<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Atootsi</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Atootsi"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Atootsi"/>
	<updated>2026-05-15T21:53:39Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121689</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121689"/>
		<updated>2017-05-08T21:02:20Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
&lt;br /&gt;
Main BackBox features discussed in this article:&lt;br /&gt;
&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px|center|thumb|Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px|center|thumb|BlackBox Sevices Menu View]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png|center|thumb|Auditing Menu]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png|400x500px|center|thumb|Arping Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png|400x500px|center|thumb|knock manual]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png|400x500px|center|thumb|theHarvester Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px|center|thumb|Zenmap Manual]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png|500x600px|center|thumb|Zenmap Example]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px|center|thumb|OpenVas Web Interface]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px|center|thumb|Zap GUI]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png|center|thumb|BeEF after starting it]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px|center|thumb|BeEF Authorization page]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px|center|thumb|BeEF Startup page]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png|center|thumb|Armitage Window]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png|center|thumb|Armitage GUI]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png|1000x800px|center|thumb|msfconsole common commands]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px|center|thumb|Hydra GUI]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px|center|thumb|Ettercap GUI]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px|center|thumb|MagicTree GUI]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png|center|thumb|Flash Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Forensic Analysis ====&lt;br /&gt;
&lt;br /&gt;
Forensic analysis is the act of carrying out an investigation to obtain evidence from devices. It is a structured examination that aims to rebuild the user&#039;s history in a computer device or a server system. Some of the tools used for this in BackBox are: &lt;br /&gt;
&lt;br /&gt;
- Dcﬂdd: This is an enhanced version of GNU dd with features useful for forensics and security&lt;br /&gt;
&lt;br /&gt;
- Ddrescue: This is a data recovery tool that copies and attempts to recover data from one fle or block device (hard disc, CD-ROM, and so on) onto another.&lt;br /&gt;
&lt;br /&gt;
- Guymager: This is a fast and most user-friendly forensic imager, based on libewf and libguytools.&lt;br /&gt;
&lt;br /&gt;
- DFF: This (also known as Digital Forensics Framework) is a digital data collector for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
- Foremost: This is a console application that helps you to recover files based on their headers, footers, and internal data structures.&lt;br /&gt;
&lt;br /&gt;
- Photorec: This is a file carver data recovery software tool explicitly focused on image recovery from digital cameras (CompactFlash, Memory Stick, Secure Digital, SmartMedia, Microdrive, MMC, USB ﬂash drives, and so on), hard disks, and CD-ROMs.&lt;br /&gt;
&lt;br /&gt;
- Scalpel: This is a carver tool designed to recover deleted data from the system.&lt;br /&gt;
&lt;br /&gt;
- Testdisk: This is a free data recovery utility.&lt;br /&gt;
&lt;br /&gt;
- Steghide: This is a steganography program that is able to hide data in the image and audio files.&lt;br /&gt;
&lt;br /&gt;
- Vinetto: This examines the Thumbs.db fles for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
==== Malware Analysis ====&lt;br /&gt;
&lt;br /&gt;
Malware analysis is the process of determining the purpose and functionality of a given malware sample such as a virus,  worm,  or  Trojan  horse.  This process is a necessary step to be able to develop effective detection techniques for malicious code.&lt;br /&gt;
&lt;br /&gt;
In BackBox, there are three main tools for this:&lt;br /&gt;
&lt;br /&gt;
- Pyew: a (command line) python tool to analyse malware. It does have support for hexadecimal viewing, disassembly (Intel 16, 32 and 64 bits), PE and ELF file formats (it performs code analysis and let you write scripts using an API to perform many types of analysis), follows direct call/jmp instructions in the interactive command line, displays function names and string data references; supports OLE2 format, PDF format and more. It also supports plugins to add more features to the tool. &lt;br /&gt;
&lt;br /&gt;
- Yara: a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic.&lt;br /&gt;
&lt;br /&gt;
- Volatility Framework - Volatile memory extraction utility framework - a completely open ollection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.&lt;br /&gt;
&lt;br /&gt;
==== Mobile Analysis ====&lt;br /&gt;
&lt;br /&gt;
Some of the tools for mobile security assessment in BackBox Linux are:&lt;br /&gt;
&lt;br /&gt;
adb - Android Debug Bridge - a versatile command-line tool that lets you communicate with a device (an emulator or a connected Android device). The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.&lt;br /&gt;
&lt;br /&gt;
apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk, etc.&lt;br /&gt;
&lt;br /&gt;
iPBA - iPhone Backup Decoder and Analyzer - This software allows the user to browse through the content of an iPhone/iPad backup made by iTunes (or other software able to perform iOS devices&#039; backup). The software is packed with all the routines needed to understand and show the content of files found.&lt;br /&gt;
&lt;br /&gt;
==== VoIP Analysis ====&lt;br /&gt;
&lt;br /&gt;
For this feature, BackBox has a tool called sipcrack. This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
As seen above, BackBox has many tools that can be used for security purposes. Learning and writing about it gave me a good overview of what is needed to become a good cybersecurity specialist, especially in terms of what tools can be used.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[http://www.ijarcsse.com/docs/papers/Volume_3/4_April2013/V3I4-0371.pdf International Journal of Advanced Research in Computer Science and Software Engineering]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/joxeankoret/pyew GitHub Pyew]&lt;br /&gt;
&lt;br /&gt;
[http://virustotal.github.io/yara/ yara in a nutshell]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/volatilityfoundation/volatility Volatility Github]&lt;br /&gt;
&lt;br /&gt;
[https://developer.android.com/studio/command-line/adb.html Android Debug Bridge]&lt;br /&gt;
&lt;br /&gt;
[https://ibotpeaches.github.io/Apktool/ apktool]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PicciMario/iPhone-Backup-Analyzer-2 iPhone Backup Decoder and Analyzer]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121688</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121688"/>
		<updated>2017-05-08T21:01:16Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
&lt;br /&gt;
Main BackBox features discussed in this article:&lt;br /&gt;
&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px|center|thumb|Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px|center|thumb|BlackBox Sevices Menu View]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png|center|thumb|Auditing Menu]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png|400x500px|center|thumb|Arping Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png|400x500px|center|thumb|knock manual]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png|400x500px|center|thumb|theHarvester Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px|center|thumb|Zenmap Manual]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png|500x600px|center|thumb|Zenmap Example]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px|center|thumb|OpenVas Web Interface]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px|center|thumb|Zap GUI]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png|center|thumb|BeEF after starting it]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px|center|thumb|BeEF Authorization page]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px|center|thumb|BeEF Startup page]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png|center|thumb|Armitage Window]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png|center|thumb|Armitage GUI]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png|1000x800px|center|thumb|msfconsole common commands]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px|center|thumb|Hydra GUI]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px|center|thumb|Ettercap GUI]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px|center|thumb|MagicTree GUI]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png|center|thumb|Flash Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Forensic Analysis ====&lt;br /&gt;
&lt;br /&gt;
Forensic analysis is the act of carrying out an investigation to obtain evidence from devices. It is a structured examination that aims to rebuild the user&#039;s history in a computer device or a server system. Some of the tools used for this in BackBox are: &lt;br /&gt;
&lt;br /&gt;
- Dcﬂdd: This is an enhanced version of GNU dd with features useful for forensics and security&lt;br /&gt;
&lt;br /&gt;
- Ddrescue: This is a data recovery tool that copies and attempts to recover data from one fle or block device (hard disc, CD-ROM, and so on) onto another.&lt;br /&gt;
&lt;br /&gt;
- Guymager: This is a fast and most user-friendly forensic imager, based on libewf and libguytools.&lt;br /&gt;
&lt;br /&gt;
- DFF: This (also known as Digital Forensics Framework) is a digital data collector for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
- Foremost: This is a console application that helps you to recover files based on their headers, footers, and internal data structures.&lt;br /&gt;
&lt;br /&gt;
- Photorec: This is a file carver data recovery software tool explicitly focused on image recovery from digital cameras (CompactFlash, Memory Stick, Secure Digital, SmartMedia, Microdrive, MMC, USB ﬂash drives, and so on), hard disks, and CD-ROMs.&lt;br /&gt;
&lt;br /&gt;
- Scalpel: This is a carver tool designed to recover deleted data from the system.&lt;br /&gt;
&lt;br /&gt;
- Testdisk: This is a free data recovery utility.&lt;br /&gt;
&lt;br /&gt;
- Steghide: This is a steganography program that is able to hide data in the image and audio files.&lt;br /&gt;
&lt;br /&gt;
- Vinetto: This examines the Thumbs.db fles for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
==== Malware Analysis ====&lt;br /&gt;
&lt;br /&gt;
Malware analysis is the process of determining the purpose and functionality of a given malware sample such as a virus,  worm,  or  Trojan  horse.  This process is a necessary step to be able to develop effective detection techniques for malicious code.&lt;br /&gt;
&lt;br /&gt;
In BackBox, there are three main tools for this:&lt;br /&gt;
&lt;br /&gt;
- Pyew: a (command line) python tool to analyse malware. It does have support for hexadecimal viewing, disassembly (Intel 16, 32 and 64 bits), PE and ELF file formats (it performs code analysis and let you write scripts using an API to perform many types of analysis), follows direct call/jmp instructions in the interactive command line, displays function names and string data references; supports OLE2 format, PDF format and more. It also supports plugins to add more features to the tool. &lt;br /&gt;
&lt;br /&gt;
- Yara: a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic.&lt;br /&gt;
&lt;br /&gt;
- Volatility Framework - Volatile memory extraction utility framework - a completely open ollection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.&lt;br /&gt;
&lt;br /&gt;
==== Mobile Analysis ====&lt;br /&gt;
&lt;br /&gt;
Some of the tools for mobile security assessment in BackBox Linux are:&lt;br /&gt;
&lt;br /&gt;
adb - Android Debug Bridge - a versatile command-line tool that lets you communicate with a device (an emulator or a connected Android device). The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.&lt;br /&gt;
&lt;br /&gt;
apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk, etc.&lt;br /&gt;
&lt;br /&gt;
iPBA - iPhone Backup Decoder and Analyzer - This software allows the user to browse through the content of an iPhone/iPad backup made by iTunes (or other software able to perform iOS devices&#039; backup). The software is packed with all the routines needed to understand and show the content of files found.&lt;br /&gt;
&lt;br /&gt;
==== VoIP Analysis ====&lt;br /&gt;
&lt;br /&gt;
For this feature, BackBox has a tool called sipcrack. This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
As seen above, BackBox has many tools that can be used for security purposes. Learning about it gave me a good overview of what is needed to become a good cybersecurity specialist, especially in terms of what tools need to be learned.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[http://www.ijarcsse.com/docs/papers/Volume_3/4_April2013/V3I4-0371.pdf International Journal of Advanced Research in Computer Science and Software Engineering]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/joxeankoret/pyew GitHub Pyew]&lt;br /&gt;
&lt;br /&gt;
[http://virustotal.github.io/yara/ yara in a nutshell]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/volatilityfoundation/volatility Volatility Github]&lt;br /&gt;
&lt;br /&gt;
[https://developer.android.com/studio/command-line/adb.html Android Debug Bridge]&lt;br /&gt;
&lt;br /&gt;
[https://ibotpeaches.github.io/Apktool/ apktool]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PicciMario/iPhone-Backup-Analyzer-2 iPhone Backup Decoder and Analyzer]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121687</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121687"/>
		<updated>2017-05-08T20:55:13Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
&lt;br /&gt;
Main BackBox features discussed in this article:&lt;br /&gt;
&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px|center|thumb|Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px|center|thumb|BlackBox Sevices Menu View]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png|center|thumb|Auditing Menu]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png|400x500px|center|thumb|Arping Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png|400x500px|center|thumb|knock manual]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png|400x500px|center|thumb|theHarvester Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px|center|thumb|Zenmap Manual]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png|500x600px|center|thumb|Zenmap Example]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px|center|thumb|OpenVas Web Interface]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px|center|thumb|Zap GUI]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png|center|thumb|BeEF after starting it]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px|center|thumb|BeEF Authorization page]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px|center|thumb|BeEF Startup page]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png|center|thumb|Armitage Window]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png|center|thumb|Armitage GUI]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png|1000x800px|center|thumb|msfconsole common commands]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px|center|thumb|Hydra GUI]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px|center|thumb|Ettercap GUI]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px|center|thumb|MagicTree GUI]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png|center|thumb|Flash Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Forensic Analysis ====&lt;br /&gt;
&lt;br /&gt;
Forensic analysis is the act of carrying out an investigation to obtain evidence from devices. It is a structured examination that aims to rebuild the user&#039;s history in a computer device or a server system. Some of the tools used for this in BackBox are: &lt;br /&gt;
&lt;br /&gt;
- Dcﬂdd: This is an enhanced version of GNU dd with features useful for forensics and security&lt;br /&gt;
&lt;br /&gt;
- Ddrescue: This is a data recovery tool that copies and attempts to recover data from one fle or block device (hard disc, CD-ROM, and so on) onto another.&lt;br /&gt;
&lt;br /&gt;
- Guymager: This is a fast and most user-friendly forensic imager, based on libewf and libguytools.&lt;br /&gt;
&lt;br /&gt;
- DFF: This (also known as Digital Forensics Framework) is a digital data collector for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
- Foremost: This is a console application that helps you to recover files based on their headers, footers, and internal data structures.&lt;br /&gt;
&lt;br /&gt;
- Photorec: This is a file carver data recovery software tool explicitly focused on image recovery from digital cameras (CompactFlash, Memory Stick, Secure Digital, SmartMedia, Microdrive, MMC, USB ﬂash drives, and so on), hard disks, and CD-ROMs.&lt;br /&gt;
&lt;br /&gt;
- Scalpel: This is a carver tool designed to recover deleted data from the system.&lt;br /&gt;
&lt;br /&gt;
- Testdisk: This is a free data recovery utility.&lt;br /&gt;
&lt;br /&gt;
- Steghide: This is a steganography program that is able to hide data in the image and audio files.&lt;br /&gt;
&lt;br /&gt;
- Vinetto: This examines the Thumbs.db fles for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
==== Malware Analysis ====&lt;br /&gt;
&lt;br /&gt;
Malware analysis is the process of determining the purpose and functionality of a given malware sample such as a virus,  worm,  or  Trojan  horse.  This process is a necessary step to be able to develop effective detection techniques for malicious code.&lt;br /&gt;
&lt;br /&gt;
In BackBox, there are three main tools for this:&lt;br /&gt;
&lt;br /&gt;
- Pyew: a (command line) python tool to analyse malware. It does have support for hexadecimal viewing, disassembly (Intel 16, 32 and 64 bits), PE and ELF file formats (it performs code analysis and let you write scripts using an API to perform many types of analysis), follows direct call/jmp instructions in the interactive command line, displays function names and string data references; supports OLE2 format, PDF format and more. It also supports plugins to add more features to the tool. &lt;br /&gt;
&lt;br /&gt;
- Yara: a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic.&lt;br /&gt;
&lt;br /&gt;
- Volatility Framework - Volatile memory extraction utility framework - a completely open ollection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.&lt;br /&gt;
&lt;br /&gt;
==== Mobile Analysis ====&lt;br /&gt;
&lt;br /&gt;
Some of the tools for mobile security assessment in BackBox Linux are:&lt;br /&gt;
&lt;br /&gt;
adb - Android Debug Bridge - a versatile command-line tool that lets you communicate with a device (an emulator or a connected Android device). The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.&lt;br /&gt;
&lt;br /&gt;
apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk, etc.&lt;br /&gt;
&lt;br /&gt;
iPBA - iPhone Backup Decoder and Analyzer - This software allows the user to browse through the content of an iPhone/iPad backup made by iTunes (or other software able to perform iOS devices&#039; backup). The software is packed with all the routines needed to understand and show the content of files found.&lt;br /&gt;
&lt;br /&gt;
==== VoIP Analysis ====&lt;br /&gt;
&lt;br /&gt;
For this feature, BackBox has a tool called sipcrack. This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[http://www.ijarcsse.com/docs/papers/Volume_3/4_April2013/V3I4-0371.pdf International Journal of Advanced Research in Computer Science and Software Engineering]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/joxeankoret/pyew GitHub Pyew]&lt;br /&gt;
&lt;br /&gt;
[http://virustotal.github.io/yara/ yara in a nutshell]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/volatilityfoundation/volatility Volatility Github]&lt;br /&gt;
&lt;br /&gt;
[https://developer.android.com/studio/command-line/adb.html Android Debug Bridge]&lt;br /&gt;
&lt;br /&gt;
[https://ibotpeaches.github.io/Apktool/ apktool]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PicciMario/iPhone-Backup-Analyzer-2 iPhone Backup Decoder and Analyzer]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121686</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121686"/>
		<updated>2017-05-08T20:51:33Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
&lt;br /&gt;
Main BackBox features discussed in this article:&lt;br /&gt;
&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px|center|thumb|Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px|center|thumb|BlackBox Sevices Menu View]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png|center|thumb|Auditing Menu]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png|center|thumb|Arping Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png|center|thumb|knock manual]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png|center|thumb|theHarvester Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px|center|thumb|Zenmap Manual]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png|center|thumb|Zenmap Example]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px|center|thumb|OpenVas Web Interface]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px|center|thumb|Zap GUI]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png|center|thumb|BeEF after starting it]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px|center|thumb|BeEF Authorization page]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px|center|thumb|BeEF Startup page]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png|center|thumb|Armitage Window]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png|center|thumb|Armitage GUI]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png|800x600px|center|thumb|msfconsole common commands]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px|center|thumb|Hydra GUI]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px|center|thumb|Ettercap GUI]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px|center|thumb|MagicTree GUI]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png|center|thumb|Flash Manual]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Forensic Analysis ====&lt;br /&gt;
&lt;br /&gt;
Forensic analysis is the act of carrying out an investigation to obtain evidence from devices. It is a structured examination that aims to rebuild the user&#039;s history in a computer device or a server system. Some of the tools used for this in BackBox are: &lt;br /&gt;
&lt;br /&gt;
- Dcﬂdd: This is an enhanced version of GNU dd with features useful for forensics and security&lt;br /&gt;
&lt;br /&gt;
- Ddrescue: This is a data recovery tool that copies and attempts to recover data from one fle or block device (hard disc, CD-ROM, and so on) onto another.&lt;br /&gt;
&lt;br /&gt;
- Guymager: This is a fast and most user-friendly forensic imager, based on libewf and libguytools.&lt;br /&gt;
&lt;br /&gt;
- DFF: This (also known as Digital Forensics Framework) is a digital data collector for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
- Foremost: This is a console application that helps you to recover files based on their headers, footers, and internal data structures.&lt;br /&gt;
&lt;br /&gt;
- Photorec: This is a file carver data recovery software tool explicitly focused on image recovery from digital cameras (CompactFlash, Memory Stick, Secure Digital, SmartMedia, Microdrive, MMC, USB ﬂash drives, and so on), hard disks, and CD-ROMs.&lt;br /&gt;
&lt;br /&gt;
- Scalpel: This is a carver tool designed to recover deleted data from the system.&lt;br /&gt;
&lt;br /&gt;
- Testdisk: This is a free data recovery utility.&lt;br /&gt;
&lt;br /&gt;
- Steghide: This is a steganography program that is able to hide data in the image and audio files.&lt;br /&gt;
&lt;br /&gt;
- Vinetto: This examines the Thumbs.db fles for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
==== Malware Analysis ====&lt;br /&gt;
&lt;br /&gt;
Malware analysis is the process of determining the purpose and functionality of a given malware sample such as a virus,  worm,  or  Trojan  horse.  This process is a necessary step to be able to develop effective detection techniques for malicious code.&lt;br /&gt;
&lt;br /&gt;
In BackBox, there are three main tools for this:&lt;br /&gt;
&lt;br /&gt;
- Pyew: a (command line) python tool to analyse malware. It does have support for hexadecimal viewing, disassembly (Intel 16, 32 and 64 bits), PE and ELF file formats (it performs code analysis and let you write scripts using an API to perform many types of analysis), follows direct call/jmp instructions in the interactive command line, displays function names and string data references; supports OLE2 format, PDF format and more. It also supports plugins to add more features to the tool. &lt;br /&gt;
&lt;br /&gt;
- Yara: a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic.&lt;br /&gt;
&lt;br /&gt;
- Volatility Framework - Volatile memory extraction utility framework - a completely open ollection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.&lt;br /&gt;
&lt;br /&gt;
==== Mobile Analysis ====&lt;br /&gt;
&lt;br /&gt;
Some of the tools for mobile security assessment in BackBox Linux are:&lt;br /&gt;
&lt;br /&gt;
adb - Android Debug Bridge - a versatile command-line tool that lets you communicate with a device (an emulator or a connected Android device). The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.&lt;br /&gt;
&lt;br /&gt;
apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk, etc.&lt;br /&gt;
&lt;br /&gt;
iPBA - iPhone Backup Decoder and Analyzer - This software allows the user to browse through the content of an iPhone/iPad backup made by iTunes (or other software able to perform iOS devices&#039; backup). The software is packed with all the routines needed to understand and show the content of files found.&lt;br /&gt;
&lt;br /&gt;
==== VoIP Analysis ====&lt;br /&gt;
&lt;br /&gt;
For this feature, BackBox has a tool called sipcrack. This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[http://www.ijarcsse.com/docs/papers/Volume_3/4_April2013/V3I4-0371.pdf International Journal of Advanced Research in Computer Science and Software Engineering]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/joxeankoret/pyew GitHub Pyew]&lt;br /&gt;
&lt;br /&gt;
[http://virustotal.github.io/yara/ yara in a nutshell]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/volatilityfoundation/volatility Volatility Github]&lt;br /&gt;
&lt;br /&gt;
[https://developer.android.com/studio/command-line/adb.html Android Debug Bridge]&lt;br /&gt;
&lt;br /&gt;
[https://ibotpeaches.github.io/Apktool/ apktool]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PicciMario/iPhone-Backup-Analyzer-2 iPhone Backup Decoder and Analyzer]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121671</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121671"/>
		<updated>2017-05-08T20:28:48Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Malware Analysis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
&lt;br /&gt;
Main BackBox features discussed in this article:&lt;br /&gt;
&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Forensic Analysis ====&lt;br /&gt;
&lt;br /&gt;
Forensic analysis is the act of carrying out an investigation to obtain evidence from devices. It is a structured examination that aims to rebuild the user&#039;s history in a computer device or a server system. Some of the tools used for this in BackBox are: &lt;br /&gt;
&lt;br /&gt;
- Dcﬂdd: This is an enhanced version of GNU dd with features useful for forensics and security&lt;br /&gt;
&lt;br /&gt;
- Ddrescue: This is a data recovery tool that copies and attempts to recover data from one fle or block device (hard disc, CD-ROM, and so on) onto another.&lt;br /&gt;
&lt;br /&gt;
- Guymager: This is a fast and most user-friendly forensic imager, based on libewf and libguytools.&lt;br /&gt;
&lt;br /&gt;
- DFF: This (also known as Digital Forensics Framework) is a digital data collector for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
- Foremost: This is a console application that helps you to recover files based on their headers, footers, and internal data structures.&lt;br /&gt;
&lt;br /&gt;
- Photorec: This is a file carver data recovery software tool explicitly focused on image recovery from digital cameras (CompactFlash, Memory Stick, Secure Digital, SmartMedia, Microdrive, MMC, USB ﬂash drives, and so on), hard disks, and CD-ROMs.&lt;br /&gt;
&lt;br /&gt;
- Scalpel: This is a carver tool designed to recover deleted data from the system.&lt;br /&gt;
&lt;br /&gt;
- Testdisk: This is a free data recovery utility.&lt;br /&gt;
&lt;br /&gt;
- Steghide: This is a steganography program that is able to hide data in the image and audio files.&lt;br /&gt;
&lt;br /&gt;
- Vinetto: This examines the Thumbs.db fles for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
==== Malware Analysis ====&lt;br /&gt;
&lt;br /&gt;
Malware analysis is the process of determining the purpose and functionality of a given malware sample such as a virus,  worm,  or  Trojan  horse.  This process is a necessary step to be able to develop effective detection techniques for malicious code.&lt;br /&gt;
&lt;br /&gt;
In BackBox, there are three main tools for this:&lt;br /&gt;
&lt;br /&gt;
- Pyew: a (command line) python tool to analyse malware. It does have support for hexadecimal viewing, disassembly (Intel 16, 32 and 64 bits), PE and ELF file formats (it performs code analysis and let you write scripts using an API to perform many types of analysis), follows direct call/jmp instructions in the interactive command line, displays function names and string data references; supports OLE2 format, PDF format and more. It also supports plugins to add more features to the tool. &lt;br /&gt;
&lt;br /&gt;
- Yara: a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic.&lt;br /&gt;
&lt;br /&gt;
- Volatility Framework - Volatile memory extraction utility framework - a completely open ollection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.&lt;br /&gt;
&lt;br /&gt;
==== Mobile Analysis ====&lt;br /&gt;
&lt;br /&gt;
Some of the tools for mobile security assessment in BackBox Linux are:&lt;br /&gt;
&lt;br /&gt;
adb - Android Debug Bridge - a versatile command-line tool that lets you communicate with a device (an emulator or a connected Android device). The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.&lt;br /&gt;
&lt;br /&gt;
apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk, etc.&lt;br /&gt;
&lt;br /&gt;
iPBA - iPhone Backup Decoder and Analyzer - This software allows the user to browse through the content of an iPhone/iPad backup made by iTunes (or other software able to perform iOS devices&#039; backup). The software is packed with all the routines needed to understand and show the content of files found.&lt;br /&gt;
&lt;br /&gt;
==== VoIP Analysis ====&lt;br /&gt;
&lt;br /&gt;
For this feature, BackBox has a tool called sipcrack. This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[http://www.ijarcsse.com/docs/papers/Volume_3/4_April2013/V3I4-0371.pdf International Journal of Advanced Research in Computer Science and Software Engineering]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/joxeankoret/pyew GitHub Pyew]&lt;br /&gt;
&lt;br /&gt;
[http://virustotal.github.io/yara/ yara in a nutshell]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/volatilityfoundation/volatility Volatility Github]&lt;br /&gt;
&lt;br /&gt;
[https://developer.android.com/studio/command-line/adb.html Android Debug Bridge]&lt;br /&gt;
&lt;br /&gt;
[https://ibotpeaches.github.io/Apktool/ apktool]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PicciMario/iPhone-Backup-Analyzer-2 iPhone Backup Decoder and Analyzer]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121670</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121670"/>
		<updated>2017-05-08T20:25:10Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
&lt;br /&gt;
Main BackBox features discussed in this article:&lt;br /&gt;
&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Forensic Analysis ====&lt;br /&gt;
&lt;br /&gt;
Forensic analysis is the act of carrying out an investigation to obtain evidence from devices. It is a structured examination that aims to rebuild the user&#039;s history in a computer device or a server system. Some of the tools used for this in BackBox are: &lt;br /&gt;
&lt;br /&gt;
- Dcﬂdd: This is an enhanced version of GNU dd with features useful for forensics and security&lt;br /&gt;
&lt;br /&gt;
- Ddrescue: This is a data recovery tool that copies and attempts to recover data from one fle or block device (hard disc, CD-ROM, and so on) onto another.&lt;br /&gt;
&lt;br /&gt;
- Guymager: This is a fast and most user-friendly forensic imager, based on libewf and libguytools.&lt;br /&gt;
&lt;br /&gt;
- DFF: This (also known as Digital Forensics Framework) is a digital data collector for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
- Foremost: This is a console application that helps you to recover files based on their headers, footers, and internal data structures.&lt;br /&gt;
&lt;br /&gt;
- Photorec: This is a file carver data recovery software tool explicitly focused on image recovery from digital cameras (CompactFlash, Memory Stick, Secure Digital, SmartMedia, Microdrive, MMC, USB ﬂash drives, and so on), hard disks, and CD-ROMs.&lt;br /&gt;
&lt;br /&gt;
- Scalpel: This is a carver tool designed to recover deleted data from the system.&lt;br /&gt;
&lt;br /&gt;
- Testdisk: This is a free data recovery utility.&lt;br /&gt;
&lt;br /&gt;
- Steghide: This is a steganography program that is able to hide data in the image and audio files.&lt;br /&gt;
&lt;br /&gt;
- Vinetto: This examines the Thumbs.db fles for forensic purposes.&lt;br /&gt;
&lt;br /&gt;
==== Malware Analysis ====&lt;br /&gt;
&lt;br /&gt;
Malware analysis is the process of determining the purpose and functionality of a given malware sample such as a virus,  worm,  or  Trojan  horse.  This process is a necessary step to be able to develop effective detection techniques for malicious code.&lt;br /&gt;
&lt;br /&gt;
In BackBox, there are three main tools for this:&lt;br /&gt;
&lt;br /&gt;
- Pyew: a (command line) python tool to analyse malware. It does have support for hexadecimal viewing, disassembly (Intel 16, 32 and 64 bits), PE and ELF file formats (it performs code analysis and let you write scripts using an API to perform many types of analysis), follows direct call/jmp instructions in the interactive command line, displays function names and string data references; supports OLE2 format, PDF format and more. It also supports plugins to add more features to the tool. &lt;br /&gt;
&lt;br /&gt;
- Yara: a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic.&lt;br /&gt;
&lt;br /&gt;
- Volatility Framework - Volatile memory extraction utility framework - a completely open ollection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Mobile Analysis ====&lt;br /&gt;
&lt;br /&gt;
Some of the tools for mobile security assessment in BackBox Linux are:&lt;br /&gt;
&lt;br /&gt;
adb - Android Debug Bridge - a versatile command-line tool that lets you communicate with a device (an emulator or a connected Android device). The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.&lt;br /&gt;
&lt;br /&gt;
apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk, etc.&lt;br /&gt;
&lt;br /&gt;
iPBA - iPhone Backup Decoder and Analyzer - This software allows the user to browse through the content of an iPhone/iPad backup made by iTunes (or other software able to perform iOS devices&#039; backup). The software is packed with all the routines needed to understand and show the content of files found.&lt;br /&gt;
&lt;br /&gt;
==== VoIP Analysis ====&lt;br /&gt;
&lt;br /&gt;
For this feature, BackBox has a tool called sipcrack. This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[http://www.ijarcsse.com/docs/papers/Volume_3/4_April2013/V3I4-0371.pdf International Journal of Advanced Research in Computer Science and Software Engineering]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/joxeankoret/pyew GitHub Pyew]&lt;br /&gt;
&lt;br /&gt;
[http://virustotal.github.io/yara/ yara in a nutshell]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/volatilityfoundation/volatility Volatility Github]&lt;br /&gt;
&lt;br /&gt;
[https://developer.android.com/studio/command-line/adb.html Android Debug Bridge]&lt;br /&gt;
&lt;br /&gt;
[https://ibotpeaches.github.io/Apktool/ apktool]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PicciMario/iPhone-Backup-Analyzer-2 iPhone Backup Decoder and Analyzer]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121663</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121663"/>
		<updated>2017-05-08T19:56:50Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Other Useful Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
&lt;br /&gt;
Main BackBox features discussed in this article:&lt;br /&gt;
&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
==== Forensic Analysis ====&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121662</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121662"/>
		<updated>2017-05-08T19:55:32Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* BackBox Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
&lt;br /&gt;
Main BackBox features discussed in this article:&lt;br /&gt;
&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121661</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121661"/>
		<updated>2017-05-08T19:54:01Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Tunneling ====&lt;br /&gt;
&lt;br /&gt;
===== Iodine =====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Web Backdoors ====&lt;br /&gt;
&lt;br /&gt;
===== Weevely =====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
- Flasm: This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Stress Testing ====&lt;br /&gt;
&lt;br /&gt;
- Siege: an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP, HTTPS and FTP protocols. It lets its user hit a server with a configurable number of simulated clients. Those clients place the server &amp;quot;under siege.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- SlowHttpTest: A tool to test for slow HTTP DoS vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== Automotive Analysis ====&lt;br /&gt;
&lt;br /&gt;
- can-utils: provides a simple set of tools for working with CAN from the Linux command line.&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[https://www.joedog.org/siege-home/ Siege Home]&lt;br /&gt;
&lt;br /&gt;
[https://discuss.cantact.io/t/using-can-utils/24 can-utils]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121658</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121658"/>
		<updated>2017-05-08T19:38:05Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. &lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|700x350px]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|400x500px]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
To access the security applications, use the &#039;Auditing&#039; option:&lt;br /&gt;
&lt;br /&gt;
[[File:Auditing_Menupng.png]]&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Arping ===== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
===== Arp-scan =====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
===== Knock =====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Nbtscan =====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
===== theHarvest =====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
===== Zenmap =====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== WhatWeb ===== &lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== OpenVAS =====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Nikto =====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
===== Skipfsh =====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
===== ZAP =====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Browser ====&lt;br /&gt;
&lt;br /&gt;
===== BeEF =====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Database ====&lt;br /&gt;
&lt;br /&gt;
===== Sqlmap =====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== Network ====&lt;br /&gt;
&lt;br /&gt;
===== Armitage =====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
===== msfconsole =====&lt;br /&gt;
&lt;br /&gt;
Probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. MSFconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.&lt;br /&gt;
&lt;br /&gt;
To launch the console(in quiet mode), simply type:&lt;br /&gt;
&lt;br /&gt;
 mfsconsole -q&lt;br /&gt;
&lt;br /&gt;
Common commands:&lt;br /&gt;
&lt;br /&gt;
[[File:Msfconsolepng.png]]&lt;br /&gt;
&lt;br /&gt;
==== Web Application ====&lt;br /&gt;
&lt;br /&gt;
===== Fimap =====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
===== Wpscan ===== &lt;br /&gt;
&lt;br /&gt;
This tool can test a WordPress installation for security vulnerabilities. It allows remote testing of a WordPress installation, find vulnerable plugins and themes, security configuration issues and attack users by brute forcing passwords.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== Local Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== John =====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Hash-id: Software to identify the different types of hashes used to encrypt data and especially passwords.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Remote Passwords ====&lt;br /&gt;
&lt;br /&gt;
===== Xhydra =====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
===== RedFang =====&lt;br /&gt;
&lt;br /&gt;
RedFang is a Linux-based tool made to find Bluetooth devices in undiscoverable mode. The technology is attributed to Ollie Whitehouse and a small tech enterprise called @stake. It was originally developed as a “proof-of-concept” research resource, and is now a common part of many Bluetooth tutorials on security.RedFang uses a method called brute force to discover previously unknown Bluetooth locations.&lt;br /&gt;
&lt;br /&gt;
===== Medusa ===== &lt;br /&gt;
&lt;br /&gt;
Intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:&lt;br /&gt;
&lt;br /&gt;
- Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.&lt;br /&gt;
&lt;br /&gt;
- Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.&lt;br /&gt;
&lt;br /&gt;
- Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.&lt;br /&gt;
&lt;br /&gt;
 Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT]&lt;br /&gt;
&lt;br /&gt;
==== Sniffing ====&lt;br /&gt;
&lt;br /&gt;
===== Wireshark =====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
====== Tshark ======&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
===== Ettercap =====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===== Tcpdump =====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
===== Others =====&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Spoofing ====&lt;br /&gt;
&lt;br /&gt;
- scapy: is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
- dnsspoof:  This tool forges replies to arbitrary DNS address/pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. &lt;br /&gt;
&lt;br /&gt;
- yersinia: Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. &lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://www.offensive-security.com/metasploit-unleashed/msfconsole/ Using the MSFconsole Interface]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/wpscan-install-ubuntu/ WPScan Install on Ubuntu]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/redfang.php/ Cyborg Redfang]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/medusa.php/ Cyborg Medusa]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/password-attacks/hash-identifier hash-identifier]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/8/dnsspoof dnsspoof]&lt;br /&gt;
&lt;br /&gt;
[[http://www.secdev.org/projects/scapy/ scapy]]&lt;br /&gt;
&lt;br /&gt;
[http://www.yersinia.net/ yersinia]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Auditing_Menupng.png&amp;diff=121653</id>
		<title>File:Auditing Menupng.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Auditing_Menupng.png&amp;diff=121653"/>
		<updated>2017-05-08T19:10:34Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Msfconsolepng.png&amp;diff=121652</id>
		<title>File:Msfconsolepng.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Msfconsolepng.png&amp;diff=121652"/>
		<updated>2017-05-08T19:08:50Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121651</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121651"/>
		<updated>2017-05-08T18:54:28Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- MSF: This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to find and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat: a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat: a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains: redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel: This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
Thpot: This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
settoolkit: This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode. Flasm disassembles your entire swf including all the timelines and events. looking at disassembly, you learn how the flash compiler works. you can also do some optimization on the disassembled code by hand or adjust the code as you wish. flasm can then re-assemble the bytecode into a new swf.&lt;br /&gt;
&lt;br /&gt;
[[File:Flasm.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 flasm -d examplefile.swf&lt;br /&gt;
&lt;br /&gt;
This disassembles the example file to your terminal.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- Ghex: This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
- Nasm: This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
- binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.&lt;br /&gt;
&lt;br /&gt;
- radare2: Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files. I can now also analyze binaries, disassembe code, debug programs, attaching to remote gdb servers etc.&lt;br /&gt;
&lt;br /&gt;
- Dissy: This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Buetooth ====&lt;br /&gt;
&lt;br /&gt;
- btscanner: a tool designed specifically to extract as  much information as possible from a bluetooth device without the requirement to  pair.&lt;br /&gt;
&lt;br /&gt;
- hcidump: reads raw HCI data coming from and going to a Bluetooth device which can be specified with the option -i, default is the first avail-able  one) and prints to screen commands, events and data in a human-readable form. Optionally, the dump can be written to a file rather than parsed, and the dump file can be parsed in a subsequent moment.&lt;br /&gt;
&lt;br /&gt;
- obexftp: this tool is used to access files on mobile equipment, i.e. cell phones. With obexftpd you can transfer files between any computers using IrDA, Bluetooth and TCP/IP . &lt;br /&gt;
&lt;br /&gt;
- ussp-push:  This program allows you to send objects using the OBEX PUSH protocol. The OBEX PUSH protocol is used to transfer files to a mobile device, generally via Bluetooth or IrDA. The protocol does not allow any other action than sending and generally requires less strict authentication, which is why it is sometimes preferred to the OBEX FTP protocol (which allows full filesystem access and is provided by the obexftp package). &lt;br /&gt;
&lt;br /&gt;
==== WiFi ====&lt;br /&gt;
&lt;br /&gt;
===== Cracking =====&lt;br /&gt;
&lt;br /&gt;
- Aircrack-ng: This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
- Pyrit: This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
- Reaver: This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
- Wifte: This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
===== Scanning ===== &lt;br /&gt;
&lt;br /&gt;
- Kismet: This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
- Wash: a tool to find WPS enabled routers in your area.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/forensics/binwalk KALITOOLS binwalk]&lt;br /&gt;
&lt;br /&gt;
[https://community.linuxmint.com/software/view/flasm flasm]&lt;br /&gt;
&lt;br /&gt;
[http://manpages.ubuntu.com/manpages/xenial/man1/btscanner.1.html btscanner]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxcommand.org/man_pages/hcidump8.html hcidump]&lt;br /&gt;
&lt;br /&gt;
[https://linux.die.net/man/1/obexftp obexftp]&lt;br /&gt;
&lt;br /&gt;
[https://packages.debian.org/sid/comm/ussp-push Client for OBEX PUSH]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Flasm.png&amp;diff=121629</id>
		<title>File:Flasm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Flasm.png&amp;diff=121629"/>
		<updated>2017-05-08T18:28:46Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121616</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121616"/>
		<updated>2017-05-08T18:17:47Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- MSF: This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to find and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat - a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat - a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains - redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel - This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
Programs that can be used for this in Backbox are:&lt;br /&gt;
&lt;br /&gt;
- Thpot - This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
- settoolkit - This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121613</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121613"/>
		<updated>2017-05-08T18:13:40Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Social Engineering */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- MSF: This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to find and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat - a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat - a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains - redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel - This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
Honeyd is an open source computer program that allows a user to set up and run multiple virtual hosts on a computer network. These virtual hosts can be configured to mimic several different types of servers, allowing the user to simulate an infinite number of computer network configurations. Honeyd is primarily used in the field of computer security by professionals and hobbyists alike. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121610</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121610"/>
		<updated>2017-05-08T18:10:43Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- MSF: This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to find and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat - a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat - a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains - redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel - This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. All the data is stored in a tree structure, and it is designed to do the most cumbersome and boring part of penetration testing - data management and reporting.&lt;br /&gt;
&lt;br /&gt;
[[File:MTree.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To test it out, choose the Node menu and then autocreate. When prompted, enter the target’s IP and click &#039;ok&#039;.&lt;br /&gt;
&lt;br /&gt;
Under the &amp;quot;table view&amp;quot; tab, you will see the &#039;Command&#039; box. We are going to use this command: &lt;br /&gt;
&lt;br /&gt;
 nmap -v -A -out $results.xml $host &lt;br /&gt;
&lt;br /&gt;
The &#039;-v&#039; option enables verbose output. The -A option enables version detection among other things. The &#039;-out $results.xml&#039; puts the output in the &#039;results.xml&#039; file. And $host is used instead of the IP address, since we have already told MagicTree the IP of the intended target. This command works for the &#039;Environment&#039; option. This, for example, works for &#039;TabSep&#039;:&lt;br /&gt;
&lt;br /&gt;
 nmap -v -A  -i $in -o results.xml $host&lt;br /&gt;
&lt;br /&gt;
Next, push the &amp;quot;Q*&amp;quot; button under ‘tree view’, then hit run for it to run the nmap commands.&lt;br /&gt;
&lt;br /&gt;
Under the ‘task manager’ tab, once the scan is complete, you’ll see your .xml file pop up under ‘Output files’. Hit the ‘import’ button and MagicTree will automatically generate the node structure based on the results of nmap.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
This type of testing is based on a nontechnical intrusion method, mainly on human interaction. It is the ability to manipulate the person and obtain his/her access credentials or the information that can introduce us to such parameters. &lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[http://www.gremwell.com/what_is_magictree magictree]&lt;br /&gt;
&lt;br /&gt;
[http://cyborg.ztrela.com/magictree.php/ cyborg - MagicTree]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:MTree.png&amp;diff=121576</id>
		<title>File:MTree.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:MTree.png&amp;diff=121576"/>
		<updated>2017-05-08T16:47:46Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121569</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121569"/>
		<updated>2017-05-08T16:40:37Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This will try to find bugs in the mentioned url of the webapp.&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- MSF: This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to find and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
This occurs when you have gained access to a system but have not gained enough privileges to gather useful information or make necessary changes. &lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C.&lt;br /&gt;
&lt;br /&gt;
You can start of by simply typing this in the terminal:&lt;br /&gt;
&lt;br /&gt;
 john --test&lt;br /&gt;
&lt;br /&gt;
This will test the program to find it&#039;s capabilities on the current OS.&lt;br /&gt;
&lt;br /&gt;
Another way of testing this program out is by creating a &#039;password.text&#039; file on you system containing password format with a valid hash:&lt;br /&gt;
&lt;br /&gt;
 user:AZl.zWwxIh15Q&lt;br /&gt;
&lt;br /&gt;
Then simply run john on the file (warning - this program is CPU-intensive and the password-cracking process can take a long time):&lt;br /&gt;
&lt;br /&gt;
 john password.txt&lt;br /&gt;
&lt;br /&gt;
For systems, like Linux, that use shadow passwords - a system file in which encryption user password are stored so that they aren&#039;t available to people who try to break into the system - John offers an utility called &#039;unshadow&#039;, which can be used to create a file from /etc/passwd and shadow files.&lt;br /&gt;
&lt;br /&gt;
 unshadow /etc/passwd /etc/shadow &amp;gt; mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
If the cracking process is successful, the tool will write the password to ~/.john/john.pot. This file isn&#039;t human readable but with john you can still do it:&lt;br /&gt;
&lt;br /&gt;
 john --show mypasswd.txt&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
A GTK+ based GUI for hydra, this is a parallized login cracker which supports numerous protocols (such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB etc.) to attack by using the Telnet module. This tool gives researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. This can also be very useful to a hacker in the scenario where one has cracked a wifi password and gained local access to the network.&lt;br /&gt;
&lt;br /&gt;
To start the program, type &#039;xhydra&#039; in your terminal. This will open the GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:Xhydra.png|300x400px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the target IP or the target. Choose whether you&#039;d like to use IPv6, choose the port and protocol. And tick the optional boxes in the &#039;output options&#039;, for example, when you want to enable verbose output or debug mode.&lt;br /&gt;
&lt;br /&gt;
In the password menu tab, type in the username (like &#039;admin&#039;) and a commonly used password (&amp;quot;password&amp;quot;, blank, &amp;quot;admin&amp;quot;). In most cases though, you would want to use a wordlist. A wordlist can be found by simply googling one. Then save it as a list file (like &#039;password.lst&#039;) and define it&#039;s path in the password list box (for example: &amp;quot;.\user\password.lst&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
In the &#039;tuning&#039; tab menu, you can choose, for example, a time when the attack will be finished or if the attack will stop once first valid login credentials are found. You can also use a proxy.&lt;br /&gt;
&lt;br /&gt;
In the &#039;specific&#039; tab menu, you can, for example, define in what directory the protected page is on the server by defining it in the &#039;&amp;quot;http / https url&amp;quot; (use, for example, a simple &amp;quot;/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Then all that is left is to start the tool, wait for the results and analyze them.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a free and open-sourced tool for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
[[File:Ettercap.png|600x450px]]&lt;br /&gt;
&lt;br /&gt;
Ettercap can work with these four models:&lt;br /&gt;
&lt;br /&gt;
- IP-based: Filtered packets by IP address.&lt;br /&gt;
- MAC-based: Filtered packets by MAC address.&lt;br /&gt;
- ARP-based: It is very useful for sniffing packets between two hosts on a switched network.&lt;br /&gt;
- PublicARP-based: It is very useful for sniffing packets from a user to all hosts.&lt;br /&gt;
&lt;br /&gt;
Some important features are:&lt;br /&gt;
&lt;br /&gt;
- HTTPS support&lt;br /&gt;
- OS fingerprinting&lt;br /&gt;
- Passive scanning&lt;br /&gt;
- Hijacking DNS&lt;br /&gt;
&lt;br /&gt;
Ettercap provides four user interfaces:&lt;br /&gt;
&lt;br /&gt;
 - -T use text only GUI&lt;br /&gt;
 - -C use curses GUI&lt;br /&gt;
 - -G use GTK+ GUI&lt;br /&gt;
 - -D daemonize ettercap (no GUI)&lt;br /&gt;
&lt;br /&gt;
To use ettercap, you must specify a Networking Interface Card (NIC). This can be done with the command:&lt;br /&gt;
&lt;br /&gt;
 ifconfig -a&lt;br /&gt;
&lt;br /&gt;
As mentioned above, ettercap uses Man-in-the-Middle attack method. This is done by arp-spoofing - an attack technique, where an attacker sends a fake ARP message to the local LAN. The goal of ARP spoofing is to hijack a system and an attacker wants to join his MAC address with the IP address of another host. The result is that any traffic meant for that IP address will be sent to the attacker.&lt;br /&gt;
&lt;br /&gt;
In the ettercap GUI, from the sniff menu, choose &amp;quot;Unified Sniffing&amp;quot; and then the network interface in the opening window. &lt;br /&gt;
&lt;br /&gt;
The next step is host scanning. Click the &amp;quot;Hosts&amp;quot; menu and then click &amp;quot;Scan for hosts&amp;quot;. When the scan is finished, click the &amp;quot;Hosts&amp;quot; menu and then click on &amp;quot;Host List&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
If Ettercap found any hosts on your network, it can be added as a target by clicking on it and choosing &amp;quot;Add to target 1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Mitm&amp;quot; menu, select &amp;quot;Arp Poisoning&amp;quot;, then select “Sniff Remote Connection” and click “OK”.&lt;br /&gt;
&lt;br /&gt;
Finally, click the &amp;quot;Start&amp;quot; menu and select &amp;quot;start sniffing&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
Maintaining Access comes into play once we have gained access to a system. The tools in this category allow us to access it again without repeating all the tasks done initially.&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.&lt;br /&gt;
&lt;br /&gt;
To use this tunnel, you need control over a real domain (like mytunnel.com), and a server with a static public IP number that does not yet run a DNS server. Then, delegate a subdomain (say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, add these lines to the zone file: &lt;br /&gt;
&lt;br /&gt;
 tunnel1host     IN      A       10.15.213.99&lt;br /&gt;
 tunnel1         IN      NS      tunnel1host.mytunnel.com.&lt;br /&gt;
&lt;br /&gt;
Start iodined on the server. Example:&lt;br /&gt;
&lt;br /&gt;
 iodine -f 192.168.99.1 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
The first argument is the tunnel IP address and the second is the assigned domain (in this case tunnel1.mytunnel.com). The -f argument will keep iodined running in the foreground, which helps when testing. iodined will start a virtual interface, and also start listening for DNS queries on UDP port 53. Either enter a password on the commandline (-P pass) or after the server has started. Now everything is ready for the client. &lt;br /&gt;
&lt;br /&gt;
On the client side, just start iodine. It also takes two arguments, the first is the local relaying DNS server and the second is the domain used (tunnel1.mytunnnel.com). If DNS queries are allowed to any computer, you can use the tunnel endpoint (example: 10.15.213.99 or tunnel1host.mytunnel.com) as the first argument. The tunnel interface will get an IP close to the servers (in this case 192.168.99.2) and a suitable MTU. Enter the same password as on the server either by argument or after the client has started. Now you should be able to ping the other end of the tunnel from either side. &lt;br /&gt;
&lt;br /&gt;
The normal case is to route all traffic through the DNS tunnel. To do this, first add a route to the nameserver you use with the default gateway as gateway. Then replace the default gateway with the servers IP address within the DNS tunnel, and configure the server to do NAT.&lt;br /&gt;
&lt;br /&gt;
Scripts to configure the client can be found [http://dev.kryo.se/iodine/wiki/TipsAndTricks here].&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection. The weevely modules ecosystem provides a working shell interface even with no shell command execution, replacing the standard shell commands (e.g. the file editors, cd and ls, SQL cli and dump, compression utilities, port scanners, etc.) with the weevely modules.&lt;br /&gt;
&lt;br /&gt;
Example scenario: generating backdoor crypted code:&lt;br /&gt;
&lt;br /&gt;
 weevely -g -o &amp;lt;file path&amp;gt; -p password&lt;br /&gt;
&lt;br /&gt;
With this we generate a PHP shell in the intended file path.&lt;br /&gt;
&lt;br /&gt;
After this, type &#039;ls&#039; in your terminal, to see the created file.&lt;br /&gt;
&lt;br /&gt;
The next step is to get this file in the intended webserver - which is considered hacking, so this is not to be done without permission!&lt;br /&gt;
&lt;br /&gt;
If you have the file in the webserver, to connect to it, use the command:&lt;br /&gt;
&lt;br /&gt;
 weevely http://weburl/weevely.php password&lt;br /&gt;
&lt;br /&gt;
And now you have access to the webserver with weevely module.&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Cryptcat - a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. &lt;br /&gt;
&lt;br /&gt;
- ncat - a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users.&lt;br /&gt;
&lt;br /&gt;
- proxychains - redirects the traffic of an application without proxy support.&lt;br /&gt;
&lt;br /&gt;
- ptunnel - This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
The Documentation &amp;amp; Reporting menu has tools that allow us to collect the information during our security assessment and generate a human readable report from them.&lt;br /&gt;
&lt;br /&gt;
==== Dradis ==== &lt;br /&gt;
&lt;br /&gt;
This is an open source information sharing framework especially designed for security assessments.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration test productivity tool. This is designed to allow easy and straightforward data consolidation, querying, external command execution, and report generation.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
The tools in this menu are used for reversing the system by analyzing its structure from both hardware and software perspective. &lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
These tools are dedicated for analyzing wireless devices and their protocols.&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux  Password cracking with John the Ripper on Linux]&lt;br /&gt;
&lt;br /&gt;
[https://apps.ubuntu.com/cat/applications/precise/hydra-gtk/ XHydra]&lt;br /&gt;
&lt;br /&gt;
[http://backtrackhackingtutorials.blogspot.com.ee/2012/09/using-xhydra-to-hack-router-password.html Using XHydra to hack router password ]&lt;br /&gt;
&lt;br /&gt;
[https://ettercap.github.io ettercap project homepage]&lt;br /&gt;
&lt;br /&gt;
[https://pentestmag.com/ettercap-tutorial-for-windows/ ettercap tutorial for windows]&lt;br /&gt;
&lt;br /&gt;
[http://code.kryo.se/iodine/ iodine]&lt;br /&gt;
&lt;br /&gt;
[http://dev.kryo.se/iodine/wiki/HowtoSetup#Routing: iodine howto]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki weevely github wiki]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/epinna/weevely3/wiki/Harvest-other-users-credentials Harvest other users credentials]&lt;br /&gt;
&lt;br /&gt;
[http://tools.kali.org/maintaining-access/cryptcat CryptCat]&lt;br /&gt;
&lt;br /&gt;
[http://man7.org/linux/man-pages/man1/ncat.1.html Ncat Reference Guide]&lt;br /&gt;
&lt;br /&gt;
[https://anonymous-proxy-servers.net/en/help/proxychains.html proxychains]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Ettercap.png&amp;diff=121520</id>
		<title>File:Ettercap.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Ettercap.png&amp;diff=121520"/>
		<updated>2017-05-08T15:24:47Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Xhydra.png&amp;diff=121512</id>
		<title>File:Xhydra.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Xhydra.png&amp;diff=121512"/>
		<updated>2017-05-08T14:43:22Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121492</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121492"/>
		<updated>2017-05-08T13:59:45Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Privilege Escalation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- MSF: This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to find and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool written in C. &lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
This is a parallelized login cracker that can attack protocols such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB, SMBNT, MS-SQL, MySQL, REXEC, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, Cisco auth, Cisco enable, and Cisco AAA by using the Telnet module.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a comprehensive suite for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
==== Dradis ==== &lt;br /&gt;
&lt;br /&gt;
This is an open source information sharing framework especially designed for security assessments.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration test productivity tool. This is designed to allow easy and straightforward data consolidation, querying, external command execution, and report generation.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers.&lt;br /&gt;
&lt;br /&gt;
==== Ptunnel ====  &lt;br /&gt;
&lt;br /&gt;
This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121491</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121491"/>
		<updated>2017-05-08T13:55:27Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Others */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- MSF: This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to find and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool.&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
This is a parallelized login cracker that can attack protocols such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB, SMBNT, MS-SQL, MySQL, REXEC, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, Cisco auth, Cisco enable, and Cisco AAA by using the Telnet module.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a comprehensive suite for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
==== Dradis ==== &lt;br /&gt;
&lt;br /&gt;
This is an open source information sharing framework especially designed for security assessments.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration test productivity tool. This is designed to allow easy and straightforward data consolidation, querying, external command execution, and report generation.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers.&lt;br /&gt;
&lt;br /&gt;
==== Ptunnel ====  &lt;br /&gt;
&lt;br /&gt;
This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121490</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121490"/>
		<updated>2017-05-08T13:53:15Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Skipfsh */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scans the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to fnd and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool.&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
This is a parallelized login cracker that can attack protocols such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB, SMBNT, MS-SQL, MySQL, REXEC, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, Cisco auth, Cisco enable, and Cisco AAA by using the Telnet module.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a comprehensive suite for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
==== Dradis ==== &lt;br /&gt;
&lt;br /&gt;
This is an open source information sharing framework especially designed for security assessments.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration test productivity tool. This is designed to allow easy and straightforward data consolidation, querying, external command execution, and report generation.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers.&lt;br /&gt;
&lt;br /&gt;
==== Ptunnel ====  &lt;br /&gt;
&lt;br /&gt;
This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121489</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121489"/>
		<updated>2017-05-08T13:51:09Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* theHarvest */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scnas the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to fnd and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool.&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
This is a parallelized login cracker that can attack protocols such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB, SMBNT, MS-SQL, MySQL, REXEC, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, Cisco auth, Cisco enable, and Cisco AAA by using the Telnet module.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a comprehensive suite for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
==== Dradis ==== &lt;br /&gt;
&lt;br /&gt;
This is an open source information sharing framework especially designed for security assessments.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration test productivity tool. This is designed to allow easy and straightforward data consolidation, querying, external command execution, and report generation.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers.&lt;br /&gt;
&lt;br /&gt;
==== Ptunnel ====  &lt;br /&gt;
&lt;br /&gt;
This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121418</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121418"/>
		<updated>2017-05-08T07:55:14Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines. To access the security applications, use the &#039;Auditing&#039; option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
To manage applications, Synaptic Package Manager or Ubuntu Software Center can be used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Securing BackBox itself ==&lt;br /&gt;
&lt;br /&gt;
Anyone wanting to use this OS for security purposes should start off by securing BackBox itself first. As it is an Ubuntu based Linux OS, the foundation for basic OS security should be:&lt;br /&gt;
&lt;br /&gt;
- Strong passwords&lt;br /&gt;
&lt;br /&gt;
- Immediate and frequent security updates&lt;br /&gt;
&lt;br /&gt;
- Usage of official repositories, as much as possible&lt;br /&gt;
&lt;br /&gt;
- Enable firewall (UFW is integrated but disabled by default in BB)&lt;br /&gt;
&lt;br /&gt;
- Disk encryption and backups&lt;br /&gt;
&lt;br /&gt;
- Common sense&lt;br /&gt;
&lt;br /&gt;
One good eye should always be on user privileges as well, although BackBox does make extra sure to warn the user every time a security issue might arise with this (like warning users about consequences of using certain programs with root, or making sure the programs can only be used by users in certain groups). &lt;br /&gt;
&lt;br /&gt;
There is no need for antivirus software in BlackBox, unless file sharing with other operating systems, like Windows, is active.&lt;br /&gt;
&lt;br /&gt;
When using a web-browser like Mozilla, add-ons like Adguard, No-Script, BetterPrivacy should be installed.&lt;br /&gt;
&lt;br /&gt;
Java and Flash should be disabled.&lt;br /&gt;
&lt;br /&gt;
There is also an alternative to UFW - FirewallD, which has to be downloaded manually. It is more complex and has extra features, like Network Zone Management.&lt;br /&gt;
&lt;br /&gt;
This OS also has AppArmor, an application-level firewall. It confines programs to a limited set of resources. &lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ALL THE COMMANDS USED IN THIS ARTICLE ARE MEANT TO BE USED FOR EDUCATIONAL PURPOSES AND SHOULD NOT BE USED WITHOUT PERMISSION FROM THE TARGET!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts, and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
Zenmap is a multi-platform graphical Nmap frontend and results viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners while also giving experienced Nmap users advanced features.&lt;br /&gt;
&lt;br /&gt;
Zenmak can be started by searching for it from the services menu or typing it in the command line:&lt;br /&gt;
&lt;br /&gt;
 sudo zenmap&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap.png|400x450px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, type the ip address of the host that you want to scan in the Target field and select the desired profile from the Profile drop-down box:&lt;br /&gt;
&lt;br /&gt;
[[File:Zenmap_Example.png]]&lt;br /&gt;
&lt;br /&gt;
To find the scanned host’s list of open ports, port states, the services corresponding to the ports and it’s version details etc., click on the Ports/Hosts tab.&lt;br /&gt;
&lt;br /&gt;
Also it will get you the host details as well. Click on the Host Details tab in the Zenmap main interface.&lt;br /&gt;
&lt;br /&gt;
To scan your entire network, just enter the ip address series (ex. 192.168.1.0/24) of your network in the Target field of the Zenmap window. Click on Scan to start scanning your whole network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of scans are:&lt;br /&gt;
&lt;br /&gt;
- Intense scan&lt;br /&gt;
&lt;br /&gt;
Quickly scans the most common TCP ports. Will also try to determine the type of OS and services running. &lt;br /&gt;
&lt;br /&gt;
- Intense scan plus UDP&lt;br /&gt;
&lt;br /&gt;
Same as the regular Intense scan, just that we will also scan UDP ports.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, all TCP ports&lt;br /&gt;
&lt;br /&gt;
Normally Nmap scans a list of 1000 most common protocols, but this will leave no TCP ports (from 1 to 65535) unchecked.&lt;br /&gt;
&lt;br /&gt;
- Intense scan, no ping&lt;br /&gt;
&lt;br /&gt;
This scan will not ping the host and assumes it is up. Will be useful if the target has blocked ping requests.&lt;br /&gt;
&lt;br /&gt;
- Ping scan &lt;br /&gt;
&lt;br /&gt;
Pings the target, no port scanning.&lt;br /&gt;
&lt;br /&gt;
- Quick scan &lt;br /&gt;
&lt;br /&gt;
Scans only the 100 most common TCP ports.&lt;br /&gt;
&lt;br /&gt;
- Quick scan plus &lt;br /&gt;
&lt;br /&gt;
Quick scan with OS and version detection.&lt;br /&gt;
&lt;br /&gt;
- Quick traceroute &lt;br /&gt;
&lt;br /&gt;
Scan that can be used if it is nescessary to determine hosts and routers in a network scan. It does so by tracerouting and pinging all hosts defined in the target.&lt;br /&gt;
&lt;br /&gt;
- Regular scan &lt;br /&gt;
&lt;br /&gt;
A scan that will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.&lt;br /&gt;
&lt;br /&gt;
- Slow comprehensive scan&lt;br /&gt;
&lt;br /&gt;
Command: nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 –script “default or (discovery and safe)” &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Works similarly to &#039;Intense scan plus UDP&#039; only with some extra features.&lt;br /&gt;
&lt;br /&gt;
A lot of focus will be put into host detection, continuing even if the initial ping request fails. Three different protocols will be used to detect the hosts - TCP, UDP and SCTP. If host detection has succeeded, it will do its best to determine what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan camouflages itself as source port 53 (DNS).&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
Other Information gathering tools in BackBox are:&lt;br /&gt;
&lt;br /&gt;
- Recon-ng: This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
- WhatWeb: This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
- Creepy: This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
After the information is gathered, the next step should be to analyze it. That&#039;s where vulnerability Assessment tools come into play. With them, you can identify the vulnerabilities present in systems and prioritize them.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
To start off, a new admin account user should be created:&lt;br /&gt;
&lt;br /&gt;
 openvasmd --user=admin --new-password=new_password&lt;br /&gt;
&lt;br /&gt;
To run OpenVAS, simply choose &#039;OpenVAS GSA&#039; on the menu list or go to your localhost with the port given to OpenVAS (default is 9392).&lt;br /&gt;
&lt;br /&gt;
You will be promted with a login screen (Accept the self-signed SSL certificate). From there, enter the details of the user you created above and the OpenVAS web interface will open:&lt;br /&gt;
&lt;br /&gt;
[[File:OpenVAS_WebInt.png|900x650px]]&lt;br /&gt;
&lt;br /&gt;
In the opened window, create a new task and fill in the information required - type in either the name or the IP of the domain you want to target for the scan. Then click start. Once it has finished, a report will be created. You can better analyze it by exporting it to different main popular file formats such as .pdf, .txt or .html.&lt;br /&gt;
&lt;br /&gt;
OpenVAS will have grouped the possible vulnerabilities into high-, medium-, low- and log-level (information). These reports are not false proof but they help with simplifying the security assessment.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is an open-sourced web server scanner. It performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 nikto -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This scans the target host with the ip &#039;10.0.2.15&#039;.&lt;br /&gt;
&lt;br /&gt;
 nikto -T x 6 -h http://site.com&lt;br /&gt;
&lt;br /&gt;
This performs only a specific type of check against the target. In this case, a denial-of-service check. The types (and more) are written in the man file of nikto.&lt;br /&gt;
&lt;br /&gt;
 nikto -Display V -o results.txt -Format txt -Tuning 4 -h 10.0.2.15&lt;br /&gt;
&lt;br /&gt;
This performs an injection test and saves the result as a plain text file while also displaying a Verbose output in the terminal.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 Skipfish –o /user/desktop http://targetwebsite.com&lt;br /&gt;
&lt;br /&gt;
This scnas the target website and creates an output file on the location specified by &#039;-o&#039;.&lt;br /&gt;
&lt;br /&gt;
To get a list of which tests Skipfish does, visit the [https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki Google Code Archive Wiki].&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
OWASP Zed Attack Proxy tool is one of the most popular web application vulnerability finders. The main features of this tool are:&lt;br /&gt;
&lt;br /&gt;
- Proxy intercepting - Configuring your browser so that it sends all the requests and responses through ZAP. The responses and requests can also be intercepted and changed.&lt;br /&gt;
&lt;br /&gt;
- Active scanners - Performs wide range of scans on the application.&lt;br /&gt;
&lt;br /&gt;
- Passive scanners - Examines requests and responses and sometimes detects problems from doing this. It is &#039;safe&#039; to use and it runs all the time.&lt;br /&gt;
&lt;br /&gt;
- Spider - Crawls the application to find links that are usually hidden.&lt;br /&gt;
&lt;br /&gt;
- Report Generation - Generates reports of the issues found and directs to helpful pages from where you can learn how to solve them.&lt;br /&gt;
&lt;br /&gt;
- Brute Force - Using OWASP Dirbuster Tool, this feature can find files even if there are no links to them.&lt;br /&gt;
&lt;br /&gt;
- Fuzzing - For finding more subtle vulnerabilities that the automated scanners cannot usually find (using fuzzdb and OWASP JBroFuzz)&lt;br /&gt;
&lt;br /&gt;
- Extensibility - Adding additional functionalities to ZAP (code.google.com/p/zap-extensions)&lt;br /&gt;
&lt;br /&gt;
[[File:Zap.png|800x450px]]&lt;br /&gt;
&lt;br /&gt;
To use it, type in the website you want to test on the &#039;URL attack&#039; bar and press &#039;attack&#039;:&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- RIPS: This is a static source code analyzer for finding vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
- Cvechecker: The main purpose of this tool is to automatize security check by generating reports about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
This is the process of where the weakness found in the system is penetrated. This is achieved by using exploit, an automated script designed to attack the target system.&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect SQL ﬂaws. SQL-Injection is usually the most common forms of attacks and usually very effective in getting data from the target.&lt;br /&gt;
&lt;br /&gt;
Example commands:&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u http://www.examplesite.com --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases in the specified site.&lt;br /&gt;
&lt;br /&gt;
 sqlmap -u ”http://www.examplesite.com&amp;quot; --cookie=&amp;quot;security=low; PHPSESSID=l0ng4m0un10fnumb3rs4ndl3tt3rs&amp;quot; --dbs&lt;br /&gt;
&lt;br /&gt;
This command tries to find databases from the specific site while keeping the session active using the mentioned cookie.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ====&lt;br /&gt;
&lt;br /&gt;
Short for The Browser Exploitation Framework, it is a penetration testing tool that focuses on the web browser. It allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors.&lt;br /&gt;
&lt;br /&gt;
BeEF can be started from the services &amp;gt; auditing &amp;gt; exploitation menu&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF.png]]&lt;br /&gt;
&lt;br /&gt;
You need to click on one of the UI URL-s, which will open the BeEF login page on your browser.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_Auth_Page.png|800x600px]]]&lt;br /&gt;
&lt;br /&gt;
Type in the default username and password (beef &amp;amp; beef). This will open the startup page, where you can get the overview of the tool.&lt;br /&gt;
&lt;br /&gt;
[[File:BeEF_SPage.png|800x600px]]&lt;br /&gt;
&lt;br /&gt;
You can test this program out by running an apache server on your BackBox and creating a [https://youtu.be/WtLTtbe5JcM?t=383 a simple script] to hook a the intended website with BeEf. The result of this would make information about the browser used available to the BeEF user, like the browser components, the running scripts and hardware information. On the &#039;commands&#039; tab in the BeEF GUI (after you chose the active IP address from the left menu), you can extract even more data and manipulate the ongoing browser session. For example, you can redirect the intended URL to another site.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework. It is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts.&lt;br /&gt;
&lt;br /&gt;
To start it, type &#039;armitage&#039; in your terminal. This will open up a new window:&lt;br /&gt;
&lt;br /&gt;
[[File:Armitage.png]]&lt;br /&gt;
&lt;br /&gt;
Click connect and if the tool asks you if you want to start Metasploit RPC server, click &#039;yes&#039;. This will open the Armitage GUI:&lt;br /&gt;
&lt;br /&gt;
[[File:ArmitageGUI.png]]&lt;br /&gt;
&lt;br /&gt;
From this, you can create [http://www.fastandeasyhacking.com/manual#4 custom attacks] against a host. For example, you can test out yous skills on a [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ virtual machine maintained by the Metasploit project team].&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a python tool which can find, prepare, audit and exploit bugs in webapps.&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo fimap -u &amp;quot;http://IpOfWebApp/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Others ====&lt;br /&gt;
&lt;br /&gt;
- This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
- Htexploit: This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
- Joomscan: This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
- W3af: This is a GUI-based web application attack and audit framework to fnd and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
- Wpscan: This is a BackBox WordPress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool.&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
This is a parallelized login cracker that can attack protocols such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB, SMBNT, MS-SQL, MySQL, REXEC, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, Cisco auth, Cisco enable, and Cisco AAA by using the Telnet module.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
This is a comprehensive suite for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
&lt;br /&gt;
- Dictstat: This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
- Maskgen: This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Policygen: This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
- Rulegen: This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
- Hashcat: This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
- Chntpw: This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
- Crunch: This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
- Fcrackzip: This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
- Ophcrack: This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
- Pdfcrack: This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
- Truecrack: This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
- Fang: This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
- Medusa: This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
- Driftnet: This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
- Dsniff: This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
- Ngrep: This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
- Sslsniff: This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
- Sslstrip: This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
- arpspoof: This tool redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies.&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
==== Dradis ==== &lt;br /&gt;
&lt;br /&gt;
This is an open source information sharing framework especially designed for security assessments.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration test productivity tool. This is designed to allow easy and straightforward data consolidation, querying, external command execution, and report generation.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers.&lt;br /&gt;
&lt;br /&gt;
==== Ptunnel ====  &lt;br /&gt;
&lt;br /&gt;
This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== RAM wiping ====&lt;br /&gt;
&lt;br /&gt;
BackBox also offers it&#039;s users the option to wipe the computer&#039;s RAM at shutdown/reboot. Simply search for &#039;RAM Wiping&#039; on the services menu and turn it on. Pulling the PC&#039;s cord usually does the trick, but this feature makes extra sure that no data can be recovered.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous BackBox Script for Anonymous Internet Navigation]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic Using tshark to watch and inspect network-traffic]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ Tshark tutorial and filter examples]&lt;br /&gt;
&lt;br /&gt;
[https://www.unixmen.com/zenmap-a-gui-frontend-for-nmap-network-scanning-tool/ Zenmap: A GUI Frontend For Nmap Network Scanning Tool]&lt;br /&gt;
&lt;br /&gt;
[https://www.securesolutions.no/zenmap-preset-scans/ Nmap preset scans]&lt;br /&gt;
&lt;br /&gt;
[https://wald.intevation.org/svn/openvas/trunk/openvas-manager/INSTALL INSTALLATION INSTRUCTIONS FOR OPENVAS-MANAGER]&lt;br /&gt;
&lt;br /&gt;
[https://cirt.net/Nikto2 Nikto2]&lt;br /&gt;
&lt;br /&gt;
[http://dasunhegoda.com/nikto-web-vulnerability-scanner-tutorial-imawhitehat/893/ Nikto Tutorial]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]&lt;br /&gt;
&lt;br /&gt;
[http://beefproject.com/ beefproject]&lt;br /&gt;
&lt;br /&gt;
[http://www.fastandeasyhacking.com/manual armitage manual]&lt;br /&gt;
&lt;br /&gt;
[https://blog.cobaltstrike.com/2013/02/06/getting-started-with-armitage-and-the-metasploit-framework-2013/ Getting Started with Armitage and the Metasploit Framework]&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/papers/12872/ LFI/RFI testing and Exploiting with fimap]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:ArmitageGUI.png&amp;diff=121405</id>
		<title>File:ArmitageGUI.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:ArmitageGUI.png&amp;diff=121405"/>
		<updated>2017-05-08T07:26:19Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Armitage.png&amp;diff=121401</id>
		<title>File:Armitage.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Armitage.png&amp;diff=121401"/>
		<updated>2017-05-08T07:08:00Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:BeEF_SPage.png&amp;diff=121397</id>
		<title>File:BeEF SPage.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:BeEF_SPage.png&amp;diff=121397"/>
		<updated>2017-05-08T06:43:42Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:BeEF_Auth_Page.png&amp;diff=121394</id>
		<title>File:BeEF Auth Page.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:BeEF_Auth_Page.png&amp;diff=121394"/>
		<updated>2017-05-08T06:40:02Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:BeEF.png&amp;diff=121392</id>
		<title>File:BeEF.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:BeEF.png&amp;diff=121392"/>
		<updated>2017-05-08T06:34:29Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: BeEF&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;BeEF&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Zap.png&amp;diff=121380</id>
		<title>File:Zap.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Zap.png&amp;diff=121380"/>
		<updated>2017-05-08T05:43:39Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:OpenVAS_WebInt.png&amp;diff=121379</id>
		<title>File:OpenVAS WebInt.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:OpenVAS_WebInt.png&amp;diff=121379"/>
		<updated>2017-05-08T03:36:54Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: OpenVAS Web Interface&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OpenVAS Web Interface&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Zenmap_Example.png&amp;diff=121378</id>
		<title>File:Zenmap Example.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Zenmap_Example.png&amp;diff=121378"/>
		<updated>2017-05-07T23:59:36Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: Atootsi uploaded a new version of File:Zenmap Example.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Example of how to use Zenmap in BackBox OS.&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Zenmap_Example.png&amp;diff=121377</id>
		<title>File:Zenmap Example.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Zenmap_Example.png&amp;diff=121377"/>
		<updated>2017-05-07T23:54:20Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: Example of how to use Zenmap in BackBox OS.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Example of how to use Zenmap in BackBox OS.&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Zenmap.png&amp;diff=121376</id>
		<title>File:Zenmap.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Zenmap.png&amp;diff=121376"/>
		<updated>2017-05-07T23:48:02Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: BlackBox Zenmap&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;BlackBox Zenmap&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121310</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121310"/>
		<updated>2017-05-07T15:47:37Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BlackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BlackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts, and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
This is the official Nmap Security Scanner GUI frontend.&lt;br /&gt;
&lt;br /&gt;
==== Recon-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
==== WhatWeb ====&lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
==== Creepy ====This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
==== Cvechecker ====&lt;br /&gt;
&lt;br /&gt;
This is a tool that generates a report about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
==== RIPS ====&lt;br /&gt;
&lt;br /&gt;
This is a static source code analyzer for vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is a web server scanner that tests web servers for dangerous files/CGIs, outdated server software, and other problems.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
This is a web application vulnerability finder (Zed Attack Proxy by OWASP)&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect other exploiting SQL ﬂaws.&lt;br /&gt;
&lt;br /&gt;
==== MSF ====&lt;br /&gt;
&lt;br /&gt;
This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework.&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a web application auditing tool for fle inclusion bugs in web apps.&lt;br /&gt;
&lt;br /&gt;
==== Htexploit ====&lt;br /&gt;
&lt;br /&gt;
This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
==== Joomscan ====&lt;br /&gt;
&lt;br /&gt;
This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
==== W3af ====&lt;br /&gt;
&lt;br /&gt;
This is a GUI-based web application attack and audit framework to fnd and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
==== Wpscan ====&lt;br /&gt;
&lt;br /&gt;
This is a black box WordPress vulnerability scanner&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
==== Dictstat ====&lt;br /&gt;
&lt;br /&gt;
This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
==== Maskgen ====&lt;br /&gt;
&lt;br /&gt;
This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
==== Policygen ====&lt;br /&gt;
&lt;br /&gt;
This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
==== Rulegen ====&lt;br /&gt;
&lt;br /&gt;
This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
==== Hashcat ====&lt;br /&gt;
&lt;br /&gt;
This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
==== Chntpw ====&lt;br /&gt;
&lt;br /&gt;
This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
==== Crunch ====&lt;br /&gt;
&lt;br /&gt;
This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
==== Fcrackzip ====&lt;br /&gt;
&lt;br /&gt;
This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool.&lt;br /&gt;
&lt;br /&gt;
==== Ophcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
==== Pdfcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Truecrack ====&lt;br /&gt;
&lt;br /&gt;
This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
==== Fang ====&lt;br /&gt;
&lt;br /&gt;
This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
==== Medusa ====&lt;br /&gt;
&lt;br /&gt;
This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
This is a parallelized login cracker that can attack protocols such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB, SMBNT, MS-SQL, MySQL, REXEC, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, Cisco auth, Cisco enable, and Cisco AAA by using the Telnet module.&lt;br /&gt;
&lt;br /&gt;
==== Driftnet ====&lt;br /&gt;
&lt;br /&gt;
This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
==== Dsniff ==== &lt;br /&gt;
&lt;br /&gt;
This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
 This is a comprehensive suite for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
==== Ngrep ====&lt;br /&gt;
&lt;br /&gt;
This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
==== Sslsniff ====&lt;br /&gt;
&lt;br /&gt;
This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
==== Sslstrip  ====&lt;br /&gt;
&lt;br /&gt;
This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
==== Dradis ==== &lt;br /&gt;
&lt;br /&gt;
This is an open source information sharing framework especially designed for security assessments.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration test productivity tool. This is designed to allow easy and straightforward data consolidation, querying, external command execution, and report generation.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers.&lt;br /&gt;
&lt;br /&gt;
==== Ptunnel ====  &lt;br /&gt;
&lt;br /&gt;
This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous githubusercontent.com]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic linuxjournal.com]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ hackertarget.com]&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121308</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121308"/>
		<updated>2017-05-07T15:39:36Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the XFCE window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Desktop.png|thumb|center|700x350px|BlackBox Desktop View]]&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Services.png|thumb|center|400x500px|BlackBox Services Menu]]&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
Gathering information should be the first step in any security project. Without it, it would be hard to evaluate any system.&lt;br /&gt;
&lt;br /&gt;
Some of the tools used in BackBox for information gathering are:&lt;br /&gt;
&lt;br /&gt;
==== Arping ==== &lt;br /&gt;
&lt;br /&gt;
This utility sends ARP requests to the hosts on a specific subnet.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_OS_Arping.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 sudo arping -I eth0 -c 3 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
This finds out the reachability of an IP on the local Ethernet. The &#039;-I&#039; identifies the intended interface, the &#039;-c&#039; is the count of the ARP requests taken.&lt;br /&gt;
&lt;br /&gt;
==== Arp-scan ====&lt;br /&gt;
&lt;br /&gt;
This is a simple but very powerful command-line tool that can be used for system discovery and fingerprinting. It assembles and sends ARP requests to specified IP addresses, displaying any responses that are received.&lt;br /&gt;
&lt;br /&gt;
Example use is finding all local IP&#039;s and MAC addresses with this command:&lt;br /&gt;
&lt;br /&gt;
 sudo arp-scan -l&lt;br /&gt;
&lt;br /&gt;
==== Knock ====&lt;br /&gt;
&lt;br /&gt;
This is a Python script, written by Gianni &#039;guelfoweb&#039; Amato, designed to enumerate sub-domains on a target domain through a word-list.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Knock.png]]&lt;br /&gt;
&lt;br /&gt;
Example command would be this: &lt;br /&gt;
&lt;br /&gt;
 knockpy domain.com&lt;br /&gt;
&lt;br /&gt;
This would start looking for the aforementioned site&#039;s subdomains. This is helpful if you are looking for subdomain takeover vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Nbtscan ====&lt;br /&gt;
&lt;br /&gt;
This is an application to scan and get information about IP networks for NetBIOS name information.&lt;br /&gt;
&lt;br /&gt;
[[File:BB_Nbtscan.png]]&lt;br /&gt;
&lt;br /&gt;
==== theHarvest ====&lt;br /&gt;
&lt;br /&gt;
This is an information collector used to harvest e-mails, subdomains, hosts, and personal information about individuals.&lt;br /&gt;
&lt;br /&gt;
[[File:TheHarvester.png]]&lt;br /&gt;
&lt;br /&gt;
Example command:&lt;br /&gt;
&lt;br /&gt;
 theharvester -d domain.com -b google&lt;br /&gt;
&lt;br /&gt;
This would print all the email addresses in the site &#039;domain.com&#039; that can be found by the google search engine.&lt;br /&gt;
&lt;br /&gt;
==== Zenmap ====&lt;br /&gt;
&lt;br /&gt;
This is the official Nmap Security Scanner GUI frontend.&lt;br /&gt;
&lt;br /&gt;
==== Recon-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a full-featured Web Reconnaissance framework.&lt;br /&gt;
&lt;br /&gt;
==== WhatWeb ====&lt;br /&gt;
&lt;br /&gt;
This is an application that recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.&lt;br /&gt;
&lt;br /&gt;
==== Creepy ====This is a web application security assessment report generator.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
==== Cvechecker ====&lt;br /&gt;
&lt;br /&gt;
This is a tool that generates a report about possible vulnerabilities in your system by comparing the result with the information in its common vulnerability environment (CVE) database.&lt;br /&gt;
&lt;br /&gt;
==== RIPS ====&lt;br /&gt;
&lt;br /&gt;
This is a static source code analyzer for vulnerabilities in PHP web applications.&lt;br /&gt;
&lt;br /&gt;
==== OpenVAS ====&lt;br /&gt;
&lt;br /&gt;
This is a framework composed of several services and tools to deliver a comprehensive, powerful vulnerability scanning management solution.&lt;br /&gt;
&lt;br /&gt;
==== Nikto ====&lt;br /&gt;
&lt;br /&gt;
This is a web server scanner that tests web servers for dangerous files/CGIs, outdated server software, and other problems.&lt;br /&gt;
&lt;br /&gt;
==== Skipfsh ====&lt;br /&gt;
&lt;br /&gt;
This is an active web application security reconnaissance tool. It prepares an interactive sitemap for a targeted site by undertaking a recursive crawl and dictionary-based probes.&lt;br /&gt;
&lt;br /&gt;
==== ZAP ====&lt;br /&gt;
&lt;br /&gt;
This is a web application vulnerability finder (Zed Attack Proxy by OWASP)&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
==== Sqlmap ====&lt;br /&gt;
&lt;br /&gt;
This is an automated tool to detect other exploiting SQL ﬂaws.&lt;br /&gt;
&lt;br /&gt;
==== MSF ====&lt;br /&gt;
&lt;br /&gt;
This is a useful auditing tool that contains a lot of exploits and a development environment to modify or create them.&lt;br /&gt;
&lt;br /&gt;
==== Armitage ====&lt;br /&gt;
&lt;br /&gt;
This is the graphical frontend of the Metasploit Framework.&lt;br /&gt;
&lt;br /&gt;
==== Fimap ====&lt;br /&gt;
&lt;br /&gt;
This is a web application auditing tool for fle inclusion bugs in web apps.&lt;br /&gt;
&lt;br /&gt;
==== Htexploit ====&lt;br /&gt;
&lt;br /&gt;
This is a useful tool to exploit the .htaccess files&lt;br /&gt;
&lt;br /&gt;
==== Joomscan ====&lt;br /&gt;
&lt;br /&gt;
This is a tool that detects file inclusion, SQL injection, and command execution vulnerabilities of a targeted website that uses Joomla.&lt;br /&gt;
&lt;br /&gt;
==== W3af ====&lt;br /&gt;
&lt;br /&gt;
This is a GUI-based web application attack and audit framework to fnd and exploit the vulnerabilities detected.&lt;br /&gt;
&lt;br /&gt;
==== Wpscan ====&lt;br /&gt;
&lt;br /&gt;
This is a black box WordPress vulnerability scanner&lt;br /&gt;
&lt;br /&gt;
== Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
==== Dictstat ====&lt;br /&gt;
&lt;br /&gt;
This is a password profling tool.&lt;br /&gt;
&lt;br /&gt;
==== Maskgen ====&lt;br /&gt;
&lt;br /&gt;
This is an analyzer for output fle produced by DictGen to generate optimal password mask collection for input to the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
==== Policygen ====&lt;br /&gt;
&lt;br /&gt;
This tool helps to generate passwords to be compliant for many policies.&lt;br /&gt;
&lt;br /&gt;
==== Rulegen ====&lt;br /&gt;
&lt;br /&gt;
This implements password analysis and rule generation for the Hashcat password cracker.&lt;br /&gt;
&lt;br /&gt;
==== Hashcat ====&lt;br /&gt;
&lt;br /&gt;
This is incredibly the fastest CPU-based password recovery tool.&lt;br /&gt;
&lt;br /&gt;
==== Chntpw ====&lt;br /&gt;
&lt;br /&gt;
This is a utility used for resetting or blanking local passwords in Wintel systems.&lt;br /&gt;
&lt;br /&gt;
==== Crunch ====&lt;br /&gt;
&lt;br /&gt;
This is a wordlist generator where you can specify a standard character set.&lt;br /&gt;
&lt;br /&gt;
==== Fcrackzip ====&lt;br /&gt;
&lt;br /&gt;
This is a fast password cracker partly written in assembler.&lt;br /&gt;
&lt;br /&gt;
==== John ====&lt;br /&gt;
&lt;br /&gt;
This (also known as John the Ripper) is a password cracking software tool.&lt;br /&gt;
&lt;br /&gt;
==== Ophcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a Windows password cracker based on rainbow tables.&lt;br /&gt;
&lt;br /&gt;
==== Pdfcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a tool for recovering passwords and content from PDF fles.&lt;br /&gt;
&lt;br /&gt;
==== Truecrack ====&lt;br /&gt;
&lt;br /&gt;
This is a brute-force password cracker for TrueCrypt (Copyright) volume fles.&lt;br /&gt;
&lt;br /&gt;
==== Fang ====&lt;br /&gt;
&lt;br /&gt;
This is a multiservice threaded MD5 cracker.&lt;br /&gt;
&lt;br /&gt;
==== Medusa ====&lt;br /&gt;
&lt;br /&gt;
This is a speedy, massively parallel, modular, login brute-force attacker, supporting many protocols.&lt;br /&gt;
&lt;br /&gt;
==== Xhydra ====&lt;br /&gt;
&lt;br /&gt;
This is a parallelized login cracker that can attack protocols such as TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, LDAP, SMB, SMBNT, MS-SQL, MySQL, REXEC, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, Cisco auth, Cisco enable, and Cisco AAA by using the Telnet module.&lt;br /&gt;
&lt;br /&gt;
==== Driftnet ====&lt;br /&gt;
&lt;br /&gt;
This is an application that listens to network traffc and picks out images from the TCP streams it observes.&lt;br /&gt;
&lt;br /&gt;
==== Dsniff ==== &lt;br /&gt;
&lt;br /&gt;
This is a network traffc sniffer that analyzes and parses different application protocols by extracting the relevant information.&lt;br /&gt;
&lt;br /&gt;
==== Ettercap ====&lt;br /&gt;
&lt;br /&gt;
 This is a comprehensive suite for man-in-the-middle attacks. It has a user-friendly GUI interface and supports passive and active dissection of the amount of protocols.&lt;br /&gt;
&lt;br /&gt;
==== Ngrep ====&lt;br /&gt;
&lt;br /&gt;
This (also known as network grep) is a network packet analyzer.&lt;br /&gt;
&lt;br /&gt;
==== Sslsniff ====&lt;br /&gt;
&lt;br /&gt;
This is an SSL traffc sniffer.&lt;br /&gt;
&lt;br /&gt;
==== Sslstrip  ====&lt;br /&gt;
&lt;br /&gt;
This is a sniffer against secure socket layer protocol.&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
==== Dradis ==== &lt;br /&gt;
&lt;br /&gt;
This is an open source information sharing framework especially designed for security assessments.&lt;br /&gt;
&lt;br /&gt;
==== MagicTree ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration test productivity tool. This is designed to allow easy and straightforward data consolidation, querying, external command execution, and report generation.&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Honeyd ==== &lt;br /&gt;
&lt;br /&gt;
This is a small daemon that creates virtual hosts on a network.&lt;br /&gt;
&lt;br /&gt;
==== Thpot ==== &lt;br /&gt;
&lt;br /&gt;
This is a tiny honeypot to set up simple and fake services.&lt;br /&gt;
&lt;br /&gt;
==== SET ==== &lt;br /&gt;
&lt;br /&gt;
This (also known as Social-Engineer Toolkit) is designed to perform attacks against human interaction.&lt;br /&gt;
&lt;br /&gt;
==== BeEF ==== &lt;br /&gt;
&lt;br /&gt;
This is a penetration testing tool that focuses on web browsers.&lt;br /&gt;
&lt;br /&gt;
==== Websploit ==== &lt;br /&gt;
&lt;br /&gt;
This is used to scan and analyze remote systems in order to fnd various types of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
==== Iodine ====&lt;br /&gt;
&lt;br /&gt;
This is a free (ISC licensed) tunnel application to forward IPv4 traffc through DNS servers.&lt;br /&gt;
&lt;br /&gt;
==== Ptunnel ====  &lt;br /&gt;
&lt;br /&gt;
This is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies&lt;br /&gt;
&lt;br /&gt;
==== Weevely ====  &lt;br /&gt;
&lt;br /&gt;
This is a stealth PHP web shell that simulates a telnet-like connection&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
==== Bokken ==== This is a GUI for the Pyew and Radare projects, so it offers almost all the same features that Pyew has and some features of Radare as well. It&#039;s intended to be a basic disassembler, mainly to analyze malware and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Dissy ==== &lt;br /&gt;
&lt;br /&gt;
This is a graphical frontend to the objdump disassembler.&lt;br /&gt;
&lt;br /&gt;
==== Flasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a command-line assembler/disassembler of Flash ActionScript bytecode.&lt;br /&gt;
&lt;br /&gt;
==== Ghex ==== &lt;br /&gt;
&lt;br /&gt;
This is a simple binary GUI hex editor.&lt;br /&gt;
&lt;br /&gt;
==== Nasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a network wide assembler tool.&lt;br /&gt;
&lt;br /&gt;
==== Ndisasm ==== &lt;br /&gt;
&lt;br /&gt;
This is a Netwide Disassembler, an 80 x 86 binary fle disassembler.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Aircrack-ng ====&lt;br /&gt;
&lt;br /&gt;
This is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.&lt;br /&gt;
&lt;br /&gt;
==== Mdk3 ==== &lt;br /&gt;
&lt;br /&gt;
This is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Pyrit ==== &lt;br /&gt;
&lt;br /&gt;
This is an application GPGPU-driven WPA/WPA2-PSK key cracker.&lt;br /&gt;
&lt;br /&gt;
==== Reaver ==== &lt;br /&gt;
&lt;br /&gt;
This is an application to perform brute-force attacks against Wi-Fi Protected Setup (WPS)&lt;br /&gt;
&lt;br /&gt;
==== Wifte ==== &lt;br /&gt;
&lt;br /&gt;
This is an automated wireless auditing tool.&lt;br /&gt;
&lt;br /&gt;
==== Wirouterkeyrec ==== &lt;br /&gt;
&lt;br /&gt;
This is a tool to recover the default WPA passphrases of supported router models.&lt;br /&gt;
&lt;br /&gt;
==== Kismet ==== &lt;br /&gt;
&lt;br /&gt;
This is an 802.11 layer2 wireless network identifer and passive data package collector&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
==== Anonymous mode ==== &lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
==== Sipcrack ====&lt;br /&gt;
&lt;br /&gt;
This is a set of utilities to perform sniffng and cracking of SIP protocols.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://forum.backbox.org/ BackBox Official Forum]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous githubusercontent.com]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic linuxjournal.com]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ hackertarget.com]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:TheHarvester.png&amp;diff=121156</id>
		<title>File:TheHarvester.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:TheHarvester.png&amp;diff=121156"/>
		<updated>2017-05-07T04:07:52Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: BlackBox OS TheHarvester&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;BlackBox OS TheHarvester&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:BB_Nbtscan.png&amp;diff=121150</id>
		<title>File:BB Nbtscan.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:BB_Nbtscan.png&amp;diff=121150"/>
		<updated>2017-05-07T03:48:47Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:BB_Knock.png&amp;diff=121149</id>
		<title>File:BB Knock.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:BB_Knock.png&amp;diff=121149"/>
		<updated>2017-05-07T03:12:04Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: BlackBox Knock&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;BlackBox Knock&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:BB_OS_Arping.png&amp;diff=121148</id>
		<title>File:BB OS Arping.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:BB_OS_Arping.png&amp;diff=121148"/>
		<updated>2017-05-07T00:22:09Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:BB_Desktop.png&amp;diff=121147</id>
		<title>File:BB Desktop.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:BB_Desktop.png&amp;diff=121147"/>
		<updated>2017-05-06T23:05:30Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: BlackBox Desktop View&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;BlackBox Desktop View&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:BB_Services.png&amp;diff=121146</id>
		<title>File:BB Services.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:BB_Services.png&amp;diff=121146"/>
		<updated>2017-05-06T22:58:08Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: BlackBox Services&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;BlackBox Services&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121060</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121060"/>
		<updated>2017-05-06T04:13:06Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the Xfe window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines.&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
== Anonymous mode ==&lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
== Other Useful Features ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous githubusercontent.com]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic linuxjournal.com]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ hackertarget.com]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121059</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121059"/>
		<updated>2017-05-06T04:10:22Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the Xfe window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines.&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
== Anonymous mode ==&lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessment ==&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
== Documentation and Reporting ==&lt;br /&gt;
&lt;br /&gt;
== Social Engineering ==&lt;br /&gt;
&lt;br /&gt;
== Maintaining Access ==&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous githubusercontent.com]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic linuxjournal.com]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ hackertarget.com]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121058</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=121058"/>
		<updated>2017-05-06T04:07:37Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= BackBox Linux =&lt;br /&gt;
&lt;br /&gt;
== What is BackBox ==&lt;br /&gt;
&lt;br /&gt;
BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop environment for network and systems analysis, penetration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools.  It runs a desktop environment based on the Xfe window manager, which makes it very easy to use.&lt;br /&gt;
&lt;br /&gt;
=== BackBox Features ===&lt;br /&gt;
* Forensic Analysis&lt;br /&gt;
* Information Gathering&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Exploitation&lt;br /&gt;
* Privilege Escalation&lt;br /&gt;
* Maintaining Access&lt;br /&gt;
* Social Engineering&lt;br /&gt;
* Wireless Analysis&lt;br /&gt;
* Documentation and Reporting&lt;br /&gt;
* Reverse Engineering&lt;br /&gt;
* VoIP Analysis&lt;br /&gt;
&lt;br /&gt;
== Installing and Tuning ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/portal/blog/backbox-linux-47-released System requirements for the latest version (4.7)]:&lt;br /&gt;
&lt;br /&gt;
* 32-bit or 64-bit processor&lt;br /&gt;
* 1024 MB of system memory (RAM)&lt;br /&gt;
* 10 GB of disk space for installation&lt;br /&gt;
* Graphics card capable of 800×600 resolution&lt;br /&gt;
* DVD-ROM drive or USB port (3 GB)&lt;br /&gt;
&lt;br /&gt;
Since this is a free and open sourced project, [https://backbox.org/download BackBox Linux .iso] file can be downloaded from the projects homepage. The installation and tweaking of the system follows up the usual Ubuntu/Debian guide lines.&lt;br /&gt;
&lt;br /&gt;
After the installation, the user can start configuring and using the services available in this operating system. This can be achieved by simply left-clicking on the blue &#039;B&#039; button on the upper-left corner.&lt;br /&gt;
&lt;br /&gt;
== Anonymous mode ==&lt;br /&gt;
&lt;br /&gt;
This feature allows the use of Tor as an integrated feature, so the users are guaranteed anonymity when they surf the web. &lt;br /&gt;
&lt;br /&gt;
To achieve this, push the blue button on the upper left corner, search &#039;tor&#039; and then choose &#039;tor start&#039; (or use the terminal command &#039;sudo service tor start&#039;). After this, start the anonymous application, located at anonymous &amp;gt; anonymous start (or run terminal command &#039;anonymous start&#039;). When this is done, you need to configure (with admin privileges) your /etc/tor/torrc file and add the following to it:&lt;br /&gt;
&lt;br /&gt;
 VirtualAddrNetwork 10.192.0.0/10&lt;br /&gt;
 AutomapHostsOnResolve 1&lt;br /&gt;
 TransPort 9040&lt;br /&gt;
 DNSPort 53&lt;br /&gt;
&lt;br /&gt;
After this, restart the tor service:&lt;br /&gt;
&lt;br /&gt;
 sudo service tor restart&lt;br /&gt;
&lt;br /&gt;
Then start the anonymous application again. In the opened terminal window, the application will let you know that it has stopped the service network-manager, killed certain processes to prevent leaks and changed your MAC address (anonymous cannot change the MAC address in a virtual machine). Then it will ask weather the local hostname should be changed and if traffic should be transparently routed through tor. After this, you can check your settings with the command:&lt;br /&gt;
&lt;br /&gt;
 anonymous status&lt;br /&gt;
&lt;br /&gt;
You can check weather your tor service is operable by going to [https://check.torproject.org/ check.torproject.org]. You can also check weather your IP address has changed by going to [http://whatismyipaddress.com/ whatismyipaddress] website.&lt;br /&gt;
&lt;br /&gt;
== Wireless Analysis ==&lt;br /&gt;
&lt;br /&gt;
==== Wireshark ====&lt;br /&gt;
&lt;br /&gt;
Formerly known as Etheral, it is the world&#039;s foremost network protocol analyzer.&lt;br /&gt;
&lt;br /&gt;
To start capturing packets with your user, first you need to make sure that your user belongs to the usergroup named &#039;wireshark&#039;. To be sure of that, use this command:&lt;br /&gt;
&lt;br /&gt;
 grep &#039;wireshark&#039; /etc/group&lt;br /&gt;
&lt;br /&gt;
If your username does not appear in the following output, it is not part of the group. To add your user to the group, use the following command:&lt;br /&gt;
 &lt;br /&gt;
 sudo usermod -a -G wireshark yourusername&lt;br /&gt;
&lt;br /&gt;
Now you can oped the Wireshark GUI, choose the network interface that is functional and start capturing and analyzing packets.&lt;br /&gt;
&lt;br /&gt;
===== Tshark =====&lt;br /&gt;
&lt;br /&gt;
A terminal oriented version of Wireshark. For example, to start off, you would want to know the available interfaces you can use with the command:&lt;br /&gt;
&lt;br /&gt;
 sudo tshark -D&lt;br /&gt;
&lt;br /&gt;
An example of capturing network data with tshark:&lt;br /&gt;
&lt;br /&gt;
 tshark -eth0 -c 100 -w log.pcap&lt;br /&gt;
&lt;br /&gt;
This will capture 100 network packets and save them into a file called log.pcap.&lt;br /&gt;
&lt;br /&gt;
With the following example, we extract data from any HTTP request. The &#039;-Y&#039; is used to request filters, &#039;-T&#039; is used to specify the extract process and the &#039;-e&#039; is used to identify the wanted fields:&lt;br /&gt;
&lt;br /&gt;
 tshark -i eth0 -Y HTTP.request -T fields -e http.host -e http.user_agent&lt;br /&gt;
&lt;br /&gt;
This command basically prints out the same output as Wireshark GUI:&lt;br /&gt;
&lt;br /&gt;
 tshark -r ~/dhcp.pcap -V frame.number == 1&lt;br /&gt;
&lt;br /&gt;
==== Tcpdump ====&lt;br /&gt;
&lt;br /&gt;
A command line packet sniffer that prints out a description of the contents of packets on a network interface that match the boolean expression.&lt;br /&gt;
&lt;br /&gt;
Command to capture data from a certain interface:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump -i eth0&lt;br /&gt;
&lt;br /&gt;
Commant that prints out all packets arriving or departing from host PC1:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1&lt;br /&gt;
&lt;br /&gt;
Command that prints all IP packets between PC1 and not PC2:&lt;br /&gt;
&lt;br /&gt;
 sudo tcpdump host PC1 and not PC2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[https://backbox.org/ BackBox homepage]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.backbox.org/ BackBox Wiki]&lt;br /&gt;
&lt;br /&gt;
[https://raw.githubusercontent.com/4nto/backbox-anonymous/master/usr/sbin/anonymous githubusercontent.com]&lt;br /&gt;
&lt;br /&gt;
[http://www.linuxjournal.com/content/using-tshark-watch-and-inspect-network-traffic linuxjournal.com]&lt;br /&gt;
&lt;br /&gt;
[https://hackertarget.com/tshark-tutorial-and-filter-examples/ hackertarget.com]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=120978</id>
		<title>BackBox OS</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=BackBox_OS&amp;diff=120978"/>
		<updated>2017-05-04T19:34:17Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: Created page with &amp;quot;=== BackBox Operating System ===&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== BackBox Operating System ===&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=120975</id>
		<title>OSadmin wiki article</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=120975"/>
		<updated>2017-05-04T18:50:52Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Chosen topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Intro=&lt;br /&gt;
*Choose a topic from personal experience related with the subject or from topics found on the wiki page&lt;br /&gt;
*[[#Chosen_topics|Write the topic here]].&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
*Inform the [[Operating_systems#Lecturer|lecturer]] when the article is finished&lt;br /&gt;
*Receive feedback for corrections&lt;br /&gt;
&lt;br /&gt;
=Requirements for the wiki article=&lt;br /&gt;
Author: name, group and date when the article is written&lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Covers points what will be discussed in the article, what are the requirements for the article reader; what are the operating system’s requirements. &lt;br /&gt;
&lt;br /&gt;
==Contents==&lt;br /&gt;
All commands should be easily separable from the overall text. &lt;br /&gt;
Users should be able to copy the commands directly (additional info like prompt and user distinction symbols should be left out from the command description area)&lt;br /&gt;
The text should determine what user permissions are needed to perform these tasks. &lt;br /&gt;
The reader of your article is your fellow students, so try to avoid irrelevant information and stay on topic (don’t explain the meaning of IP address or how to install Ubuntu, when your topic is actually about htop)&lt;br /&gt;
All the content should be referenced. &lt;br /&gt;
Do not use slang and try to be grammatically correct.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bear in mind that this is an open environment, so everything you write in your wiki article, will be public. &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Referencing==&lt;br /&gt;
Best practises of wiki referencing should be used. &lt;br /&gt;
Terms are but between square brackets to reference other articles in the system.&lt;br /&gt;
All drawing and images have to be referenced below the picture and in the text. (for example “System architecture can be viewed on image x, y and z.”)&lt;br /&gt;
Author’s own ideas have to be clearly presentable. Everything used from the sources have to be referenced. &lt;br /&gt;
&lt;br /&gt;
==Fellow student review==&lt;br /&gt;
Please find a fellow student who will review your article and give a feedback on the discussion tab of the article using [http://enos.itcollege.ee/~edmund/materials/viki-artikkel/Assessment-model-for-the-wiki-article.html the following assessment model].&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
Besides a short overview, what was discussed in this article, it should also include the author&#039;s own opinion about the topic. &lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
Add the following category to the end of the article (last row):&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=Chosen topics=&lt;br /&gt;
Please write here your topic and name, group:&lt;br /&gt;
* &#039;&#039;&#039;Fedora OS&#039;&#039;&#039;; Anamul Hoque Shihab; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Basic Automation with Python&#039;&#039;&#039;; Ardi Vaba; CSE-11&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/SSH_Encryption &#039;&#039;&#039;SSH Encryption&#039;&#039;&#039;], Frank Korving, CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Translation of OSadmin wiki help page to English [[https://wiki.itcollege.ee/index.php/Osadmin_spikker]]&#039;&#039;&#039;; Peep Kuulme; CSE-11&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Cross-Site_Scripting_(XSS)_attacks &#039;&#039;&#039;Cross-Site Scripting&#039;&#039;&#039;]; Masaki Ihara; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/Auditd &#039;&#039;&#039;Auditd - Linux system monitoring with audit daemon&#039;&#039;&#039;], Nika Ptskialadze, CSE-11&lt;br /&gt;
* &#039;&#039;&#039;GNU Privacy Guard (GnuPG)&#039;&#039;&#039;; Patricia Bruno Barbosa; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/BackBox_OS &#039;&#039;&#039;BackBox OS&#039;&#039;&#039;]; Ats Tootsi; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/Apparmor_and_its_usage &#039;&#039;&#039;Apparmor and its usage&#039;&#039;&#039;], Mikus, CSE-11&lt;br /&gt;
*&#039;&#039;&#039;&#039;Arch Linux&#039;&#039;&#039;&#039;;Farhan Nayeem Islam;CSE-C11&lt;br /&gt;
* &#039;&#039;&#039;&#039;VPN basics&#039;&#039;&#039;&#039;, Christian Cataldo, CSE-C11; [https://wiki.itcollege.ee/index.php/VPN_(English_version)]&lt;br /&gt;
* &#039;&#039;Translation of DDoS Wiki page[[https://wiki.itcollege.ee/index.php/DDoS_Eng]]&#039;&#039;&#039;; Andris Männik; CSE-11&lt;br /&gt;
*&#039;&#039;&#039;Translation of Ps Wiki page[[https://wiki.itcollege.ee/index.php/Ps]]&#039;&#039;&#039;&#039;&#039;; Christopher Carr; CSE-11&lt;br /&gt;
*&#039;&#039;&#039;Translation of Bash_Shell wiki page[[https://wiki.itcollege.ee/index.php/BASH_shell_en]]&#039;&#039;&#039;; Steven Rugam; CSE-11&lt;br /&gt;
*&#039;&#039;&#039;Pass: The Standard Unix Password Manager&#039;&#039;&#039;; Oliver Rahula; CSE-11&lt;br /&gt;
*&#039;&#039;&#039;Rsync&#039;&#039;&#039;; Eriks Ocakovskis; C11&lt;br /&gt;
==Ideas==&lt;br /&gt;
* UNIX CLI password manager https://www.passwordstore.org and its GUI http://qtpass.org/&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Osadmin_referaadi_teemad counterpart article in Estonian]&lt;br /&gt;
* http://manpage.io&lt;br /&gt;
* https://linuxjourney.com/&lt;br /&gt;
* [https://linux.die.net/man/ Linux man-pages]&lt;br /&gt;
* [https://linux.die.net Linux docs]&lt;br /&gt;
* http://www.tecmint.com/60-commands-of-linux-a-guide-from-newbies-to-system-administrator/&lt;br /&gt;
* http://www.tecmint.com/useful-linux-commands-for-system-administrators/&lt;br /&gt;
* http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html&lt;br /&gt;
* http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=119816</id>
		<title>OSadmin wiki article</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=119816"/>
		<updated>2017-04-03T14:52:11Z</updated>

		<summary type="html">&lt;p&gt;Atootsi: /* Chosen topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Intro=&lt;br /&gt;
*Choose a topic from personal experience related with the subject or from topics found on the wiki page&lt;br /&gt;
*[[#Chosen_topics|Write the topic here]].&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
*Inform the [[Operating_systems#Lecturer|lecturer]] when the article is finished&lt;br /&gt;
*Receive feedback for corrections&lt;br /&gt;
&lt;br /&gt;
=Requirements for the wiki article=&lt;br /&gt;
Author: name, group and date when the article is written&lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Covers points what will be discussed in the article, what are the requirements for the article reader; what are the operating system’s requirements. &lt;br /&gt;
&lt;br /&gt;
==Contents==&lt;br /&gt;
All commands should be easily separable from the overall text. &lt;br /&gt;
Users should be able to copy the commands directly (additional info like prompt and user distinction symbols should be left out from the command description area)&lt;br /&gt;
The text should determine what user permissions are needed to perform these tasks. &lt;br /&gt;
The reader of your article is your fellow students, so try to avoid irrelevant information and stay on topic (don’t explain the meaning of IP address or how to install Ubuntu, when your topic is actually about htop)&lt;br /&gt;
All the content should be referenced. &lt;br /&gt;
Do not use slang and try to be grammatically correct.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bear in mind that this is an open environment, so everything you write in your wiki article, will be public. &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Referencing==&lt;br /&gt;
Best practises of wiki referencing should be used. &lt;br /&gt;
Terms are but between square brackets to reference other articles in the system.&lt;br /&gt;
All drawing and images have to be referenced below the picture and in the text. (for example “System architecture can be viewed on image x, y and z.”)&lt;br /&gt;
Author’s own ideas have to be clearly presentable. Everything used from the sources have to be referenced. &lt;br /&gt;
&lt;br /&gt;
==Fellow student review==&lt;br /&gt;
Please find a fellow student who will review your article and give a feedback on the discussion tab of the article using [http://enos.itcollege.ee/~edmund/materials/viki-artikkel/Assessment-model-for-the-wiki-article.html the following assessment model].&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
Besides a short overview, what was discussed in this article, it should also include the author&#039;s own opinion about the topic. &lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
Add the following category to the end of the article (last row):&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=Chosen topics=&lt;br /&gt;
Please write here your topic and name, group:&lt;br /&gt;
* &#039;&#039;&#039;Basic Automation with Python&#039;&#039;&#039;; Ardi Vaba; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;SSH Encryption&#039;&#039;&#039;; Frank Korving; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Translation of OSadmin wiki help page to English [[https://wiki.itcollege.ee/index.php/Osadmin_spikker]]&#039;&#039;&#039;; Peep Kuulme; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;XSS Attack Vectors&#039;&#039;&#039;; Masaki Ihara; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/Auditd &#039;&#039;&#039;Auditd - Linux system monitoring with audit daemon&#039;&#039;&#039;], Nika Ptskialadze, CSE-11&lt;br /&gt;
* &#039;&#039;&#039;GNU Privacy Guard (GnuPG)&#039;&#039;&#039;; Patricia Bruno Barbosa; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;BackBox OS&#039;&#039;&#039;; Ats Tootsi; CSE-11&lt;br /&gt;
&lt;br /&gt;
==Ideas==&lt;br /&gt;
* UNIX CLI password manager https://www.passwordstore.org and its GUI http://qtpass.org/&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Osadmin_referaadi_teemad counterpart article in Estonian]&lt;br /&gt;
* http://manpage.io&lt;br /&gt;
* https://linuxjourney.com/&lt;br /&gt;
* [https://linux.die.net/man/ Linux man-pages]&lt;br /&gt;
* [https://linux.die.net Linux docs]&lt;br /&gt;
* http://www.tecmint.com/60-commands-of-linux-a-guide-from-newbies-to-system-administrator/&lt;br /&gt;
* http://www.tecmint.com/useful-linux-commands-for-system-administrators/&lt;br /&gt;
* http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html&lt;br /&gt;
* http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Atootsi</name></author>
	</entry>
</feed>