17.
Yersinia
A relatively older tool launched by the
S21Sec team in 2005
, Yersinia has returned to
popularity as a reliable tool that attacks Layer 2 network systems. Instead of more
traditional attacks like ARP poisoning or cache attacks, Yersinia is able to go after
switches and hubs. With many networks having limited defenses and poorly organized
or configured networking hardware, Yersinia is a prime example of a tool striking
where your target is weakest. Further, as these most defensive security tools guard
web portals, databases and workstations, Yersinia is working in an environment where
noise is the standard and detection is generally weaker.
18.
Durandal’s Backdoor
(DBD)
DBD is an new and often overlooked tool used to maintain access to compromised
systems. This is an absolutely essential part of a successful penetration test,
especially in light of recent high profile attacks to Home Depot and Target where
attackers stayed in the system for weeks after gaining access. DBD is currently
operating in only TCP/IP protocol. Reconnection testing is a less exciting part of
exploitation, but key to making sure defensive systems have had their problems
actually solved. Successful DBD testing will make sure the security hole was actually
closed, instead of simply throwing the attackers out while leaving the door open.
19.
Exploit Database
(EDB)
While not directly an offensive exploit tool, the exploit database built in to Kali Linux is
the best location for the most uptodate exploits available. Maintained by the Kali
Linux, Metasploit, and Offensive Security teams, EDB is the possibly the best place on
the internet to find exploits in any number of areas. Searchable by description, author,
platform, type, language or port, EDB is currently holding over 30,000 known exploits
at the time of writing.