1. VirtualBSD – http://www.virtualbsd.info/
VirtualBSD is a desktop ready FreeBSD 7.1 RELEASE, in the form of a VMware appliance, based on the Xfce 4 Desktop Environment. Many of the most common and useful applications are ready to run, and the desktop has been styled to resemble a certain OS from Cupertino.
2. NetworkMiner – http://networkminer.sourceforge.net/
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.
3. PktAnon – http://www.tm.uka.de/software/pktanon/
PKtAnon performs network trace anonymization. It is highly configurable and uses anonymization profiles. Anonymization profiles allow for mapping of arbitrary anonymization primitives to protocol attributes, thus providing high flexibility and easy usability. A huge number of anonymization primitives and network protocols are supported and ready to use for online and offline anonymization.
4. Command line Kung Fu – http://synjunkie.blogspot.com/2008/03/basic-dos-foo.html
Often after gaining access to a host an attacker will need to gather information about the host and the network. If you have a VNC or RDP session to the compromised host this is easy enough, however if you only have a DOS prompt this can be slightly more fun. This can be even more challenging if those DOS tools available to you are the ones that are native to the OS on the compromised host.
The purpose of this post is to list a few of the native DOS commands that I find useful to use when i have a DOS prompt on a Windows Host. Please note, these commands have been tested on XP but most will work on Server 2003 and Windows 2000 also.
5. EasyBCD – http://neosmart.net/dl.php?id=1
ith EasyBCD, almost anything is possible. Setting up and configuring Windows boot entries is simple, and there is no easier way to quickly boot right into Linux, Mac OS X, or BSD straight from the Windows Vista bootloader – on the fly, no expert knowledge needed!
6. 8 PowerPoint Train Wrecks – http://www.cio.com/special/slideshows/2009/02/bad_powerpoint/index
In the „so bad it’s good” category, we honor eight PowerPoint slides that will make you say, „Holy $#@%, What were they thinking?”