Hi,
You will have an issue with Ethereal for sure. nmap, tcpdump are ok.
The rootkit is also ok though I am not too sure how you will use it. I
am not sure about some of the others. Plus, do you have linux access?
Some of the tools are linux based.


On 6/18/07, Chaodhari, Sanjeev IN BOM SISL
<[EMAIL PROTECTED]> wrote:
> Dear member's
> hi
> sorry for the late reply but I was in process of getting information
> for those who are interested in ethical hacking they conduct the corse each
> month that to only on weekands.
> Dear pranav
> I have got list of tools that we are going to widely use Apart from this, we
> may also use some additional tools if needed
> It was originally in excel format, but anyway I am pasting it. Please send
> your comments.
>
>               
>       CHECK LIST      
> Module        Module and Sub-Topic    
>               
>               
> 2     Footprinting    
>               
>          Nslookup     
> 3     Scanning        
>               
>             Nmap      
>           Nessus      
>           FriendlyPinger      
> 4       Enumeration   
>       DumpSec 
>        NAT    
>       Solarwinds
>       GetAcct
> 5     System Hacking
>           Hacking Tool: Lophtcrack
>       Pwdump3
>        SMB Die
>        GetAdmin
>       Image Hide
>        Snow.exe
>         Evidence Eliminator
>       FU RootKit
>       
>       
> 6     Trojans and Backdoors
>         Netcat
>       fPort
>       Elitewrap
> 7     Sniffers
>           Ethereal
>       Snort
>            Cain& Abel
>       
> 10    Session Hijacking
>                T-Sight
>       
>       
>       
>       
> 11    Hacking Web Servers
>        IISHack.exe
>            Network Tool: Log Analyzer
>            Hacking Tool: CleanIISLog
>         Network Tool: Shadow Security Scanner
> 21    Web Application Vulnerabilities
>                 instant source
>                BlackWidow
> 13             Web-Based Password Cracking Techniques
>              Brutus
>           SnadBoy
> 14    SQL Injection
>                     SQLExec
>                  SQL2.exe
> 18          Linux Hacking
>       Browsing tools present in Backtrack
>       
> Thanks.
> When you don't have any choice, you have a choice to work hard.
> Sanjeev
> Email: [EMAIL PROTECTED]
>  Or [EMAIL PROTECTED]
> Space: http://daarshnicsanjeev/spaces/live.com
>  Call: +919820637390
> Direct office: +9102267572118
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Pranav Lal
> Sent: Saturday, June 02, 2007 6:26 AM
> To: [email protected]
> Subject: Re: [AI] experience in ethical hacking
>
> Hi,
>
> Could you tell me what tools you would be using?  I am working as an
> information security consultant so, have had experience of a significant
> number of tools.
>
> Pranav
>
>
> To unsubscribe send a message to [EMAIL PROTECTED] with
> the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, please
> visit the list home page at
>   http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>
> To unsubscribe send a message to [EMAIL PROTECTED] with
> the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, please
> visit the list home page at
>   http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>

To unsubscribe send a message to [EMAIL PROTECTED] with the subject unsubscribe.

To change your subscription to digest mode or make any other changes, please 
visit the list home page at
  http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in

Reply via email to