Technitium MAC Address Changer
Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC has an MAC address hard coded in its circuit by its manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Networks (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address. Technitium MAC Address Changer is a must tool in every security professionals tool box
Colasoft MAC Scanner
Colasoft MAC Scanner is a scan tool used for scanning IP addresses and MAC addresses in a local network, it supports multiple NICs and automatically detects all subnets, scan results can be exported to a text or CSV file.
Colasoft MAC Scanner sends ARP queries to the specified subnet and listens to the ARP responses in order to get IP addresses and MAC addresses. The scanning is very fast, and users can change the number of scanning threads to get better efficiency. The scanning results will be grouped by MAC address if a MAC address is configured with multiple IP addresses. It is easy for users to custom subsequent threads to manage the scan process, but the subsequent thread is less, the scanning operation will take more time to complete.
Colasoft Ping Tool
Colasoft Ping Tool is powerful in supporting to ping multiple IP addresses simultaneously and comparing response time in a graphic chart. Users can view historical charts and save the charts to a *.bmp file. With this build-in tool, users are able to ping the IP addresses of captured packets in a protocol analyzer (e.g. Colasoft Capsa) conveniently, including resource IP, destination IP or both.
sTERM is a Telnet client with a unique feature. It can establish an entire bi-directional Telnet session to a target host never sending your real IP and MAC addresses in any packet. By using "ARP Poisoning", "MAC Spoofing" and "IP Spoofing" techniques sTerm can effectively bypass ACLs, Firewall rules and IP restrictions on servers and network devices. The connection will be done impersonating a Trusted Host.
(Foundstone's Windows TCP port scanner) A connect-based TCP port scanner, pinger and hostname resolver. No source code is provided. It can handle ping scans and port scans using specified IP ranges. It can also connect to any discovered open port using user-specified "helper" applications (e.g. Telnet, Web browser, FTP).
Note: Numerous Free Foundstone tools can be found at the below web link:
Unicornscan is an attempt at a User-land Distributed TCP/IP stack. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Although it currently has hundreds of individual features, a main set of abilities include:
· Asynchronous stateless TCP scanning with all variations of TCP Flags.
· Asynchronous stateless TCP banner grabbing
· Asynchronous protocol specific UDP Scanning (sending enough of a signature to elicit a response).
· Active and Passive remote OS, application, and component identification by analyzing responses.
· PCAP file logging and filtering
· Relational database output
· Custom module support
· Customized data-set views
Another aspect of enumeration of hosts is the determining of TCP ports in an OPEN state, that is to say TCP ports which respond to SYN packets with a Syn and the ACK flag set, Syn-Ack. Synscan is impressively fast at determinining this via the use of two processes, one to send the Syn packets and one to listen for the responses. NB: At first start with low settings as it can impact systems if it is run too fast. The port parse utility is also a useful little tool!
Ghost Port Scan is an advanced port scanner and a firewall rule disclosure tool. This tool Uses IP & ARP spoofing, sniffing, stealth scanning, arp poisoning, IP fragmentation, and other techniques to perform stealth and untrackable information collection. GPS is especially efficient in LAN pen-testing, due to its ability to disclose the firewall settings of a host.
This is an updated verison of the well known onesixtyone SNMP bruteforce tool. Onesixtyone is an SNMP scanner that sends multiple SNMP requests to multiple IP addresses, trying different community strings and waiting for replies. This version fixes a number of bugs in other publicly available versions of the software, such as allowing for very large dictionary files and reading target IP addresses from a file.
Ntop (Network traffic usage monitor)
Ntop shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user's terminal. In Web mode, it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics.
A simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Note: A great compliment to nmap is called nmap magic
nmap magic uses An implementation of the I,Sushi algorithm to infer structural characteristics from NMAP scan reports across multiple machines
the nmap magic source code can be found here:
Further information about this tool can be found here:
A tooL DeVeLopeD bY SiMoN BiLes to aDD tHe OpeN PRotoCoL ResoURCe Database as aN eXteNDeD FUNCtioNaLitY to NMAP. THis WiLL sHoW aLL KNoWN pRotoCoLs FoR DisCoVeReD poRts WHiCH GReatLY eXteNDs tHe NMap_seRViCes FiLe oF oNe seRViCe peR poRt. FoR tHis to WoRK, NMAP MUst be iNstaLLeD aND YoU sHoULD iNCLUDe tHe CURReNt VeRsioN oF tHe opRp.DUmp sHoULD be iN tHe saMe DiReCtoRY.
AMap is a NeXt-GeNeRatioN tooL FoR assistiNG NetWoRK peNetRatioN testiNG. It peRFoRMs Fast aND ReLiabLe appLiCatioN pRotoCoL DeteCtioN, iNDepeNDeNt oN tHe TCP/UDP poRt tHeY aRe beiNG boUND to.
HMAP is a Web seRVeR FiNGeRpRiNtiNG tooL.
SiNFP is a NeW appRoaCH to OS FiNGeRpRiNtiNG, WHiCH bYpasses LiMitatioNs tHat NMap Has. NMap appRoaCHes to FiNGeRpRiNtiNG are sHoWN to be eFFiCieNt FoR YeaRs. NoWaDaYs, WitH tHe oMNi-pReseNCe oF stateFUL FilteRiNG DeViCes, PAT/NAT CoNFiGURatioNs aND eMeRGiNG paCKet NoRMaLiZatioN teCHNoLoGies, its appRoaCH to OS FiNGeRpRiNtiNG is beCoMiNG to be obsoLete. SiNFP Uses tHe aFoReMeNtioNeD LiMitatioNs as a basis FoR tests to be absoLUteLY aVoiDeD iN UseD FRaMes to iDeNtiFY aCCURateLY tHe ReMote opeRatiNG sYsteM. THat is, it oNLY ReQUiRes oNe opeN TCP poRt, seNDs oNLY FULLY staNDaRD TCP paCKets, aND LiMits tHe NUMbeR oF tests to 2 oR 3 (WitH oNLY 1 test GiViNG tHe OS ReLiabLY iN Most Cases).
HttpRiNt is a Web seRVeR FiNGeRpRiNtiNG tooL. It ReLies oN Web seRVeR CHaRaCteRistiCs to aCCURateLY iDeNtiFY Web seRVeRs, Despite tHe FaCt tHat tHeY MaY HaVe beeN obFUsCateD bY CHaNGiNG tHe seRVeR baNNeR stRiNGs, oR bY pLUG-iNs sUCH as MoD_seCURitY oR seRVeRMasK. HttpRiNt CaN aLso be UseD to DeteCt Web eNabLeD DeViCes WHiCH Do Not HaVe a seRVeR baNNeR stRiNG, sUCH as WiReLess aCCess poiNts, RoUteRs, sWitCHes, CabLe MoDeMs, etC. HttpRiNt Uses teXt siGNatURe stRiNGs aND it is VeRY easY to aDD siGNatURes to tHe siGNatURe Database.
Interactive TCP Relay (ITR)
This tool provides a security-testing environment for non-HTTP Client/Server applications, similar to that provided by interactive HTTP proxies. When started, ITR operates as a simple TCP tunnel, listening on a specific port, and forwarding all the traffic to the remote host and port. By configuring the client to treat the ITR as its server, all traffic between a client and a server can be tunneled and logged. The true power of ITR, however, lies in its ability to intercept and edit the traffic passing through it. When invoking intercept mode, the ITR stops every message sent through it (client to server and/or server to client). The traffic can then be edited freely, providing a comfortable environment for testing Client/Server applications. The editing of messages is performed using a built-in comfortable HEXA Editor. To provide support and compatibility for various systems, the ITR can operate both its logs and HEXA editor using different types of character encodings, such as ASCII or EBCDIC.
TCpRepLaY is a sUite oF BSD LiCeNseD tooLs WRitteN bY AaRoN TURNeR FoR *NIX opeRatiNG sYsteMs WHiCH GiVes YoU tHe abiLitY to Use pReVioUsLY CaptUReD tRaFFiC iN LibpCap FoRMat to test a VaRietY oF NetWoRK DeViCes. It aLLoWs YoU to CLassiFY tRaFFiC as CLieNt oR seRVeR, ReWRite LaYeR 2, 3 aND 4 HeaDeRs aND FiNaLLY RepLaY tHe tRaFFiC baCK oNto tHe NetWoRK aND tHRoUGH otHeR DeViCes sUCH as sWitCHes, RoUteRs, FiReWaLLs, NIDS aND IPS's. TCpRepLaY sUppoRts botH siNGLe aND DUaL NIC MoDes FoR testiNG botH sNiFFiNG aND iNLiNe DeViCes.
ToMaHaWK is a UtiLitY to biDiReCtioNaLLY RepLaY saVeD tCpDUmp DUmpFiLes at aRbitRaRY speeDs. It CaN be UseD to test tHe tHRoUGHpUt aND bLoCKiNG CapabiLities oF NetWoRK-baseD iNtRUsioN pReVeNtioN sYsteMs (NIPS).
NetWoRK TestiNG: BaCKGRoUND TRaFFiC
· CoLLeCt tRaCe FRoM taRGet NetWoRK, RepLaY WitH ToMaHaWK
· BottLeNeCKs WiLL sHoW Up as peRFoRMaNCe pRobLeM
· TRaCe WitH 1000 FULL TCP CoNNeCtioN setUp aND teaRDoWN
· SiX (6)64 bYte paCKet CoNNeCtioNs
· TRaCe Has 6000 paCKets
· RepLaY 250 Copies oF tRaCe iN paRaLLeL
· 31,000 CoNNeCtioNs/seC test CapabiLitY
SeCURitY TestiNG: BLoCKiNG
· CoLLeCt tRaCe WitH attaCK tRaFFiC, RepLaY WitH ToMaHaWK
· IF tRaCe CompLetes, attaCK Was Not bLoCKeD RepeatabiLitY
· RepLaY attaCKs siMUltaNeoUsLY: e.G. 20 PCAPs RepLaYeD 10X eaCH FoR a totaL oF 200 attaCKs
· IPS sHoULD CoNsisteNtLY bLoCK oR Miss aLL oF tHeM tHRoUGHpUt aND bLoCKiNG CapabiLities oF NetWoRK-baseD iNtRUsioN pReVeNtioN sYsteMs (NIPS).
Tomahawk patch for routed network testing
We have added some options to the Tomahawk network testing tool which allows for testing of routed networks.
Consider the following topology ( A1 and A2 are network interfaces on a box running tomahawk ):
| ip = 192.168.1.254
| mac = aa:aa:aa:aa:aa:aa
[ DUT ]
| mac = bb:bb:bb:bb:bb:bb
| ip = 10.0.0.1
When replaying an ip conversation, packets coming from A1 destined for A2 must have the destination IP address be within the subnet that contains A2 ( 10.0.0.0 ), and a destination MAC address of the router’s interface which is on the same network as A1 (aa:aa:aa:aa:aa:aa).
We have added 4 options to tomahawk to enable testing in this scenario. In the descriptions below, “client” and “server” refer to the interfaces specified by the -I and -J tomahawk options respectively (AND the examples assume “-I A1 -J A2″ ).
-x — Client side mac address of router ( aa:aa:aa:aa:aa:aa )
-y — Server side mac address of router ( bb:bb:bb:bb:bb:bb )
-X — Client side subnet ( 192.168.0.0 )
-Y — Server side subnet ( 10.0.0.0 )
The -Y and -X options only use the two most significant bytes when re-writing the packet ip addresses.
Ø Apply patch and build:
Ø download tomahawk
Ø download tomahawk.patch
Ø tar -xvf tomahawk1.1.tar
Ø cd tomahawk1.1
Ø patch -p1 < ../tomahawk_patch.txt
Ø Then build tomahawk as normal.
tomahawk -i eth0 -j eth1 -x aa:aa:aa:aa:aa:aa -y bb:bb:bb:bb:bb:bb -X 10.0.0.0 -Y 192.168.0.0 -l 1 -f test.pcap
TCPiVo is a tooL tHat pRoViDes HiGH-speeD paCKet RepLaY FRoM a tRaCe FiLe UsiNG staNDaRD PC HaRDWaRe aND FReeLY aVaiLabLe opeN-soURCe soFtWaRe . THis WoRK is sUppoRteD bY tHe NatioNaL SCieNCe FoUNDatioN UNDeR GRaNt EIA-0130344 aND tHe GeNeRoUs DoNatioNs oF INteL CoRpoRatioN. Note tHat tHe tooL Was FoRMeRLY KNoWN as NetVCR.
IKe-sCaN Was DeVeLopeD bY NTA's TeCHNiCaL DiReCtoR RoY HiLLs aND ReLeaseD iN 2003 UNDeR tHe GNU GeNeRaL PUbLiC LiCeNse (GPL). IKe-sCaN eXpLoits tRaNspoRt CHaRaCteRistiCs iN tHe INteRNet KeY EXCHaNGe (IKE) seRViCe, tHe MeCHaNisM UseD bY VPNs to estabLisH a CoNNeCtioN betWeeN a seRVeR aND a ReMote CLieNt. It sCaNs IP aDDResses FoR VPN seRVeRs bY seNDiNG a speCiaLLY CRaFteD IKE paCKet to eaCH Host WitHiN a NetWoRK.
UseR DoCUMeNtatioN CaN be FoUND at Web URL:
IPSeCSCaN is a tooL tHat CaN sCaN eitHeR a siNGLe IP aDDRess oR a RaNGe oF IP aDDResses LooKiNG FoR sYsteMs tHat aRe IPSeC eNabLeD.
IKEPRobe CaN be UseD to DeteRMiNe VULNeRabiLities iN tHe PSK impLeMeNtatioN oF tHe VPN seRVeR. It tRies oUt VaRioUs CoMbiNatioNs oF CipHeRs, HasHes aND DiFFie-HeLMaN GRoUps aND attempts to FoRCe tHe ReMote seRVeR iNto aGGRessiVe MoDe.
THe ADDRess ResoLUtioN PRotoCoL (ARP) is tHe MetHoD FoR FiNDiNG a Host's HaRDWaRe aDDRess WHeN oNLY its IP aDDRess is KNoWN. THis tooL RUNs oN LiNUX aND aLLoWs Host DeteCtioN aND FiNGeRpRiNtiNG UsiNG tHe ARP pRotoCoL.
ARP0C CoNNeCtioN iNteRCeptoR
ARP0C is a CoNNeCtioN iNteRCeptoR (UsiNG ARP spooFiNG aND a bRiDGiNG eNGiNe). ARP ReQUests FRoM VaRioUs soURCes iN a sWitCHeD eNViRoNMeNt Get FaLse ARP RespoNse paCKets WHiCH poiNt to tHe Host RUNNiNG ARP0C. PaCKets FRoM tHese Hosts aRe bRiDGeD WitH aN iNteRNaL eNGiNe to tHe ReaL DestiNatioN aDDRess to aLLoW NoRMaL NetWoRK opeRatioN aND Keep TCP CoNNeCtioNs aLiVe. PaCKets to Hosts iN ReMote (ReaD: ReaCHabLe UsiNG a RoUteR) sUbNets aRe FoRWaRDeD to a GateWaY UsiNG aN iNteRNaL RoUtiNG tabLe - iNDepeNDeNt FRoM tHe Hosts RoUtiNG tabLe.
W3bFUKK0R is a FoRCeD bRoWsiNG tooL, it basiCaLLY sCaNs WebseRVeRs (HTTP/HTTPS) FoR a DiReCtoRY bY UsiNG HTTP HEAD CoMMaND aND bRUte FoRCe MeCHaNisM baseD oN a WoRD List. FeatURes:
· HTTP/HTTPS(SSL) sUppoRt
· BaNNeR GRabbiNG
· UseR-AGeNt FaKiNG
· PRoXY sUppoRt (HTTP/S)
· RepoRts FoUND aND NoN-eXisteND DiReCtoRies
Note: Not aLL WebseRVeRs aRe HaNDLiNG HTTP statUs CoDes CoRReCtLY, so iF tHe WebseRVeR DoesN't CaRe aboUt RFCs tHe RepoRt GeNeRateD bY W3bFUKK0R MaY iNCLUDe FaLse positiVes. MaYbe We'LL FiND a GooD MetHoD to DeteCt tHose FaLse positiVes.
ODYsseUs is a pRoXY seRVeR, WHiCH aCts as a MaN-iN-tHe-MiDDLe DURiNG aN HTTP sessioN. A tYpiCaL HTTP pRoXY WiLL ReLaY paCKets to aND FRoM a CLieNt bRoWseR aND a Web seRVeR. ODYsseUs WiLL iNteRCept aN HTTP sessioN's Data iN eitHeR DiReCtioN aND GiVe tHe UseR tHe abiLitY to alteR tHe Data beFoRe tRaNsMissioN. FoR eXampLe, DURiNG a NoRMaL HTTP SSL CoNNeCtioN a tYpiCaL pRoXY WiLL ReLaY tHe sessioN betWeeN tHe seRVeR aND tHe CLieNt aND aLLoW tHe tWo eND NoDes to NeGotiate SSL. IN CoNtRast, WHeN iN iNteRCept MoDe, ODYsseUs WiLL pReteND to be tHe seRVeR aND NeGotiate tWo SSL sessioNs, oNe WitH tHe CLieNt bRoWseR aND aNotHeR WitH tHe Web seRVeR. As Data is tRaNsMitteD betWeeN tHe tWo NoDes, ODYsseUs DeCRYpts tHe Data aND GiVes tHe UseR tHe abiLitY to alteR aND/oR LoG tHe Data iN CLeaR teXt beFoRe tRaNsMissioN.
· MUlti-tHReaDeD NatiVe WiN32 eXeCUtabLe THe Use oF NatiVe WiNDoW CoDe, CoMbiNeD WitH eXteNsiVe MUlti-tHReaDiNG, MeaNs tHat ODYsseUs is Fast. SpeeD Was a pRiMaRY DeVeLopMeNt obJeCtiVe.
· No eXteRNaL DepeNDeNCies EVeRYtHiNG NeeDeD to iNteRCept Web ReQUests (apaRt FRoM a bRoWseR CoNFiGUReD to Use ODYsseUs as a pRoXY :) is iNCLUDeD iN tHe DistRibUtioN aRCHiVe. No aDDitioNaL DoWNLoaDs oR iNstaLLatioNs aRe ReQUiReD.
· FLeXibLe & CoNFiGURabLe A WealtH oF CoNFiGURatioN optioNs MeaNs ODYsseUs sHoULD be FLeXibLe eNoUGH to Meet tHe NeeDs oF NeaRLY aNY Web baseD appLiCatioN assessMeNt.
· LoW DesKtop pRoFiLe ODYsseUs DoesN't CLUtteR YoUR DesKtop WitH ReDUNDaNt WiNDoWs. A simpLe SYsteM TRaY iCoN is aLL tHat is NeeDeD to aCCess its MaNY FeatURes. THe VaRioUs CompoNeNts oF ODYsseUs appeaR aND DisappeaR as CoNFiGUReD, oR iNstRUCteD, bY tHe UseR.
SeCURitY Compass Web AppLiCatioN AUDitiNG TooL (SWAAT)
SeCURitY Compass Web AppLiCatioN AUDitiNG TooL (SWAAT) is a FRee statiC Web appLiCatioN soURCe CoDe aUDitiNG tooL. THe aiM oF SWAAT is to HeLp DeVeLopeRs, testeRs, seCURitY staFF, aND aUDitoRs LoCate poteNtiaLLY DaNGeRoUs poRtioNs oF soURCe CoDe; it is DesiGNeD to assist soURCe CoDe ReVieW. AFteR ReVieWiNG MiLLioNs oF LiNes oF soURCe CoDe, We at SeCURitY Compass beLieVe tHat aUtoMateD RUN-tiMe aNaLYsis tooLs aRe UseFUL at iDeNtiFYiNG simpLe, CoMMoN VULNeRabiLities. IN Most Cases, HoWeVeR, tHe Vast MaJoRitY oF VULNeRabiLities ReQUiRe HUMaN iNteLLiGeNCe aND KNoWLeDGe oF tHe appLiCatioN. SWAAT HeLps to ReDUCe tHe bURDeN oF soURCe CoDe ReVieW bY iDeNtiFYiNG poteNtiaLLY DaNGeRoUs FUNCtioNs aND stRiNGs iN CoDe aND eXpLaiNiNG botH HoW tHeY MaY be DaNGeRoUs aND HoW to MitiGate poteNtiaL RisKs.
SIFT Web MetHoD SeaRCH TooL
As Web seRViCes aRe beCoMiNG MoRe pReVaLeNt, pooR seCURitY pRaCtiCes FRoM pReVioUs GeNeRatioNs oF appLiCatioN aRCHiteCtURes aRe beiNG tRaNsFeRReD to tHe Web seRViCe spaCe. ONe oF tHese pRaCtiCes is tHe Use oF "seCURitY tHRoUGH obsCURitY" to HiDe CeRtaiN Web MetHoDs FRoM UseRs - tHat is, Web MetHoDs eXist tHat CaN be CaLLeD, bUt tHat aRe Not pUbLisHeD iN tHe WSDL oR otHeRWise DisCLoseD.
THe SIFT Web MetHoD SeaRCH tooL is a DiCtioNaRY attaCK tooL tHat CaN be UseD to bRUte FoRCe tHe Web MetHoD NaMes FoR a GiVeN Web seRViCe UNDeR CeRtaiN CiRCUMstaNCes. THat is, SOAP ReQUests CaN be sUbMitteD to a Web seRViCe UsiNG pRobabLe CoMbiNatioNs oF WoRDs to aLLoW tHe iDeNtiFiCatioN oF HiDDeN Web MetHoDs Not pUbLisHeD iN tHe CoRRespoNDiNG WSDL DoCUMeNt. THis is possibLe beCaUse RespoNses to ReQUests FoR NoN-eXisteNt Web MetHoDs aND Web MetHoDs tHat eXist DiFFeR MaRKeDLY UNDeR Most pLatFoRMs.
OsCaNNeR is aN ORaCLe assessMeNt FRaMeWoRK DeVeLopeD iN JaVa. It Has a pLUGiN-baseD aRCHiteCtURe aND CoMes WitH a CoUpLe oF pLUGiNs tHat CURReNtLY Do:
· SiD ENUMeRatioN
· PassWoRDs tests (CoMMoN & DiCtioNaRY)
· ENUMeRate ORaCLe VeRsioN
· ENUMeRate aCCoUNt RoLes
· ENUMeRate aCCoUNt pRiViLeGes
· ENUMeRate aCCoUNt HasHes
· ENUMeRate aUDit iNFoRMatioN
· ENUMeRate passWoRD poLiCies
· ENUMeRate Database LiNKs THe ResUlts aRe GiVeN iN a GRapHiCaL JaVa tRee.
Scuba by Imperva is a free, lightweight Java tool that scans Oracle, DB2, MS-SQL, and Sybase databases for hundreds of software vulnerabilities. It also detects configuration flaws like insecure passwords, unsafe processes, unrestricted permission levels, and more. Furthermore, it generates HTML and Java reports that show overall security risk level and detailed information about each vulnerability – so you can pinpoint configuration risks within minutes.
Scuba by Imperva detects hundreds of database vulnerabilities and configuration issues. And better yet – it helps you meet industry-leading best practices standards for database configuration and management.
The tools included in the PsTools suite, which are downloadable individually or as a package, are:
PsExec - execute processes remotely
PsFile - shows files opened remotely
PsGetSid - display the SID of a computer or a user
PsKill - kill processes by name or process ID
PsInfo - list information about a system
PsList - list detailed information about processes
PsLoggedOn - see who's logged on locally and via resource sharing (full source is included)
PsLogList - dump event log records
PsPassswd - changes account passwords
PsService - view and control services
PsShutdown - shuts down and optionally reboots a computer
PsSuspend - suspends processes
FERRET - a broadcast analysis tool
This tool is designed to demonstrate the problem of "data seapage". The average machine broadcasts a lot of information about itself on open networks. This tool captures and organizes this information.