-->
Michael Webster

Pages

  • Hacks & Cracks
  • Cyberwar Tools
  • Avoid Flashdisk Virus
  • Decrypt MD5
  • Attack & Secure Net
  • DefaceWeb OpenCart
  • DefaceWeb fr. CKFinder
  • Analysis Malware Tools
  • TeraBIT Virus Maker

Cyberwar Tools

Essential equipment such as:
1. OPERATING SYSTEMSThe operating system is the most vital in the effort to cyberwar, as the initial foundation to launch cyber warfare.


Some of the following are the most used OS for cyberwar and penetration testing.

  1. BACKTRACK 5 R3
    At the operating system we already have some standard tools that are used for penetration testing and in it there were already Metasploit. This OS is suitable for cyber warfare.
  2. WINDOWS OS (XP/Vista/7/8)
    Os Windows is the most commonly used and is very useful to perform penetration testing, lack of windows is that we have to add the application to run a programming language tools such as python, ruby, perl, etc..
You can do a dual boot to the OS or can use a virtual machine such as VMware. Alternatively you can also use like, BlackBuntu, BlackOS, etc..2. HINTS & TUTORIAL HACKING, CRACKING, deface, ETC


Other alternatives can best be used:

  1. YOUTUBE & VIMEO
    Who is not familiar with YouTube and Vimeo, a site that provides videos, not to mention video tutorials about hacking, cracking, defacing, etc.. If do not know how to cyberwar, just look and see the video at this website. It is very much a video tutorial on this website.
    Website: www.youtube.com & www.vimeo.com
  2. SECURITY TUBE
    This site is a specific site that provides a whole collection of videos about security and hacking, ideal for learning hacking techniques, Exploiting, cracking, defacing, fuzzing, etc..
    Website: www.securitytube.net

3. VULNERABILITY INFORMATION 

In addition you have the exploit itself (undisclosed exploits) are not deployed, you can also use free vulnerability that has been published on the following websites to facilitate you in finding the weakness of the opponent.

Some of the websites that can be used are as follows:
  1. EXPLOIT DATABASE
    Exploit database is a continuation of milw0rm which collaborated with google hacking database (GHDB). On this website will be widely found in various weaknesses good website
    Website: www.exploit-db.com
  2. SECURITY FOCUS
    This site is about the same as Exploit-DB and is one of the team favorites binushacker in finding flaws, because security focus has been constructed for a long time. Here will be found the website of the weaknesses that have been long until the latest. It is suitable for doing testing in all aspects of weakness, especially web applications.
    Website: www.securityfocus.com

4. TOOLS, SCANNER & SEARCH ENGINE

Here are the most important this part of the equipment of war, a collection of tools for scanning, exploits and pawning.
And a set of tools commonly used are:
  1. SQL INJECTION TOOLS
    SQL Injection is a weakness of the most popular in the world of hacking especially in the form of a web application, which can be used on a variety of database engines. Adapaun tools are recommended- SQLMAP: an extremely powerful tool to perform automatic sql injection.

    - SQLCAKE: cool tools that are specifically designed to perform sql injection can be done manually and automatically.

    - WEBAPPEX: exploiter is a web application, in which use Havij as SQL injectionnya engine, very powerful and is one of the favorite tools.
  2. REMOTE SHELL TOOLS
    Remote shell tools is a must-to-have tools that can be used for exploitation, download and upload files. Execution commands both in linux, bsd, freebsd and windows.
  3.  - C100 SHELL: is a php-based exploitation tool with many functions in it for command execution, bypass, upload, download files, etc.. Used for * nix.

    - ASPYX SHELL: a tools-based exploitation aspx with a lot of functionality in it to execute commands, bypass, upload, download files, etc.. Used for * windows.

    - EFSO SHELL: is an ASP-based exploitation tools with many functions in it for command execution, bypass, upload, download files, etc.. Used for * windows.
  4. NETWORK DAN WEB APPLICATION SCANNER
    Network scanners are used to scan the target network, collecting data and information on the network that is used by the opponent. While Webscanner used to find opponent weaknesses of web-based applications.- NMAP: are the tools used to search and scan the network opponents.

    - WEBVULNSCAN: ma tool to search for flaws website.

    - RA2 BLACKBOX: a tool to scan for XSS flaws.
  5. DISTRIBUTED DENIA OF SERVICE (DDOS) TOOLS
    This tool is used to turn off the server while the technique membajiri website with requests to overload the website and can not be accessed. List DDOS tool as follows:
    - SLOWLORIS: ddos ​​tools made by Rsnake, very powerful to check IIS server and web applications, is still widely used.

    - HULK: ddos ​​tools to load the http request.

    - TOR HAMMER: tools ddos yang bisa dilakukan dengan menggunakan Tor application, terutama untuk server yang berbasis apache.

    - LOIC: DDOS tools most commonly used by Anonymous, please try.
        
    SEARCH ENGINE

  6. SEARCH ENGINE
    Search engine is the last tool that needs to be used to find the websites listed. Suppose you are looking for weaknesses Israel live website using keywords: *. Il (Israel):- Google: The most popular search engine today and a website no. One of the most visited in the world.
    Website: www.google.com
    - Yahoo!: a tool to search for flaws website.
    Website: www.yahoo.com
    - Bing: a tool to scan for XSS flaws.
    Website: www.bing.com
Furthermore, by knowing all the necessities of war, you have a good first step in preparation. Then the following is a guide that can be practiced step-by-step :

Well, the above is the tools and instructions needed to make war in the cyber world, then we leave it to you whether to use these tools or will use other tools that have been held at this time.

Thanks, Michael Webster
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Home
Subscribe to: Posts (Atom)
Welcome, Be Subscriber Please !

Date and Time

We are Anonymous

We are Anonymous
We are Anonymous
Knowledge is Free
We are Legion
We do not Forgive
We do not Forget
Except Us

Translate Google

Subscribe

Posts
Atom
Posts
All Comments
Atom
All Comments

Total Pageviews

Blue Fire Pointer

widget
Picture Window theme. Powered by Blogger.