Hiển thị các bài đăng có nhãn hacker os. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn hacker os. Hiển thị tất cả bài đăng

Thứ Ba, 3 tháng 2, 2015

Fedora Security Spin

The Fedora Security Lab Test (Fedora Security Spin) is a distro designed for security auditing and testing and which can also be used for teaching security methodologies.
According to the developers, the purpose of this Linux is to support students and teachers with Linux-based servers and services while they are learning and practicing principles and methodologies of information security, web app security, reconnaissance, network and intrusion analysis, network statistics, forensics, and remediation lessons.
The Fedora Spin distro is maintained by a community of security testers and developers and ships with the ever-popular snappy LXDE Desktop Environment and a customized menu that provides all the tools that are required to manage and execute security testing.

Vital Statistics
  •  OS Type: Linux
  •  Based on: Independent
  •  Origin: USA
  •  Architecture: i386, x86_64
  •  Desktop: XFCE




WEAKERTH4N Linux

Weakerth4n has a very well maintained website and a devoted community. Built from Debian Squeeze (Fluxbox within a desktop environment) this operating system is particularly suited for WiFi hacking as it contains plenty of Wireless cracking and hacking tools.
Tools includes: Wifi attacks, SQL Hacking, Cisco Exploitation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering, Information Gathering, Fuzzing Android Hacking, Networking and creating Shells.

Vital Statistics
  •  OS Type: Linux
  •  Based on: Debian
  •  Origin: USA
  •  Architecture: i386, x86_64
  •  Desktop: Fluxbox








Matriux


Matriux is a fully featured security distribution, based on Ubuntu. It consists of powerful, free and open source computer forensics and data recovery tools which can be used for forensics analysis and investigation purposes. Apart from forensics usages Matriux also provides a wide platform to let security professionals utilize the power of open source to perform day-to-day web application penetration testing and server hardening tasks. Matriux is lite and designed to run from a CD / DVD or USB stick or it can easily be installed to your hard disk in a few steps in no time.

Vital Statistics
  •  OS Type: Linux
  •  Based on: Debian
  •  Origin: India
  •  Architecture: i386
  •  Desktop: GNOME




CAINE Forensic


Similar to BackBox, this is also an Italian based distro led NanniBassetti by @NanniBassetti
CAINE stands for (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics. CAINE has a specific focus on digital forensics, so if this is your area the this distro is highly recommended.
CAINE is configured to help the security expert (digital forensics expert) to exercise the various phases of a digital investigation. A great feature of CAINE is that it includes a semi-automated compilation of a final report, i.e. an audit. Since most security professionals hate doing audit reports this is really a great feature!
CAINE is completely open source and even has a Windows version called Wintaylor.

Vital Statistics
  •  OS Type: Linux
  •  Based on: Debian, Ubuntu
  •  Origin: Italy
  •  Architecture: i386, x86_64
  •  Desktop: XFCE






STD - security tools distribution

STD is a Linux-based Security Tool. Actually, it is a collection of hundreds if not thousands of open source security tools. It's a Live Linux Distro, which means it runs from a bootable CD in memory without changing the native operating system of the host computer. Its sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can.






ArchAssault


The ArchAssault Project is an Arch Linux spinoff that is aimed, like all other distros on our Concise Courses Linux Hacking Distro section, aimed at penetration testers (ethical hackers) and security professionals. Obviously, the benefit here is that those amongst you that like using Arch Linux, and work (or have an interest) in cybersecurity will be particularly interested in this hacking distrobution.
Here are some of ArchAssult's features:
  • Support for i686, x86_64, and ARMv6h & ARMv7h
  • Over 3K packages
  • Modular package groups
The community is particulary helpful and we would highly recommend that you check out this distro, not least because it is

Vital Statistics
  •  OS Type: Linux
  •  Based on: Arch
  •  Origin: USA
  •  Architecture: i686, x86_64, and ARMv6h & ARMv7h

Cyborg Linux

 Cyborg is a beautifully presented penetration testing distribution. As you would expect this Hacker's Distro contains a vast array of penetration testing tools and programs that can used by professional Ethical Hackers and Cyber Security Experts.

The team behind Cyborg Linux state that the distro has six main functions (or categories), which are:
  • Stress Testing
  • Mobile Security
  • Wireless Security
  • Forensics
  • Reverse Engineering
  • Exploitation Toolkit

Vital Statistics
  •  OS Type: Linux
  •  Based on: Ubuntu
  •  Origin: India
  •  Architecture: i686, x86_64






Thứ Hai, 2 tháng 2, 2015

Kali Linux


Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
  • More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality.
  • Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux.
  • Open source Git tree: We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages.
  • FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc.
  • Vast wireless device support: We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • Custom kernel patched for injection: As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included.
  • Secure development environment: The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols.
  • GPG signed packages and repos: All Kali packages are signed by each individual developer when they are built and committed and the repositories subsequently sign the packages as well.
  • Multi-language: Although pentesting tools tend to be written in English, we have ensured that Kali has true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
  • Completely customizable: We completely understand that not everyone will agree with our design decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
  • ARMEL and ARMHF support: Since ARM-based systems are becoming more and more prevalent and inexpensive, we knew that Kali�s ARM support would need to be as robust as we could manage, resulting in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the distribution.





Kali Linux


Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
  • More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality.
  • Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux.
  • Open source Git tree: We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages.
  • FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc.
  • Vast wireless device support: We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • Custom kernel patched for injection: As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included.
  • Secure development environment: The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols.
  • GPG signed packages and repos: All Kali packages are signed by each individual developer when they are built and committed and the repositories subsequently sign the packages as well.
  • Multi-language: Although pentesting tools tend to be written in English, we have ensured that Kali has true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
  • Completely customizable: We completely understand that not everyone will agree with our design decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
  • ARMEL and ARMHF support: Since ARM-based systems are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, resulting in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the distribution.





BackBox


BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.






DEFT


DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Computer Forensics, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, etc�) connected to the PC where the boot process takes place.
The DEFT system is based on GNU Linux, it can run live (via DVDROM or USB pendrive), installed or run as a Virtual Appliance on VMware or Virtualbox. DEFT employs LXDE as desktop environment and WINE for executing Windows tools under Linux. It features a comfortable mount manager for device management.
DEFT is paired with DART (acronym for Digital Advanced Response Toolkit), a Forensics System which can be run on Windows and contains the best tools for Forensics and Incident Response. DART features a GUI with logging and integrity check for the instruments here contained.
Besides all this, the DEFT staff is devoted to implementing and developing applications which are released to Law Enforcement Officers, such as Autopsy 3 for Linux.
DEFT is currently employed in several places and by several people such as:
  • Military
  • Government Officers
  • Law Enforcement
  • Investigators
  • Expert Witnesses
  • IT Auditors
  • Universities
  • Individuals
DEFT is 100% made in Italy and it�s a project managed and maintained by the no-profit DEFT Association, also known as DEFTA, whose president is currently Stefano Fratepietro.







DEFT


DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Computer Forensics, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, etc…) connected to the PC where the boot process takes place.
The DEFT system is based on GNU Linux, it can run live (via DVDROM or USB pendrive), installed or run as a Virtual Appliance on VMware or Virtualbox. DEFT employs LXDE as desktop environment and WINE for executing Windows tools under Linux. It features a comfortable mount manager for device management.
DEFT is paired with DART (acronym for Digital Advanced Response Toolkit), a Forensics System which can be run on Windows and contains the best tools for Forensics and Incident Response. DART features a GUI with logging and integrity check for the instruments here contained.
Besides all this, the DEFT staff is devoted to implementing and developing applications which are released to Law Enforcement Officers, such as Autopsy 3 for Linux.
DEFT is currently employed in several places and by several people such as:
  • Military
  • Government Officers
  • Law Enforcement
  • Investigators
  • Expert Witnesses
  • IT Auditors
  • Universities
  • Individuals
DEFT is 100% made in Italy and it’s a project managed and maintained by the no-profit DEFT Association, also known as DEFTA, whose president is currently Stefano Fratepietro.







Live Hacking OS



Live Hacking DVD and Live Hacking CD are Linux live distribution focused on penetration testing and ethical hacking. With no installation required, the analysis platform is started directly from the CD/DVD-Rom and is fully accessible within minutes to conduct live hacking and penetration tests.

Live Hacking distribution comes in two forms. A full Linux desktop (Live Hacking DVD) including a graphical user interface (GNOME) and applications like Firefox along with tools and utilities for DNS enumeration, reconnaissance, foot-printing, password cracking and network sniffing. For greater accessibility there is a Live Hacking menu to help you quick find and launch the tools.

The second variation is the Live Hacking Mini CD, which is command line only. However this doesn�t detract from the power of the tools and utilities included as most of the penetration testing and ethical hacking tools are command line tools. The included /lh directory has symbolic links to the different tools included.

The system requirements for the Live Hacking DVD and CD are quite reasonable. A fast Pentium 3 or any Pentium 4 class processor (or greater) is sufficient. For the desktop version 512MB of memory is required with 1GB recommended. For the command line version just 128MB of memory is needed.

Live Hacking OS



Live Hacking DVD and Live Hacking CD are Linux live distribution focused on penetration testing and ethical hacking. With no installation required, the analysis platform is started directly from the CD/DVD-Rom and is fully accessible within minutes to conduct live hacking and penetration tests.

Live Hacking distribution comes in two forms. A full Linux desktop (Live Hacking DVD) including a graphical user interface (GNOME) and applications like Firefox along with tools and utilities for DNS enumeration, reconnaissance, foot-printing, password cracking and network sniffing. For greater accessibility there is a Live Hacking menu to help you quick find and launch the tools.

The second variation is the Live Hacking Mini CD, which is command line only. However this doesn’t detract from the power of the tools and utilities included as most of the penetration testing and ethical hacking tools are command line tools. The included /lh directory has symbolic links to the different tools included.

The system requirements for the Live Hacking DVD and CD are quite reasonable. A fast Pentium 3 or any Pentium 4 class processor (or greater) is sufficient. For the desktop version 512MB of memory is required with 1GB recommended. For the command line version just 128MB of memory is needed.

Samurai Web Testing Framework


The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.

Starting with reconnaissance, we have included tools such as the Fierce domain scanner and Maltego. For mapping, we have included tools such WebScarab and ratproxy. We then chose tools for discovery. These would include w3af and burp. For exploitation, the final stage, we included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.



Network Security Toolkit (NST 20)


   Welcome to the Network Security Toolkit (NST). This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms.

The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis validation and monitoring tool on enterprise virtual servers hosting virtual machines.