Pesquisar este blog

sábado, 2 de junho de 2012

Ferramentas de monitoramento e testes de segurança


BGPMON.net
cyclops.cs.ucla.edu


Informações rápidas sobre um domínio, IP, URL e emails (servidores):

http://trasir.com/ (update: 16/12/2011)


Série de ferramentas para pentest:

Port Scanner: http://scan.subhashdasyam.com/port-scanner.php
VNC Scanner: http://scan.subhashdasyam.com/vnc-scanner.php
RDP Scanner: http://scan.subhashdasyam.com/remote-desktop-scanner.php
SSH Scanner: http://scan.subhashdasyam.com/ssh-scanner.php
LFI Scanner: http://scan.subhashdasyam.com/lfi-scanner.php
Admin Page Bruter: http://scan.subhashdasyam.com/admin-page-finder.php
WordPress Admin Brutter: http://scan.subhashdasyam.com/wordpress-bruter.php
SQLi Dumper: http://scan.subhashdasyam.com/dumper.php
SQLi Dumper with login: http://scan.subhashdasyam.com/dumper-with-login.php


Lista de Sites para localização de informações pessoais (*):

http://computercrimeinfo.com/info.html


Análise de IPs/URLs:

http://www.ipvoid.com
http://www.urlvoid.com
http://www.google.com/safebrowsing/diagnostic?site=example.com
http://www.unmaskparasites.com
http://www.hackerfantastic.com


Análise de IPs em múltiplas DNSBL (Spam):

http://multirbl.valli.org


Top 20 Malicious Autonomous Systems

http://maliciousnetworks.org


Análise de Malware em múltiplos Anti-Vírus

http://www.virustotal.com
http://virusscan.jotti.org
http://virscan.org
http://scanner.novirusthanks.org


Sandboxes (reporte de execução):

http://malwr.com
http://anubis.iseclab.org
http://www.norman.com
http://www.sunbeltsoftware.com
http://www.threatexpert.com
Outros sandboxes: http://www.pentestit.com/list-sandboxes-malware-analysis/


Análise de Documentos Maliciosos

http://www.malwaretracker.com
https://malwaretracker.com/doc.php (update em 2012/02/16)
http://www.joedoc.org
https://www.vicheck.ca
http://wepawet.iseclab.org
http://jsunpack.jeek.org
http://www.adopstools.com/ (flash)
https://blog.honeynet.org.my/gallus/upload/about



Verificação de Hashes MD5 de arquivos em White/BlackLists:

http://fileadvisor.bit9.com
https://hash.cymru.com
http://isc.sans.edu/tools/hashsearch.html
http://bin-test.shadowserver.org
http://isc.sans.edu/tools/hashsearch.html
http://www.team-cymru.org/Services/MHR/
http://www.nsrl.nist.gov/
http://www.bit9.com/products/bit9-global-software-registry.php
https://www.owasp.org/index.php/OWASP_File_Hash_Repository





CloudCracker (serviço pago, para WPA/WPA2, LM e NTLM)
https://www.cloudcracker.com (update em 2012/02/16)


Lista de Hash Crackers Online (MD5,SHA1&256,LM,NTLM,MySQL)

http://www.objectif-securite.ch/
http://md5.thekaine.de/
http://hashcrack.ath.cx/onlinehashcrackers.htm


Análise de Capturas de Rede

http://cloudshark.org
http://pcapr.net


Testes de SSL:

https://www.ssllabs.com/ssldb/
http://www.serversniff.net/content.php?do=ssl



Outras Listas de Ferramentas Online:

http://www.websegura.net/ferramentas-online-seguranca-web/ (David Sopas)
http://www.emersonwendt.com.br/p/pagina-de-ferramentas.html (Emerson Wendt)
http://www.techsupportalert.com/long-list.htm/Probably%20the%20Best%20Free%20Security%20List%20in%20the%20World

Nenhum comentário:

Postar um comentário

Observação: somente um membro deste blog pode postar um comentário.