2 Next >
Category: Network Utilities » Tunneling » Covert Channels
Katana: Portable Multi-Boot Security Suite
Katana v1 (Kyuzo) has just been released from www.hackfromacave.com . The Katana: Portable Multi-Boot Security Suite is designed to fulfill many of your computer security needs. The idea behind this tool is to bring together many of the best security distributions and applications to run from one USB Flash Drive. Instead of keeping track of dozens of CDs and DVDs loaded with your favorite security tools, you can keep them all conveniently in your pocket. Katana includes distributions which focus on Penetration Testing, Auditing, Password Cracking, Forensics and Honey Pots. Katana comes with over 100 portable Windows applications, such as Wireshark, HiJackThis, Unstoppable Copier, Firefox, and OllyDBG. It also includes the following distributions: - Backtrack 4 pre - the Ultimate Boot CD - Ophcrack Live - Damn Small Linux - the Ultimate Boot CD for Windows - Got Root? Slax - Organizational Systems Wireless Auditor (OSWA) Assistant - Damn Vulnerable Linux Katana is also highly customizable. You can modify Katana by adding or removing distributions and portable apps with ease. You can add functionality to distributions like the Ultimate Boot CD, Got Root? Slax and UBCD4Win. You can also load your personal scripts and documents to keep them conveniently with you on your flash drive to use in concert with the provided tools. More informations on this can be found at forum.hackfromacave.com
iodine lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device and one server can handle 16 simultaneous users. The bandwidth is asymmetrical with limited upstream and up to 1 Mbps downstream.
iodine lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device and one server can handle 8 simultaneous users. The bandwidth is asymmetrical with limited upstream and up to 1 Mbps downstream.
TeamViewer is a simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy. To connect to another computer just run TeamViewer on both machines without the need of an installation procedure. With the first start automatic partner IDs are generated on both computers. Enter your partner's ID into TeamViewer and the connection is established immediately. With many thousand users worldwide TeamViewer is a standard tool to give support and assistance to people in remote locations. The software can also be used for presentations, where you can show your own desktop to a partner. TeamViewer also is VNC compatible and offers secure, encrypted data transfer with maximum security.
Cctt, "Covert Channel Tunneling Tool" is a tool presenting several exploitation techniques allowing the creation of arbitrary data transfer channels in the data streams authorized by a network access control system.
Proxytunnel is a program that connects stdin and stdout to an origin server somewhere in the Internet through an industry standard HTTPS proxy.
Reverse Utilities is a set of utilities (written in TCL) that can be used to bypass firewalls (if you have, at some point, access to the firewalled host) with telnet, ssh, HTTP, etc.
httptunnel creates a bidirectional data channel through an HTTP proxy, from your isolated computer behind a restrictive firewall, to a system on the Internet you have access to.
MailTunnel creates a bidirectional virtual data path tunnelled in E-Mail messages. This can be useful for users behind restrictive firewalls that only allow Mail-Access (usually through a central mailhub). In a situation like the above, it's possible to use mailtunnel to tunnel anything from simple telnet sessions to SSH-PPP VPNs (practically anything that can be tunneled over TCP/IP) to a non-blocked system on the internet
icmptunnel encapsulates data in ICMP frames. The usual mode of operation is tcp/ip forwarding, one icmptunnel will be set up on a blocked machine (behind a firewall) listening on TCP/IP port X. The other icmptunnel will be set up on a nonblocked machine (somewhere on the internet) connected to a local service (such as port 23, telnet). Data received on the blocked machine's tcp/ip socket will be encapsulated in an ICMP packet of users choice (ICMP_ECHO, ICMP_ECHOREPLY, ICMP_TIMESTAMP, etc..) and sent to the nonblocked machine. This machine will identify the packet as encapsulated data, decapsulate the data and forward it on to its tcp/ip socket connected to the telnet daemon. The telnet daemon responds with some data, icmptunnel on the nonblocked machine encapses the packet and sends it back to the blocked machine (ICMP type still user definable).
Browse by category