{"id":1276,"date":"2014-08-02T11:24:46","date_gmt":"2014-08-02T14:24:46","guid":{"rendered":"http:\/\/gianfratti.com\/?p=1276"},"modified":"2017-08-02T11:30:39","modified_gmt":"2017-08-02T14:30:39","slug":"lista-com-ferramentas-de-seguranca-e-pentest","status":"publish","type":"post","link":"https:\/\/gianfratti.com\/index.php\/lista-com-ferramentas-de-seguranca-e-pentest\/","title":{"rendered":"Lista com ferramentas de seguran\u00e7a e pentest"},"content":{"rendered":"<p>No post de hoje, queria compartilhar com voc\u00eas uma vers\u00e3o da lista de ferramentas de seguran\u00e7a.<!--more--><\/p>\n<div>1. Anubis (Web oficial:\u00a0<a href=\"http:\/\/flu-project.blogspot.com.es\/p\/herramientas-de-flu-project.html\">http:\/\/flu-project.blogspot.com.es\/p\/herramientas-de-flu-project.html<\/a>)<br \/>\n2. Maltego (Web oficial:\u00a0<a href=\"http:\/\/www.paterva.com\/web5\/\">http:\/\/www.paterva.com\/web5\/<\/a>)<br \/>\n3. Nslookup (Informaci\u00f3n:\u00a0<a href=\"http:\/\/es.wikipedia.org\/wiki\/Nslookup\">http:\/\/es.wikipedia.org\/wiki\/Nslookup<\/a>)<br \/>\n4. Dig (Informaci\u00f3n:\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Dig_%28Command%29\">http:\/\/en.wikipedia.org\/wiki\/Dig_%28Command%29<\/a>)<br \/>\n5. Visualroute (Programa:\u00a0<a href=\"http:\/\/visualroute.visualware.com\/\">http:\/\/visualroute.visualware.com\/<\/a>)<br \/>\n6. Whois (Programa:\u00a0<a href=\"http:\/\/www.whois.net\/\">http:\/\/www.whois.net\/<\/a>)<br \/>\n7. Nsauditor (Web oficial:\u00a0<a href=\"http:\/\/www.nsauditor.com\/\">http:\/\/www.nsauditor.com\/<\/a>)<br \/>\n8. Foca (Programa:\u00a0<a href=\"http:\/\/elevenpaths.com\/lab_foca.html\">http:\/\/elevenpaths.com\/lab_foca.html<\/a>)<br \/>\n9. Httprint (Web oficial:\u00a0<a href=\"http:\/\/www.net-square.com\/httprint\/\">http:\/\/www.net-square.com\/httprint\/<\/a>)<br \/>\n10. Ldap Browser (Programa:\u00a0<a href=\"http:\/\/elblogdecalles.es\/href=\">http:\/\/www.ldapbrowser.com\/<\/a>)<br \/>\n11. Archieve.org (Web oficial:\u00a0<a href=\"http:\/\/elblogdecalles.es\/www.archieve.org\">www.archieve.org<\/a>)<br \/>\n12. Yougetsignal (Web oficial:\u00a0<a href=\"http:\/\/elblogdecalles.es\/www.yougetsignal.com\">www.yougetsignal.com<\/a>)<br \/>\n13. Netcraft.com (Web oficial:\u00a0<a href=\"http:\/\/elblogdecalles.es\/www.netcraft.com\">www.netcraft.com<\/a>)<br \/>\n14. Dnsstuff (Web oficial:\u00a0<a href=\"http:\/\/elblogdecalles.es\/www.dnsstuff.com\">www.dnsstuff.com<\/a>)<br \/>\n15. Wfuzz (Informaci\u00f3n y programa:\u00a0<a href=\"http:\/\/www.edge-security.com\/wfuzz.php\">http:\/\/www.edge-security.com\/wfuzz.php<\/a>)<br \/>\n16. Nmap (Programa:\u00a0<a href=\"http:\/\/nmap.org\/download.html\">http:\/\/nmap.org\/download.html<\/a>)<br \/>\n17. Zenmap (Interfaz gr\u00e1fica de Nmap\u00a0<a href=\"http:\/\/nmap.org\/zenmap\/\">http:\/\/nmap.org\/zenmap\/<\/a>)<br \/>\n18. Shodan (Informaci\u00f3n y servicio:\u00a0<a href=\"http:\/\/www.shodanhq.com\/\">http:\/\/www.shodanhq.com\/)<\/a><br \/>\n19. Unicorn Scan (Informaci\u00f3n y programa:\u00a0<a href=\"http:\/\/www.unicornscan.org\/\">http:\/\/www.unicornscan.org\/<\/a>)<br \/>\n20. Satori<b>Aplicac\u00f5es\u00a0para clone de p\u00e1gina web<\/b><br \/>\n1. HTTrack (<a href=\"http:\/\/www.httrack.com\/\">http:\/\/www.httrack.com\/<\/a>)<br \/>\n2. FileStream Web Boomerang (<a href=\"http:\/\/www.filestream.com\/webboomerang\/\">http:\/\/www.filestream.com\/webboomerang\/<\/a>)<br \/>\n3. Website Ripper Copier (<a href=\"http:\/\/www.tensons.com\/products\/websiterippercopier\/\">http:\/\/www.tensons.com\/products\/websiterippercopier\/<\/a>)<b>Esc\u00e1ners de vulnerabilidades<\/b><br \/>\n1. GFI (Web oficial:\u00a0<a href=\"http:\/\/www.gfi.com\/languard\/\">http:\/\/www.gfi.com\/languard\/<\/a>)<br \/>\n2. MBSA (Web oficial:\u00a0<a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/cc184924.aspx\">http:\/\/technet.microsoft.com\/es-es\/security\/cc184924.aspx<\/a>)<br \/>\n3. SSS (Programa:\u00a0<a href=\"http:\/\/www.safety-lab.com\/en\/products\/securityscanner.htm\">http:\/\/www.safety-lab.com\/en\/products\/securityscanner.htm<\/a>)<br \/>\n4. WIKTO (Programa:\u00a0<a href=\"http:\/\/www.baxware.com\/wikto.htm\">http:\/\/www.baxware.com\/wikto.htm<\/a>)<br \/>\n5. ACUNETIX (Web oficial:\u00a0<a href=\"http:\/\/www.acunetix.com\/\">http:\/\/www.acunetix.com\/<\/a>)<br \/>\n6. NESSUS (Web oficial:\u00a0<a href=\"http:\/\/www.nessus.org\/nessus\/\">http:\/\/www.nessus.org\/nessus\/<\/a>)<br \/>\n7. OpenVAS (Escaner de vulnerabilidades libre derivado de Nessus:\u00a0<a href=\"http:\/\/www.openvas.org\/\">http:\/\/www.openvas.org\/<\/a>)<br \/>\n8. RETINA (Informaci\u00f3n y programa:\u00a0<a href=\"http:\/\/www.global-tools.com\/retina.htm\">http:\/\/www.global-tools.com\/retina.htm<\/a>)<br \/>\n9. WEBCRUISER (Informaci\u00f3n y programa:\u00a0<a href=\"http:\/\/sec4app.com\/\">http:\/\/sec4app.com<\/a>) (Windows)<br \/>\n10. NIKTO (Informaci\u00f3n y programa:\u00a0<a href=\"http:\/\/cirt.net\/nikto2\">http:\/\/cirt.net\/nikto2<\/a>)<br \/>\n11. FLUNYMOUS (Esc\u00e1ner de vulnerabilidades para WordPress y Moodle:\u00a0<a href=\"http:\/\/www.blogger.com\/downloadflu\/flunym0us\">http:\/\/www.flu-project.com\/downloadflu\/flunym0us<\/a>)<br \/>\n12. WP-SCAN (Informaci\u00f3n y programa:\u00a0<a href=\"http:\/\/code.google.com\/p\/wpscan\/\">http:\/\/code.google.com\/p\/wpscan\/<\/a>)<br \/>\n13. PSI Secunia (<a href=\"http:\/\/secunia.com\/products\/consumer\/psi\/sys_req\/\">http:\/\/secunia.com\/products\/consumer\/psi\/sys_req\/<\/a>)<b>Exploits\u00a0<\/b><br \/>\n1. Metasploit (Web oficial:<a href=\"http:\/\/www.metasploit.com\/\">http:\/\/www.metasploit.com\/<\/a>)<br \/>\n2. WinAUTOPWN (Programa:\u00a0<a href=\"http:\/\/24.138.163.182\/quaker\/v2\/w\/winAUTOPWN_2.5.RAR\">http:\/\/24.138.163.182\/quaker\/v2\/w\/winAUTOPWN_2.5.RAR<\/a>)<br \/>\n3. Exploit-DB [Base de datos de exploits] (<a href=\"http:\/\/www.exploit-db.com\/\">http:\/\/www.exploit-db.com\/<\/a>)<b>Malware\u00a0<\/b><br \/>\n1. FLU \u2013 (Troyano Open Source): (<a href=\"http:\/\/www.flu-project.com\/\">http:\/\/www.flu-project.com<\/a>)<br \/>\n2. Hacker defender (Tutorial (rootkit):\u00a0<a href=\"http:\/\/foro.elhacker.net\/hacking_avanzado...html\">http:\/\/foro.elhacker.net\/hacking_avanzado\u2026html<\/a>)<br \/>\n3. Netcat (Tutorial:\u00a0<a href=\"http:\/\/foro.elhacker.net\/tutoriales...html\">http:\/\/foro.elhacker.net\/tutoriales\u2026html<\/a>)<br \/>\n4. Crypcat (Programa:\u00a0<a href=\"http:\/\/sourceforge.net\/projects\/cryptcat\/\">http:\/\/sourceforge.net\/projects\/cryptcat\/<\/a>)<br \/>\n5. Rootkit Revealer (Programa:\u00a0<a href=\"http:\/\/sysinternals-rootkitrevealer.softonic.com\/\">http:\/\/sysinternals-rootkitrevealer.softonic.com\/<\/a>)<br \/>\n6. AVG AntiRootkit 1.0.0.13 (Programa:\u00a0<a href=\"http:\/\/www.grisoft.cz\/79461\">http:\/\/www.grisoft.cz\/79461<\/a>)<br \/>\n7. Ice Sword (Programa:\u00a0<a href=\"http:\/\/icesword.softonic.com\/\">http:\/\/icesword.softonic.com\/<\/a>)<br \/>\n8. Fu.exe (Rootkit:\u00a0<a href=\"http:\/\/www.wisedatasecurity.com\/herramientas\/FU_Rootkit.zip\">http:\/\/www.wisedatasecurity.com\/herramientas\/FU_Rootkit.zip<\/a>)<br \/>\n9. Ikklogger 0.1 (Keylogger\u00a0<a href=\"http:\/\/foro.elhacker.net\/analisis_y_diseno_de_malware\/iklogger_01_keylogger_hecho_por_sr_sombrero_y_thor-t139441.0.html\">http:\/\/foro.elhacker.net\/\u2026.html)<\/a><br \/>\n10. File Mon (Programa:\u00a0<a href=\"http:\/\/technet.microsoft.com\/es-es\/sysinternals\/bb896642.aspx\">http:\/\/technet.microsoft.com\/es-es\/sysinternals\/bb896642.aspx<\/a>)<br \/>\n11. Kgb Spy (Programa beta (troyano):\u00a0<a href=\"http:\/\/kgb-spy-keylogger.softonic.com\/\">http:\/\/kgb-spy-keylogger.softonic.com\/<\/a>)<br \/>\n12. Subseven (Troyano:\u00a0<a href=\"http:\/\/www.vsantivirus.com\/sub722.htm\">http:\/\/www.vsantivirus.com\/sub722.htm<\/a>)<b>Distribui\u00e7\u00f5es de Linux orientadas a auditor\u00eda\u00a0<\/b><br \/>\n1. Wifislax (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.wifislax.com\/\">www.wifislax.com<\/a>)<br \/>\n2. Wifiway (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.wifiway.org\/\">www.wifiway.org<\/a>)<br \/>\n3. Backtrack (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.backtrack-linux.org\/\">www.backtrack-linux.org<\/a>)<br \/>\n4. Samurai (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/sourceforge.net\/projects\/samurai\/\">http:\/\/sourceforge.net\/projects\/samurai\/<\/a>)<br \/>\n5. Helix (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.e-fense.com\/h3-enterprise.php\">http:\/\/www.e-fense.com\/h3-enterprise.php<\/a>)<br \/>\n6. Caine (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.caine-live.net\/\">http:\/\/www.caine-live.net\/<\/a>)<br \/>\n7. Bugtraq (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.bugtraq-team.com\/\">http:\/\/www.bugtraq-team.com<\/a>)<br \/>\n8. Kali Linux (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.kali.org\/\">http:\/\/www.kali.org<\/a>)<\/p>\n<p><b>Sniffers<\/b><br \/>\n1. Cain (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.oxid.it\/\">http:\/\/www.oxid.it<\/a>)<br \/>\n2. Wireshark (P\u00e1gina oficial:\u00a0<a href=\"http:\/\/www.wireshark.org\/\">http:\/\/www.wireshark.org<\/a>)<br \/>\n3. Ettercap (Sustituto de Cain para Linux:\u00a0<a href=\"http:\/\/ettercap.sourceforge.net\/\">http:\/\/ettercap.sourceforge.net<\/a>)<br \/>\n4. Tshark (Sniffer en modo consola del proyecto Wireshark:\u00a0<a href=\"http:\/\/www.wireshark.org\/docs\/man-pages\/tshark.html\">http:\/\/www.wireshark.org\/docs\/man-pages\/tshark.html<\/a>)<br \/>\n5. Evil Foca\u00a0<a href=\"http:\/\/elevenpaths.com\/lab_evil_foca.html\">http:\/\/elevenpaths.com\/lab_evil_foca.html<\/a><br \/>\n6. NetworkMiner\u00a0<a href=\"http:\/\/www.netresec.com\/?page=NetworkMiner\">http:\/\/www.netresec.com\/?page=NetworkMiner<\/a><\/p>\n<p><b>Engenharia Social<\/b><br \/>\n1. SET (<a href=\"http:\/\/www.social-engineer.org\/framework\/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_%28SET%29\">http:\/\/www.social-engineer.org\/framework\/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_%28SET%29<\/a>)<\/p>\n<p><b>Ofuscadores de c\u00f3digo<\/b><br \/>\n1.\u00a0<a href=\"http:\/\/www.foss.kharkov.ua\/g1\/projects\/eazfuscator\/dotnet\/Default.aspx\">Eazfuscator<\/a><br \/>\n2.\u00a0<a href=\"http:\/\/www.remotesoft.com\/salamander\/protector.html\">Salamander .Net Protector<\/a><br \/>\n3.\u00a0<a href=\"http:\/\/msdn.microsoft.com\/es-es\/library\/ms227240%28VS.90%29.aspx\">Dotfuscator Community Edition<\/a><br \/>\n4.\u00a0<a href=\"http:\/\/www.red-gate.com\/products\/smartassembly\/index.htm\">Smartassembly<\/a><br \/>\n5.\u00a0<a href=\"http:\/\/www.eziriz.com\/dotnet_reactor.htm\">Reactor de .NET<\/a><\/p>\n<p><b>Analizadores de vulnerabilidades en c\u00f3digo fonte\u00a0<\/b><br \/>\n1.\u00a0<a href=\"http:\/\/findbugs.sourceforge.net\/\">FindBugs<\/a><br \/>\n2.\u00a0<a href=\"http:\/\/www.owasp.org\/index.php\/Category:OWASP_LAPSE_Project\">Lapse<\/a><br \/>\n3.\u00a0<a href=\"http:\/\/pmd.sourceforge.net\/\">PMD<\/a><\/p>\n<p><b>IT Security Related\u00a0<\/b><br \/>\n1.\u00a0<a href=\"http:\/\/osvdb.org\/tools\">Open Source Vulnerability Database Search<\/a><br \/>\n2.\u00a0<a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/1586\">US Homeland Security Threat<\/a><br \/>\n3.\u00a0<a href=\"http:\/\/bestsecuritytips.communitytoolbars.com\/\">Best Security Tips<\/a><\/p>\n<p><b>Monitora\u00e7\u00e3o\/correlacionador de eventos\u00a0<\/b><br \/>\n1.\u00a0<a href=\"http:\/\/www.nagios.org\/\">Nagios<\/a><br \/>\n2.\u00a0<a href=\"http:\/\/www.zabbix.com\/es\/\">Zabbix<\/a><br \/>\n<b><br \/>\n<\/b><\/p>\n<\/div>\n<div><b>Dashboards\u00a0<\/b><br \/>\n1.\u00a0<a href=\"http:\/\/babel.sourceforge.net\/es\/index.php\">Babel<\/a><b>WiFi<\/b>1.\u00a0<a href=\"http:\/\/www.flu-project.com\/downloadflu\/law-liberad-a-wifi\">Liberar a Wifi<\/a>\u00a0(Descifrador de claves WiFi para Android)<br \/>\n2. Acrylic_WiFi<br \/>\n3. JavaCalcularWlan<\/div>\n<div><\/div>\n<div><b>Firewalls\u00a0<\/b><br \/>\n1.\u00a0<a href=\"http:\/\/www.flu-project.com\/downloadflu\/flublocker\">FluBlocker<\/a>\u00a0(WAF para IIS7 o superior)<b>Sistemas de Cibervigilancia<\/b><br \/>\n1.\u00a0<a href=\"http:\/\/www.paterva.com\/web6\/\">Maltego<\/a><br \/>\n2. ZINK-IT (<a href=\"http:\/\/www.zinksecurity.com\/zinkit.php\">http:\/\/www.zinksecurity.com\/zinkit.php<\/a>)<b>Integridade de arquivos\u00a0<\/b><br \/>\n1.\u00a0<a href=\"https:\/\/asyc.uc3m.es\/index.php?Id=98\">OSIRIS<\/a><br \/>\n2. Pwdump7 (<a href=\"http:\/\/www.tarasco.org\/security\/pwdump_7\/\">http:\/\/www.tarasco.org\/security\/pwdump_7\/<\/a>)<br \/>\n3. Samdump<br \/>\n4. l0phtcrack (<a href=\"http:\/\/www.l0phtcrack.com\/\">http:\/\/www.l0phtcrack.com\/<\/a>)<br \/>\n5. Findmyhash (<a href=\"https:\/\/code.google.com\/p\/findmyhash\/downloads\/list\">https:\/\/code.google.com\/p\/findmyhash\/downloads\/list<\/a>)<br \/>\n6. WCE-Windows Credentials Editor (<a href=\"http:\/\/www.ampliasecurity.com\/research\/wcefaq.html\">http:\/\/www.ampliasecurity.com\/research\/wcefaq.html<\/a>)<br \/>\n7. Mimikatz (<a href=\"http:\/\/blog.gentilkiwi.com\/mimikatz\">http:\/\/blog.gentilkiwi.com\/mimikatz<\/a>)<br \/>\n8. OphtCrack<br \/>\n9. Integrigy (<a href=\"http:\/\/www.integrigy.com\/security-resources\/downloads\/lsnrcheck-tool\">http:\/\/www.integrigy.com\/security-resources\/downloads\/lsnrcheck-tool<\/a>)<br \/>\n10. Minasi (<a href=\"http:\/\/www.minasi.com\/apps\/\">http:\/\/www.minasi.com\/apps\/<\/a>)<br \/>\n11. Setdllcharacteristics (<a href=\"http:\/\/blog.didierstevens.com\/2010\/10\/17\/setdllcharacteristics\/\">http:\/\/blog.didierstevens.com\/2010\/10\/17\/setdllcharacteristics\/<\/a>)<b>Engenharia Reversa<\/b><br \/>\n1. Olly Dbg (Programa:\u00a0<a href=\"http:\/\/www.ollydbg.de\/download.htm\">http:\/\/www.ollydbg.de\/download.htm<\/a>)<br \/>\n2. Radare (Programa:\u00a0<a href=\"http:\/\/radare.org\/y\/\">http:\/\/radare.org\/y\/<\/a>)<b>Detectores de Man in the Middle<\/b><\/div>\n<div>1. Marmita<br \/>\n2. XARP (Web:\u00a0<a href=\"http:\/\/www.chrismc.de\/development\/xarp\/\">http:\/\/www.chrismc.de\/development\/xarp\/<\/a>)<b>Metadatos<\/b><br \/>\n1. Exiftool<b>Criptograf\u00eda<\/b><br \/>\n1. TrueCrypt<br \/>\n2. Bitlocker<br \/>\n3. File Checksum Integrity Verifier-FCIV (<a href=\"http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=11533\">http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=11533<\/a>)<br \/>\n4. Sophos (<a href=\"http:\/\/www.sophos.com\/es-es\/products\/free-tools.aspx\">http:\/\/www.sophos.com\/es-es\/products\/free-tools.aspx<\/a>)<\/div>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>No post de hoje, queria compartilhar com voc\u00eas uma vers\u00e3o da lista de ferramentas de seguran\u00e7a.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[194,193],"tags":[197,196,195],"class_list":["post-1276","post","type-post","status-publish","format-standard","hentry","category-pentest","category-seguranca","tag-penetracao","tag-pentest","tag-seguranca"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/posts\/1276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/comments?post=1276"}],"version-history":[{"count":5,"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/posts\/1276\/revisions"}],"predecessor-version":[{"id":1281,"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/posts\/1276\/revisions\/1281"}],"wp:attachment":[{"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/media?parent=1276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/categories?post=1276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gianfratti.com\/index.php\/wp-json\/wp\/v2\/tags?post=1276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}