Posts

Showing posts from January, 2012

NetBruteScanner (hack tools)

Image
NetBrute scans a range of IP addresses for shared resources that have been shared via Microsoft File and Printer Sharing. In addition, any SMB compatible shared resources will show (i.e. Samba Servers on a Unix/Linux machine). It is to be used by system administrators or home users to see what types of resources are shared and to warn the computer users if any unsecured resources are displayed. Ideally, only folders and printers should be shared if it is intended for the whole world to access them. If the folders and printers are not intended for the whole world, then passwords should be applied to the resources.  WebBrute attempts a brute force userid and password attack on an HTTP Authenticated web site that is using "Basic Authentication". It is to be used by webmasters or system administrators to test the strength of their userid and password scheme on Basic Authenticated web sites. Ideally, all passwords will be at least eight characters

OstroSoft Internet Tools (hack tools)

Image
OstroSoft Internet Tools is integrated set of network information utilities. It is intended for use by network, domain and systems administrators, network security professionals, Internet users and everyone who wants to know more about network and Internet. It gives you such vital information as: which computers on domain are running specified service - for example: how many newsservers are available on domain (Domain Scanner) what network services are running on specified computer (remote or local) - for example: Web server, telnet, mailserver, FTP, finger, etc. (Port Scanner) let you test if remote host is running, accessible from your system, and how long it takes to reach it (Ping) shows you the path TCP packet takes from your system to remote host (Traceroute) shows you the information about active connections on you computer (Netstat) resolves host names to IP addresses and vice versa (Host Resolver - dns) returns contact information (address, phone, fax, adm

Colasoft MAC Scanner (hack tools)

Image
 Colasoft MAC Scanner allows to scan the network and get a list of MAC addresses along with IP address, machine name, and manufacturer's information. It can automatically detect all subnets according to the IP addresses configured on multiple NICs of a machine. It supports multi-threaded scanning.  Click to download

How to Disable the Ability to Right Click on the Desktop ?

Image
This tweak removes the context menu that would normally appear when the user right clicks on the desktop or in the Explorer right results pane. Open your registry and find the key below. Create a new DWORD value, or modify the existing value called 'NoViewContextMenu' using the settings below. Exit your registry, you may need to restart or log out of Windows for the change to take effect. Settings: User Key: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ Explorer] System Key: [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\ Explorer] Name: NoViewContextMenu Type: REG_DWORD (DWORD Value) Value: (0 = disabled, 1 = enabled)

Httprint (hack - fingerprinting tool)

Image
    Introduction httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. More details on how httprint works can be found in the Introduction to HTTP fingerprinting paper. It is printer-friendly.   Features Identification of web servers despite the banner string and any other obfuscation. httprint can successfully identify the underlying web servers when their headers are mangled by either patching the binary, by modules such as mod_security.c or by commercial products such as ServerMask.