Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 32

Thread: Your favorite tools...

  1. #11
    Senior Member Thorn's Avatar
    Join Date
    Jan 2010
    Location
    The Green Dome
    Posts
    1,509

    Default

    Quote Originally Posted by ShadowKill View Post
    What, no 41? You know that the wood/metal saws and chisel are mandatory for 1337 status Thorn, cmon!
    Damn! I didn't know they have the 41 now... Your right, I'll have to save my pennies so I can 1337 again.
    Thorn
    Stop the TSA now! Boycott the airlines.

  2. #12
    Member
    Join Date
    Aug 2007
    Posts
    468

    Default

    Hey Thorn,

    I've been looking at getting one of these or a similar clone, but are you able to get "security torx" for it since it does not take standard size bit's?

    Quote Originally Posted by Thorn View Post
    It's probably not what you really have in mind, but my absolute favorite tool is my Swiss Army Knife (Victorinox) Cybertool 34. Seriously.

    That thing gets way more use (gaining physical access) than any other software or hardware tool,

  3. #13
    Senior Member Thorn's Avatar
    Join Date
    Jan 2010
    Location
    The Green Dome
    Posts
    1,509

    Default

    Quote Originally Posted by BOFH139 View Post
    Hey Thorn,

    I've been looking at getting one of these or a similar clone, but are you able to get "security torx" for it since it does not take standard size bit's?
    They (Swiss Army Knives) have extra bits that you can buy, although I've never bought anything but replacements, so I don't know if they have Security Torx. I keep a set of Security Torx bits in my toolkit, but I have needed them exactly once in the last eight years.
    Thorn
    Stop the TSA now! Boycott the airlines.

  4. #14
    Just burned his ISO
    Join Date
    Jan 2008
    Posts
    9

    Default

    Glad to see others use Maltego here

    My two most commonly used tools are nmap and netcat. Netcat for pure versatility and nmap because it has just continued to evolve into much more than just a portscanner, big credit to Fyodor

  5. #15
    Member PeppersGhost's Avatar
    Join Date
    Jan 2008
    Posts
    204

    Default

    I still love nbtscan!!!! And Sam Spade. I cant help it.
    <EeePc 1000HA BT4/W7 USB boot Alfa500 GPS BlueTooth>

  6. #16
    Good friend of the forums williamc's Avatar
    Join Date
    Feb 2010
    Location
    Chico CA
    Posts
    285

    Default

    These are the ones I use the most:
    nmap - discovery
    nessus
    nsat - intranet (x11, ftp, snmp, nfs)
    xspy - x11 exploitation (port 6000)
    metagoofil - discovery (phishing)
    airodump - wireless exploitation
    kismet - wireless discovery
    sqlping - sql brute forcing (SA account)
    oscanner - oracle discovery
    asleap - LEAP exploitation
    john - cracking LEAP
    dnsenum - discovery


    Those are the most common. Depending on the job, there are many more that come in handy, hydra, medusa, etc.

    William

  7. #17
    My life is this forum Barry's Avatar
    Join Date
    Jan 2010
    Posts
    3,817

    Default

    Quote Originally Posted by BOFH139 View Post
    Hey Thorn,

    I've been looking at getting one of these or a similar clone, but are you able to get "security torx" for it since it does not take standard size bit's?
    Heh, we had a bunch of cisco bridges that used the security torx screws. A flat tipped (standard) screwdriver will make them "normal" torx screws.
    Of course, if you really wanted to have some fun, go to Wal-Mart late at night and ask the greeter if they could help you find trashbags, roll of carpet, rope, quicklime, clorox and a shovel. See if they give you any strange looks. --Streaker69

  8. #18
    Just burned his ISO
    Join Date
    Oct 2006
    Posts
    2

    Thumbs up SQL Injection

    SQLiX & SQLmap

  9. #19
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by Barry View Post
    Heh, we had a bunch of cisco bridges that used the security torx screws. A flat tipped (standard) screwdriver will make them "normal" torx screws.
    I have a 9.2v very small and slow drill, but it has lots of torque. Very good for defeating any screw. If you can't turn it out, drill it out.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  10. #20
    Just burned his ISO
    Join Date
    Aug 2007
    Posts
    12

    Smile

    these are the steps i use before starting a pentest

    1) scan - nmap (usually the -sS and -O options )
    2) verify ports by searching - nc all the ports to see outcome
    3) scan web server - if http server is available with nikto
    4) exploit a vulnerable port or service - by using metasploit framework or the milw0rm library .


    and i use all these steps from a proxy machine make it funnnnnnneeerrrrrr

Page 2 of 4 FirstFirst 1234 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •