network traffic injection

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

scapy.py
nemesis-1.4.tar.gz
nemesis-1.4.tar.gz.asc
nemesis-1.4.zip
nemesis-1.4.zip.asc
libnet-1.0.2a.tar.gz
fraggle.c



Chapter 10: Reverse Engineering

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

idademo51.exe



Chapter 11: Black-box Testing

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Peach-1.0.zip



Chapter 12: How HTTP works

Links from the text:



Chapter 13: Attacking Web Applications

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

nikto-2.02.tar.gz
web-developer-1.1.6.xpi
burpsuite_v1.1.zip
paros-3.2.13-unix.zip
paros-3.2.13-win.dat
paros-3.2.13-win.exe
paros-3.2.13-src.zip
paros_user_guide.pdf
WebGoat-OWASP_Standard-5.1.zip (for Linux and Windows)
webgoat-5.1.sh (startup file for Linux)
webscarab-installer-20070504-1631.jar
webscarab-selfcontained-20070504-1631.jar
webscarab-src-20070504-1631.zip
switchproxy_tool-1.4.1-fx+mz+tb.xpi
tamper_data-10.0.4-fx.xpi



Chapter 14: State and the web

Links from the text:



Chapter 15: Other Injection attacks

Links from the text:



Chapter 16: Cross-site scripting (XSS)

Links from the text:



Chapter 17: Buffer overflow introduction

Links from the text:



Chapter 18: Stack overflows

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Applying `design by contract' by Meyer, B., from IEEE Computer v 25 n 10, pp 40--51.



Chapter 19: Format string errors

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

pscan-1.2-1.fc4.i386.rpm
rats-2.1-win32.zip
rats-2.1.tar.gz



Chapter 20: Pointer issues

Links from the text:



Chapter 21: Vulnerability analysis

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Nessus-3.0.4-es4.i386.rpm
Nessus-3.0.4-fc4.i386.rpm
Nessus-3.0.4-suse10.0.i586.rpm
Nessus-3.0.6.1.exe
Nessus-3.0.6-es5.i386.rpm
Nessus-3.0.6-suse10.0.i586.rpm
NessusClient-3.0.1-es5.i386.rpm
NessusClient-3.0.1-suse10.2.i586.rpm
NessusClient-3.0.1-win.msi



Chapter 22: Metasploit

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

metasploit_developers_guide.pdf
metasploit_user_guide.pdf
framework-3.0.tar.gz



Chapter 23: Cryptography Overview

Links from the text:



Chapter 24: Debugging with gdb

Links from the text:



SkillBridge Training

Examples from the class notes (or, all as one file).

Selected Solutions from the class notes (no looking until you have solved the problems!). Note that all solutions are in an appendix of your course book. All solutions in a compressed tar file.


Evaluation form (if needed)