Tuesday, 18 October 2016

Social-Engineer Toolkit

DISCLAIMER: This is only for testing purposes and can only be used where strict consent has been given. Do not use this for illegal purposes, period.


The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly. SET is a product of TrustedSec, LLC – an information security consulting firm located in Cleveland, Ohio.    

How to use 

Download Tool : https://goo.gl/NCGByn

Sunday, 16 October 2016

SSH Audit Python Tool

ssh-audit is a tool for ssh server auditing.


  • SSH1 and SSH2 protocol server support;
  • grab banner, recognize device or software and operating system, detect compression;
  • gather key-exchange, host-key, encryption and message authentication code algorithms;
  • output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc);
  • output algorithm recommendations (append or remove based on recognized software version);
  • output security information (related issues, assigned CVE list, etc);
  • analyze SSH version compatibility based on algorithm information;
  • historical information from OpenSSH, Dropbear SSH and libssh;
  • no dependencies, compatible with Python 2.6+, Python 3.x and PyPy;  

How to use  

Download Tool : https://goo.gl/uA5Ojh

Wednesday, 12 October 2016

Regional Internet Registrars

ARIN                    North America

APNIC                 Asia Pacific Region

LACNIC              Southern and Central America and Caribbean

RIPE NCC            Europe , the Middle East and Central Asia

AfriNIC                Africa

Country IP Ranges Tools :

More : http://services.ce3c.be/ciprg/

Saturday, 17 September 2016

Network Questions And Answers

1) What is Routing?
Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices.
2) What is the purpose of the Data Link?
The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing.
3) What is latency?
Latency is the amount of time delay that measures the point from which a network device receives a data frame to the time it sends it out again towards another network segment.
4) What is subnetting?
Subnetting is the process of creating smaller networks from a big parent network. Being a part of a network, each subnet is assigned some additional parameters or identifier to indicate its subnet number.
5) How are internetworks created?
Internetworks are created when networks are connected using routers. Specifically, the network administrator assigns a logical address to every network that connects to the router.
6)  What are packets?
Packets are the results of data encapsulation. These are data that has been wrapped under the different protocols of the OSI layers. Packets are also referred to as datagrams.
7) What are segments?
Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission towards the network. Segments are the logic units at the Transport Layer.

8) Mention what is the size of IP address?
Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

9)  Mention what is DHCP?
DHCP stands for Dynamic Host Configuration Protocol.  DHCP assigns an IP address automatically to a given workstation client.  You can also make static IPS for machines like printers, servers, routers and scanners.
10)  Mention what is the difference between dynamic IP and static IP addressing?
Dynamically IP addresses are provided by DHCP server and static IP address are given manually.

11) Mention what are the ranges for the private IPS?
Ranges for private IPS are
  • Class A: –
  • Class B: –
  • Class C: –
12) Mention what is the difference between TCP and UDP?
TCP and UDP both are protocols for sending files across computer network
          TCP (Transmission Control Protocol)
             UDP (User Datagram Protocol)
TCP is connection oriented protocol. When connection lost during transferring files, the server would request the lost part.  While transferring a message, there is no corruption while transferring a message
UDP is based on connectionless protocol. When you send data, there is no guarantee whether your transferred message will reach there without any leakage
The message will deliver in the order it is sent
The message you sent may not be in the same order
Data in TCP is read as a stream, where one packet ends, and another begins
Packets are transmitted individually and are guaranteed to be whole if they arrive
Example of TCP includes World Wide Web, file transfer protocol, e-mail,
Example for UDP are VOIP (Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol),

13) What is communication and how it is differ to transmission?
Communication means exchanging of data between source and destination. Whereas, transmission refers to only transferring of data from source to receiver.
14 ) What is point-to-point transmission protocol?
It is an industry standard in which the exchange of multiport datagrams is done use of protocol that is providing point-to-point link.  

15) Difference between public IP and private IP?
Public IP should be unique address that is assigned to a company. Private address can be used by anyone on private network because it is not recognized by the internet.

Sunday, 11 September 2016

DDos && DOS Script Tools

How To Use DDOS Tool 

DOS Tool  

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY!
GoldenEye is a HTTP DoS Test Tool.
Attack Vector exploited: HTTP Keep Alive + NoCache

How To Use Dos Tool  

Download Tool : http://goo.gl/u4eIAR 

Download Tool : http://goo.gl/LLnKHv