Security Tools | Weapons of the Security Samurai
![](http://1.bp.blogspot.com/_AxdTtBbEEYQ/TKqsjd7rT5I/AAAAAAAACKs/0CZ9igNxrVo/s1600/date.png)
![](http://2.bp.blogspot.com/_AxdTtBbEEYQ/TKqslndnodI/AAAAAAAACL0/mynj4Xtimqo/s1600/user.png)
"The hands manipulate the sword, the mind manipulates the hands. Cultivate the mind and do not be deceived by tricks, feints and schemes. They are the properties of a magician, not of the samurai" - Saito Yakuro (1799-1872)
Like their ancient namesakes, a Security Samurai should be proficient with a variety of different tools, but should not be dependant on any single one.
Following below is a list of the tools we have found most useful in our journey:
BackTrack: The all-in-one pentesting/ethical hacking linux distro equipped with tools for every situation..
Cain & Abel:The swiss army knife of password capturing & cracking
Cain RDP Sniffing Parser:
ConfigCheck: VMWare ESX Hardening
Ettercap:
Firesheep: Sidejacking made easy
Foundstone Tools: A variety of useful free forensics and security tools
Cain RDP Sniffing Parser:
ConfigCheck: VMWare ESX Hardening
Ettercap:
Firesheep: Sidejacking made easy
Foundstone Tools: A variety of useful free forensics and security tools
Google Hacking Database: Use the true power of google!
Kon-Boot:
Metagoofil:
Metasploit:
Metasploit Unleashed:
Nmap: Security scanner.
NWC RAT (Remote Access Tool):
Objectif Sécurité Rainbow tables:
Portable Virtualbox:
PWDump:
SecurityOnion: Linux distro used for installing, configuring, and testing IDS.
SHODAN: Computer search engine
Stegoarchive.com: Steganography info and tools
Kon-Boot:
Metagoofil:
Metasploit:
Metasploit Unleashed:
Nmap: Security scanner.
NWC RAT (Remote Access Tool):
Objectif Sécurité Rainbow tables:
Portable Virtualbox:
PWDump:
SecurityOnion: Linux distro used for installing, configuring, and testing IDS.
SHODAN: Computer search engine
Stegoarchive.com: Steganography info and tools
Sysinternals: A suite of tools for administration and troubleshooting Microsoft operating systems.
Toolcrypt thrashLM:
Truecrypt: Open source encryption! Protect your data in transit by encrypting your USB drive or laptop HDD.Toolcrypt thrashLM:
VDigger: VMWare configuration and hardening tool
WEPBuster: The reason you should be using WPAv2!
Wirelessdefence.org: Wireless LAN (WLAN) security site