14 Live CDs for Penetration Testing (Pen Test) and Forensic

http://www.ivizsecurity.com/blog/penetration-testing/live-cd-penetration-testing-pen/

Yesterday I was researching for some of the other lesser known live CDs for penetration testing.  While I’m an avid user and a fan of backtrack, someone mentioned that there are other live CDs as well which are good for specific functionality. I did take a look from the post at darknet but I feel the list is somewhat outdated (written way back in 2006).  For the benefit of the readers here is a list of the most recent pen testing live CDs that I’ve compiled. (so that you don’t have to google around for profit!)

  1. Arudius : A Linux live CD. The CD consists of a Zenwalk Linux base on top of which a large collection of network security testing software has been installed.
  2. BackTrack: Ah the favorite one for most of the pen testers!  Do I need to mention more?
  3. Damn Vulnerable Linux (DVL): A Linux-based tool for both novice and professional security personnel. It was initiated for training tasks and learning IT security knowledge domains such as web vulnerability, network security, or binary vulnerability such as exploitation or shellcodes.
  4. DEFT (Digital Evidence & Forensic Toolkit): A Xubuntu Linux-based Computer Forensics live CD. It is a very easy to use system that includes an excellent hardware detection and the best free and open source applications dedicated to incident response and computer forensics.
  5. FCCU:  A GNU/Linux Forensic Boot CD is based on Debian-live that contains a lot of tools suitable for computer forensic investigations, including bash scripts. The main purpose of the CD is to help the forensic analyze of computers.
  6. Frenzy: A portable system administrator toolkit based on FreeBSD. It generally contains software for hardware tests, file system check, security check and network setup and analysis.
  7. grml:  grml is a bootable CD (Live-CD) originally based on Knoppix and nowadays based on Debian. grml includes a collection of GNU/Linux software especially for system administrator and users of texttools. grml provides automatic hardware detection.
  8. Helix:  A customized distribution of the Knoppix Live Linux CD. Helix is more than just a bootable live CD. You can still boot into a customized Linux environment that includes customized linux kernels, excellent hardware detection and many applications dedicated to Incident Response and Forensics.
  9. Knoppix-NSM:  This is to learn about Network Security Monitoring or to deploy a NSM capability in your network based on KNOPPIX Technology.
  10. Network Security Toolkit (NST):  A bootable ISO live CD based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86 platforms.
  11. OSWA Assistant:  A self-contained, freely downloadable, wireless auditing toolkit for both IT-security professionals and End-users alike.
  12. OWASP Labrat:  The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. The OWASP Live CD (LabRat) is a bootable CD akin to knoppix but dedicated to Application Security.
  13. Protech:  A specially designed Linux distribution for security technicians and programmers, although it can be used normally as your default desktop system. Protech ONE comes with a great variety of the best security tools for your use.
  14. Samurai:  The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites.

I think I’ve listed most of the recent ones. Incase you feel that some distros are worth mentioning and is missing in the list, then please leave the name of the CD (and the link offcourse) in the comments section below. Happy Pentesting!

我补一个:matriux:http://www.matriux.com/index.php?page=home&language=en

时间: 2024-08-02 11:03:39

14 Live CDs for Penetration Testing (Pen Test) and Forensic的相关文章

PowerSploit: The Easiest Shell You'll Ever Get - Pentest Geek - Penetration Testing - Infosec Professionals

              PowerSploit: The Easiest Shell You'll Ever Get - Pentest... Sometimes you just want a shell. You dont want to worry about compiling a binary, testing it against antivirus, figuring out how to upload it to the box and finally...   View o

Ethical Hacking - NETWORK PENETRATION TESTING(15)

ARP Poisoning - arpspoof Arpspoof is a tool part of a suit called dsniff, which contains a number of network penetration tools. Arpspoof can be used to launch a MITM attack and redirect traffic to flow through our device. 1. Tell the target client th

Ethical Hacking - Web Penetration Testing(13)

OWASP ZAP(ZED ATTACK PROXY) Automatically find vulnerabilities in web applications. Free and easy to use. It can also be used for manual testing. This is the welcome page. Options Page Scan Policy Setting Page. Attack this target URL http://10.0.0.24

Python Ethical Hacking - WEB PENETRATION TESTING(3)

CRAWLING SUMMARY Our crawler so far can guess: Subdomains. Directories. Files. Advantages: ->Discover "hidden" paths/paths admin does not want us to know. Disadvantages: -> Will does not discover everything. Solution: -> Analyse discove

Python Ethical Hacking - WEB PENETRATION TESTING(5)

Guessing Login Information on Login Pages Our target website: http://10.0.0.45/dvwa/login.php #!/usr/bin/env python import requests target_url = "http://10.0.0.45/dvwa/login.php" data_dict = {"username": "dfdfddfd", "pas

Ethical Hacking - NETWORK PENETRATION TESTING(2)

 ALFA  AWUS 1900 https://www.alfa.com.tw/products_detail/2.htm Run the following shell command on Kali Linux and reboot. (Refer to https://forums.kali.org/showthread.php?36296-EXTREME-WIFI-SUPPORT-Alfa-Networks-AWUS1900-WORKING) apt-get install realt

Ethical Hacking - NETWORK PENETRATION TESTING(3)

Change MAC Address using macchanger.  Packet Sniffing Basics Airodump-ng airodump-ng is a program part of the aircrack-ng package, it's a packet sniffer that allows us to capture all the packets that are in our wifi card range. We can also use it to

Ethical Hacking - NETWORK PENETRATION TESTING(5)

Deauthentication Attacks Theory This attack is used to disconnect any device from any network within our range even if the network is protected with a key. Hacker sends de-authentication packets to the router pretending to be the target matching(by s

Ethical Hacking - NETWORK PENETRATION TESTING(4)

Targeted packet sniffing airodump-ng --channel[channel] --bssid[bssid] --write[file-name][interface] Now all the data will be stored in the file name specified after the -write option. We can analyze this data using Wireshark. The only problem is tha