1. OPERATING SYSTEMSThe operating system is the most vital in the effort to cyberwar, as the initial foundation to launch cyber warfare.

Some of the following are the most used OS for cyberwar and penetration testing.
- BACKTRACK 5 R3
At the operating system we already have some standard tools that are used for penetration testing and in it there were already Metasploit. This OS is suitable for cyber warfare.
- WINDOWS OS (XP/Vista/7/8)
Os Windows is the most commonly used and is very useful to perform penetration testing, lack of windows is that we have to add the application to run a programming language tools such as python, ruby, perl, etc..

Other alternatives can best be used:
- YOUTUBE & VIMEO
Who is not familiar with YouTube and Vimeo, a site that provides videos, not to mention video tutorials about hacking, cracking, defacing, etc.. If do not know how to cyberwar, just look and see the video at this website. It is very much a video tutorial on this website.
Website: www.youtube.com & www.vimeo.com - SECURITY TUBE
This site is a specific site that provides a whole collection of videos about security and hacking, ideal for learning hacking techniques, Exploiting, cracking, defacing, fuzzing, etc..
Website: www.securitytube.net
3. VULNERABILITY INFORMATION
In addition you have the exploit itself (undisclosed exploits) are not deployed, you can also use free vulnerability that has been published on the following websites to facilitate you in finding the weakness of the opponent.

- EXPLOIT DATABASE
Exploit database is a continuation of milw0rm which collaborated with google hacking database (GHDB). On this website will be widely found in various weaknesses good website
Website: www.exploit-db.com - SECURITY FOCUS
This site is about the same as Exploit-DB and is one of the team favorites binushacker in finding flaws, because security focus has been constructed for a long time. Here will be found the website of the weaknesses that have been long until the latest. It is suitable for doing testing in all aspects of weakness, especially web applications.
Website: www.securityfocus.com
4. TOOLS, SCANNER & SEARCH ENGINE
Here are the most important this part of the equipment of war, a collection of tools for scanning, exploits and pawning.
- SQL INJECTION TOOLS
SQL Injection is a weakness of the most popular in the world of hacking especially in the form of a web application, which can be used on a variety of database engines. Adapaun tools are recommended- SQLMAP: an extremely powerful tool to perform automatic sql injection.
- SQLCAKE: cool tools that are specifically designed to perform sql injection can be done manually and automatically.
- WEBAPPEX: exploiter is a web application, in which use Havij as SQL injectionnya engine, very powerful and is one of the favorite tools.
- REMOTE SHELL TOOLS
Remote shell tools is a must-to-have tools that can be used for exploitation, download and upload files. Execution commands both in linux, bsd, freebsd and windows. - - C100 SHELL:
is a php-based exploitation tool with many functions in it for command execution, bypass, upload, download files, etc.. Used for * nix.
- ASPYX SHELL: a tools-based exploitation aspx with a lot of functionality in it to execute commands, bypass, upload, download files, etc.. Used for * windows.
- EFSO SHELL: is an ASP-based exploitation tools with many functions in it for command execution, bypass, upload, download files, etc.. Used for * windows.
- NETWORK DAN WEB APPLICATION SCANNER
Network scanners are used to scan the target network, collecting data and information on the network that is used by the opponent. While Webscanner used to find opponent weaknesses of web-based applications.- NMAP: are the tools used to search and scan the network opponents.
- WEBVULNSCAN: ma tool to search for flaws website.
- RA2 BLACKBOX: a tool to scan for XSS flaws.
- DISTRIBUTED DENIA OF SERVICE (DDOS) TOOLS
This tool is used to turn off the server while the technique membajiri website with requests to overload the website and can not be accessed. List DDOS tool as follows:
- SLOWLORIS: ddos tools made by Rsnake, very powerful to check IIS server and web applications, is still widely used.
- HULK: ddos tools to load the http request.
- TOR HAMMER: tools ddos yang bisa dilakukan dengan menggunakan Tor application, terutama untuk server yang berbasis apache.
- LOIC: DDOS tools most commonly used by Anonymous, please try.
SEARCH ENGINE
- SEARCH ENGINE
Search engine is the last tool that needs to be used to find the websites listed. Suppose you are looking for weaknesses Israel live website using keywords: *. Il (Israel):- Google: The most popular search engine today and a website no. One of the most visited in the world.
Website: www.google.com
- Yahoo!: a tool to search for flaws website.
Website: www.yahoo.com
- Bing: a tool to scan for XSS flaws.
Website: www.bing.com

Well, the above is the tools and instructions needed to make war in the cyber world, then we leave it to you whether to use these tools or will use other tools that have been held at this time.
Thanks, Michael Webster
No comments:
Post a Comment