Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks.
What is tool employed by James in the above scenario?
Option 1 : Ophcrack
Option 2 : HootSuite
Option 3 : HULK
Option 4 : VisualRoute
1. Ophcrack
Ophcrack may be a free Windows password cracker based on rainbow tables. it’s a very efficient implementation of rainbow tables done by the inventors of the strategy. It comes with a Graphical the method and runs on multiple platforms.
Features:
- Runs on Windows, Linux/Unix, Mac OS X, …
- Cracks lumen and NTLM hashes.
- Free tables available for Windows XP and Vista/7.
- Brute-force module for simple passwords.
- Audit mode and CSV export.
- Real-time graphs to analyze the passwords.
- LiveCD available to alter the cracking.
- Dumps and loads hashes from encrypted sam recovered from a Windows partition.
- Free and open supply software system (GPL).
2. HootSuite
Hootsuite may be a social media management platform that covers virtually each side of a social media manager’s role.
With only one platform users area unit ready to do the easy stuff like reverend cool content and schedule posts on social media in all the high to managing team members and measure ROI.
There area unit many totally different plans to decide on from, from one user set up up to a bespoken enterprise account that’s appropriate for much larger organizations.
3. HULK
HULK flood, may be a DDoS attack named by its creators “HTTP unendurable Load King” is similaralogous|is comparable} to an HTTP flood and is intended to overwhelm net servers’ resources by incessantly requesting single or multiple URL’s from several supply assaultive machines.
HULK flood differs from most on the market DDoS attack tools that created foreseeable recurrent patterns that might simply be relieved. The principle behind the HULK flood is that a novel pattern is generated at every and each request, with the intention of accelerating the load on the servers further as evading any intrusion detection and interference systems.
Some HULK Techniques
- Obfuscation of supply shopper – this can be done by employing a list of known User Agents, and for each request that’s made, the User Agent may be a random worth out of the known list
- Reference Forgery – the referrer that points at the request is obfuscated and points into either the host itself or some major prelisted websites.
- Stickiness – victimisation some commonplace HTTP command to do and raise the server to keep up open connections by victimisation Keep-Alive with variable time window
- no-cache – this can be a given, however by asking the HTTP server for no-cache , a server that’s not behind an avid caching service can gift a novel page.
- Unique Transformation of computer address – to eliminate caching and alternative improvement tools, crafting custom parameter names and values and that they area unit randomised and connected to every request, rendering it to be distinctive, change the request to bypass several CDN systems.
When the servers’ limits of synchronous connections area unit reached, the server will not reply to legitimate requests from alternative users.
It value to say that HULK attack demands several resources for shopper facet further, thus one node won’t be ready to run high attack rates.
4. VisualRoute
VisualRoute offers a good style of network tools that facilitate users keep one step previous network problems like bottle necks and packet loss/latency problems.
The tools includes:
- Continuous trace routing
- Reverse tracing
- time interval graphing
- Port inquisitory
- Network scanning
- Trace route history
- facet by facet trace route comparison
- Route analysis (NetVu)
- Custom maps
- Remote access server
- Save traceroutes as text, image or HTML
VisualRoute Business and Support professional editions permits the user to run an overseas access server.
From this portal a user will run a trace route, plot response times and manage remote agents from anyplace within the world.
View a trace route in an exceedingly totally different means, victimisation VisualRoute’s route graph read.
This read concentrates on the response times of every hop throughout the route and may be a good way to quickly see however any given route is activity.
Learn CEH & Think like hacker
- What is Ethical Hacking? & Types of Hacking
- 5 Phases of Hacking
- 8 Most Common Types of Hacker Motivations
- What are different types of attacks on a system
- Scope and Limitations of Ethical Hacking
- TEN Different Types Of Hackers
- What is the Foot-printing?
- Top 12 steps for Footprinting Penetration Testing
- Different types of tools with Email Footprinting
- What is “Anonymizer” & Types of Anonymizers
- Top DNS Interrogation Tools
- What is SNMP Enumeration?
- Top vulnerability scanning tools
- Information Security of Threat
- Footprinting tools:
- What is Enumeration?
- Network Security Controls
- What is Identity and Access Management?
- OWASP high TEN web application security risks
- Password Attacks
- Defend Against Key loggers
- Defend Against Spyware
- Covering Tracks
- Covering Track on Networks
- Everything You Need To Know About Sniffing – Part 1
- Everything You Need To Know About Sniffing – Part 2
- Learn more about GPS Spyware & Apparatuses
- Introduction of USB Spyware and It’s types
- 10 Types of Identity Theft You Should Know About
- Concepts of Denial-of-Service Attack & Distributed Denial of Service Attack
- Most Effective Ways to Overcome Impersonation on the Social Networking Site’s Problem
- How Dynamic Host Configuration Protocol (DHCP) Works
- DHCP Request/Reply Messages
- DHCP Starvation Attack
- Rogue DHCP Server Attack
- IOS Switch Commands
- Web Server Concept
- Web Server Attacks
- Web Server Attack Tools
- Web Server Security Tools
- 6 Quick Methodology For Web Server Attack
- Learn Skills From Web Server Foot Printing / Banner Grabbing
- The 10 Secrets You Will Never Know About Cyber Security And Its Important?
- Ways To Learn Finding Default Content Of Web Server Effectively
- How will Social Engineering be in the Future
- Understand The Background Of Top 9 Challenges IT Leaders Will Face In 2020 Now
- Learning Good Ways To Protect Yourself From Identity Theft
- Anti-phishing Tools Guide
This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com