Parrot OS Tools
Parrot OS Tools
Parrot OS Tools
,
. l
e<tH-cfe6i
piiiilll
@ Most -~=
0 ~
oote~
@) Wirelesst
~ Snmi!n q --- DOli
!,p
~ Dioital
8 Autorlrt0tive
@ Reverse !Engineering
Cg} ReportingToots
,f t, netdiscover
•nma p
~ Nmapsi4 - QT GUI for Nmap
• Nmap .. the Network Mapper
~ pOf
Fi~ recon-ng
8 wireshark
.g MostUsMitoots
":·--~
- • DNSfAnalv.sis
>M Ana~ is )
0 ,P,ast tioii
l~ J~
@ w ue1essiTesti!19 ) · IS
@ ~sehg(' .,?,t!J )
.f; <tmlt~
@ 1 . Toot..s ··::..1 ■ ll<e-scan
·malt o
,. - -~1N1,, r•:·-:,(}~-'. '.'~'·}·
C: ~
',, · lli
t.rnAtl'll.
:-'ijts.~ c
ove
1-r'.!--,.,,,j ·; .,, r, i,111:' :•l'Y' i
I
:,·, 'lo '
• nmop
-» NmOp$14 " QT GUI for Nmop
• Nmop • tho Network Mi'pp~r
Cl pOt
11.•~
,a· re,,m,,ng
11
fD wlresh~rk
. ·' s · [l:ttm@t00il
• IDS/IP.S
> ~ VV; b!P,>!ication Anal~ is
>• E4-oitationiTools
) ~
> 1
) ntaini!!9 Access
·_
~'"'t, netc:Uscover.
• nmaP.
NmaP.sl~ • Qili GUI for N~~R/,
! .I~, . · \·1 . · P
~ por
.~ ro,on-ng
fD wlre1hork
' Most Used irools
NS Analysis
.yulnerabili!Y, AnalY!iS ) S/IP.S Identification
•i'.:ltJ
•
1
~:}Neb ~P!ication Anal~ls
I ~I'•,
) Ive Host Identification
i fi~oitationiToo\s
.r,,
)
" lfflaJ!
M_,intaini!!9 A~ss ) , • SINTi Analv.sls > ·~ i!tlieraJ!!
~ 0~ > "- masscan
Attacks t)~C~ > • nmaf!
@ w ~ tessiTesti!!9 ~De~ ·> .... Nma~i4-QliGfflf«.JVmap
(lb L & D~□~ > • Nmaf!- the NetiiartNappeir
f}~c~ > "\ unicornscan ,·,
e o19bl I
'.t
8 Automi,t,ive DiJ~ · , ,, wiresliark
@ eeva5e'· ,~ DQ~
• l il<e-scan
.
I
~
I
..
nmaP.
NmaP.Sl!4 - Qili GUI for, NmaP.
~i ~ ·:.ti N~'.~~~~t
1
~Jrecon•ng
8 w1r1ihark
NSAnal~ls )
,v~\nerabili!Y, Anal~is ) S/IP.S Identification )
-~ibAP,P.lication Anal~is ) Ive Host Identification )
.
.,·-. ""!9 ccess D ~ i} GII dITTIJ;1.ffi;J
P05l.~ oitation . f)
,l'
I Q~
E> i}-
• Pa · · Attacks
D D~ D i} ~
@ wuetessiTestit19 DD~ D
E>R'~ ..........._,,_, - fnstagram OSlNT tool
~ ~ ~-.n-,,,,,
>
>
@ Most Usect lfools
~ I
Dcrnm~
· ~-~--m~-olol)~rnm
~lnerabili~ Anatn ls m~
- '~ Web~ kationAnatn ts D l) o~r.tll M1il mtrt Q.ra
l
!
f.t_,
~ ii
~~=:s
""' lion
D l)a~t:hW•WOf:ml=lf b11Gii
F)
r--------------....
f)
f} ~ (iJ ©rEITT
Ji Attadcs f) ~I :flttmWID E) i} rtwttO
T~ f)~□~ f) Ii) ~
g - !.'9 f)~~ Dli)~
,. ...
D D~ . f) Ii) r;r.n " 5,li;]
@ ilafilTI> ilnnna
DQ~
1@. -!.'9
Do~
~ l · iTools f) ~~
~-:, netcHscovel'i
•nmaP.
""' NmaP.sl4 - Qli GUI for, NmaR
• NmaP. - ttie Networl< MIP.P.!r,
P.Ot
7!fi rec n•n
1
J:!~~-h~t ~, '
D ........
D
~
D
E>
I . ..... _ NS·Analysfs
j G Vulnerablti~ Ana~is >,
i~ Web~cationAna~is
S/IPS 'ldentfflcat1on
> ·~ .; Uve'Host ldehtfficatfon
1
>
>
>
fJ MostUsediToots
D
- • DNS l\nalv.sls
>· S VulnerabiU~Anal~ls > ti •10S/IP.S lcfentlflcatfon
)
- Wi iTesti!Jg )
"\ is!!!_tP.
Sniffi!.19 & S~!.19 > ~ • SNMP. Anal~is > "\ sm~ user=fflllm
~ D~tf.cirensics )
- • SSL! ,\nalysis > "\ swaks
I
8 . )
'\ amaP.
. • ctmit~
Reveise ~neeri!_lg >
-Hee-scan
::. Re~~iTools )
• maltego
~-:, netaiscover.
!iluI1;)
-
~ f;EI1
lrl recon-ng
1
• •
~~
wlreshark
D
D
D
D
El
D
os se oots D
>'
l)c~
ff3•mij-~-151D{; Jo~~
>• Wulnerabili!v. Anal
Dl)ornm-
i~ E~ ~lationiToots f) [.0o~fi,)lt.u;1
I8 Maintaini!.'9 Access ol)a®:illli~
8 i!ost~ tation f)[.0 □~
Abcks DD~
'~ Wi if~!,19
!.'9
D~~-~--~D.
& f) i}l:lrn
I '
D D i}t,i,:+-0~
~ ilfiluEU> il~
~ OG~
® .
~ lleeri!.19
iTools
f)o~
.-,
~ <!@) Iobfiltj.l
m~
O@iirl;J
~~
o~~
[i]~
~~
fl Most Used ifools
·•DN~ Analv.sfs )
M Wulnerabili!J. Ana~ is ).
/IP.S Identification )
~ Web ~ ication AnalY,!is ~
• e Most Identification )
~ E!P.!oitationiTools
I
ml ~
) iJ~
'\ ama~
~
UruTI>
> ·-
> ~mf!,ty ilrnmm
-ilce~scan
> · i~ . maltego ilrutm
~-•
WW netcfiscover,
•nmae
""" NmaP.si~ - Qli GUI fot NmaP.
• NmaP. - ttle Networl< Map~i
C::J P.Ofi
/!f: recon n
1
1,Gltw1r,~.s~~rij'c_,
I·· ·,.:.:;
... . .. '
fl MostUsedirooli >
> ~1 1
llGn Gitbirt!.'9 ~
)
f) ............... nm >
M f)@~ >
~ iii
. Dm~
& > ' .
c.: urnA-Plivesc-ctieclc
.
>
It >
.!!9 )
- .
Tooli )
"s System
;>
)
IJ l1 [4 ;t. E E! II ! ,
--- ......
>
>
>
g MostUi iTools >
> .- lnfonnatioriGittiirl~ >
)
II •Cisco irools
) • W8 .. ationAna!Y!is
) • t iiTciols Nessus
. . . I I
> II •
M
P.ast
Access
tioii
Allaclcs
>
>
O~nvas - Greenbone
H•
Stress iTesting
> l~ • VoJP. iTools
:/ti~.
D!i}07!m
~ iii - > ,·-- .tmis il I . 1 .._.., ~ ijl , . .
) • "lioliifools >
) ff . . . Access > • • O~nvas - Greenbone ) I!
HPast · lion > 11 •Stress iTesting )
F.or'ensics
~--~~
,. Mostu.ditooli ~
) ~JI Gi )
,>
■ • Cisco iToots
:> I. Wei,
> i4ii . ifciili
)
)
■ • f.UZZl!!9iTools
Nessus
> :f f .
e .... >
> II •Stress iTestiog
!!ti! Ctiea~ifGii
> -~ StiirtG~
li ) > D •Yoll! iTooli > -~- Start new installitiiiii
(fl . T!!!.ig >D lY.!!iS ·•); S!91:! GI\
unix-P!ivesc-ctieck . .\; ~ l e New Datatiiii
• & >
fl\, - >
8 >
e ·~-~- )
@----·,CJGli·- ~ ....
>
. ..
~
). 6 ~ II •OP.!nvas - Greenbone f)
)
il~
-
il ~
>
Tails
il~
il~
il~
i} ffi:.tud C&ze
il~
ii~
i1~
i1~
i1~
'\
'\ ,,lowhttptest
'\ smurf6
'\ t50
" thc-ssl-dos
0 Most Used itools )
•·
>
0 Malntalnl~ Access >
0 P.ost ExP.loltatlon > ••Str. . Tiilliij
M P.assword Attacks
l~ Wireless irestlng
~~ Sniffing S~flng
&
)-~
>
> ini-
'\ 1numl1x
" liifloifd
'\ I
,a Digital F.orenslcs
,·
'\ ~narf
>
oliwurm
{S Automotive )
P!~IIP.
@). Reverse Engineeri!!9 >
~eak
I)
@ JReP.,2rting iTools
•. I..•.
~nsertsouncf
rlf>l!!iXSOUni:t
sct~an
SiPP.
, ··~v~rash
, svmap
'\ svreport
'\ svwar
'\ voiphopper
D
)
■ w~can
~lleeri!!9 )
- ifoals >
ti MostUstcllooli )
>A lliiiGifii1!9 >
). ~~s >
..
• : tl11G','l•J ·le Identification
• · . • ,
>• iTools > ·rm
> ft
9,_ ticiii >.
►1 c\'lld.Wt!:'lrnw ,;,n; i-i;, ~rm rnmm
D .;·· - ........
• ........
fmm,!ifi, j •:d i-i
)
,
i
iT~
&~!_lg
D~~
f) •
f) il~
forensics
>
..
-wP._!can
)
~ irools >
I UslfdTcilli
> >
> >
>~ -
>
J' F.ramewort ldeiitiflcitioii
cation Proxies
> II!•
WebVulnerabi~Scimers
> /1 commli
> ~ owa~ zaP.
> ■ ild~sli
>
,w1,
, ■ ~n
- -
,
,
I F.rameworlc lijentiflcatlon
AP.P]catlon P.roxles
DI - - - ~~ - - - - -7 i) ~ ·
D ~ lwiiiiftJ {) ".,
D @~ '{)~
D
□~
i)dt:) ill!:•' 11 -'~'1 ) "
D ~ rnll:>
D ~
·~
~
~
ideo >
)
- MostUsediTools >
ing > .- ·· lion Gatlieri~ >
ools > ti ·· biU!Y Ana~is >
ervi~ > !Rl wm~cationAnaW_!is )
~lf.orensics
> II) •Weti ~P.P]cations DI@~
> '\ wel>sP.loit
Rewrse ~ineeri!!9 >
- ~~iTools >
I, .
iiiiiiiiiiiiiiiiii1111 . . '' . . . .
E>
D
D
f)
i g~
Most Use
. >
>.• Information GathertM >
> • ~\nerabill~ AMlY,!IS >
> IIJ
Web~ lc1tion AnllY,!IS >
)
tabise Expjolt
·-=--
---
, ft Naintalni!.'9 Access >
H l?ost~ oitation > l'1 •IP.v6 tools
a ttac > 0 clruhi;illimfrii ,tJNJJin
I ) i
E D~ IF.orensics DQ1- )
f8 ~ il~
n!
- - - - - ----- -~ -
~ lneerl!!9 >
~ iTooli >
---- . .. .. . .
E>
" cfetect-new~ip6
D '':!.ri:
" cletect_sniffer~
':r
~ ~
cfni<fict6 \··d"
t,...
.-.. !-~
'I - I I
~
8 MostUsMifools
~
tmv:,d\~ ~
.- t ht t§t\ti!~
~
I ttid,\iiJt\tiID D ~
f) a - f) ~
~~~;:;:::=------=-' iJ~~Bil f) il ~
f) '
i}a:ra:w2\),;1'"i7t3
D Q aGillll1i;illitb ti u\£1•); ~ D i} ufG:l,, ,nm
E) i]c ~ f> i} ufGdJ< •~
g & F> iJ ~,fil],\iNl(i[i) f) il ~
I~ -
DC1~•1M D i} ~
I~
il~ il~
'\ ftooil!iiild26
~ I • -~
ftciod.!mld6
®. - iTaali ftood!ml
'\ ft~routtr. .
.·\F.\'
'\ f t ~ ~
'\ ftQM!soticlQtt.6
'if/f'!
'\ ~tt••"_.,
J:\t~tl~
! '\ tut1~iJ'
'\ imptemtotiltiQn6
"\ implement~tion6d
"\ inverit... lQQkup6
"\ kill...router6
'\ p~ra$ite6
"\ passive_discovery6
"- randicmp6
'\ redir6 ..,
8 Most Usecl itcioli ~
> JI lnformatlonGittal!.19 )
I> • -a !!!mi~~ ).
lll wea, >
1
> llanAnl~s
Ii •Database EipJolt ~
••_......_~-, ..
l •~ Mlli~Access ~ -
> "•.
~ Pa&t~tion > 111 •,r::vo 1ools
••
(i,a Attacks
> ~- MetasP.loit F.ramework
~--...-esti!!9
> "
• • & Sf!!!fi!!9 > '\ · l'Engineering
~ IF.atensics > AP,~Ucations
•
- Wi rfesti!_lg c ~crators
- &~!.19 > ) • Social Engineering
Farensics ~ commix
I- .
~11Hri!!9
iTooli
~ jSQl! l~ection
- ~-.. 1;;;;;.;;;;
1:.3.:_,' S!,luna~
~"s~lmiP.- autoiiiiti<
O.:_.u· 1ti< SQl! r~ecttontool
)
0~
.--------,
D Dlic1· i u ! ~
1
0 (_~; ~ Ii . A i ~
D .· tJ.rXtW dmtpn
'\
a-- don > H-oseackdoors ) '\
Attacks > g. iTunneU~ & Exfllltfilrt;µ - ) " I
·~!9 >
.cs
>
>
~lleeri!.19 >
. iToali >
fl MostUsediTools >.
> JI lnforiifatlon'Gattierl!.'9 >.
) • ~ulnerablU~ ~lll~Y,!IS )
> "1 Web~catlon ~lll~Y,!ls )
Information Gattiirl!!9 )
~\neriblUtt, AnalY_!ls )
Web :&PP!ication Anal~ ls >
Exm~~tion[ oots ,
.H •AV.Evasion
H P.ast~ oitation > H•OS Backctoors
(i Attacks )
!!9iTools
tu~l4 .,,
· _,:1t"1~-·.: {';/
~ · . . .. 63\tieii~
> .. t. "- . . A. ls
· ation AnalV_!ls
filtration
~ • •n tton·Giffiinng ~
~ • abl1i!1 AnaJv!ls ,~
~ ■ Web ·atton~nalv!ls ,
J • itadoniTools J
~ ff . . ·. ::;~• r(ccess >.
-- • I 1 r-. t ..
• ~ tr..:
I • I -
I _ _....._"'.J
. ~ I I I . .. .
~~~ lil~
~~- - I il
~
iJ~
il~
il~
il~
il ~
il~
il~
i)rnil
- MostUsediTools )
> ~I · lion Gittiirl!.'9 >
>• .· · tiilj!Y, 1tna~is >
> R web~cationAnaW!is >
) • . - tioliiTools >
> ft . !!!!,lgAccess >
ff ~-- ~aitation >
~ M.Offline Attacks
M =~rOnline,' ·-~-
Eorensics
-~ M,;cP.assword Prafili!_ig g Wordlists
> " llash@
> '\ t\a ii:le •
g MostUsediTooli
D Dltfo' r n ! \ ~
D c-:_; ~!bl\~D~
o ·~::, mrnwi1m~
"tioniTools
.. "!9Access
• lion
M •l!ocal~ttads > i
iTesti!.19 >
• • &5~!_19 > li • OnUrre·Attackj
F.aiensics
> ii • P.isswaril P.rofili~ & Worcllists
> '\ tiashicl
n ~neeri!.'9
> '\ tiasti-ictentifier,
'~ - ~ooli
ra
rcracti.!mt
'\ Si rat~ .f,
---~lff~/~t 1· '.
t,uecrack
,.. ,. I If
D DI i Ldi~
~
ti .. -..,
• .
-=:-·
' .... .',tm~
Ii ..~ocal Attaclcs
> M ,Offline Atticlcs
)
L ~•~mro~~Dlf) il~ il~ --·
> M· ram~~~-WtJ~u.-~ 1-~~f
> "\ tiashicf 11
~neeri!!9
~ ~
. iTooli
IT3J!O
~
~
j •
ools )
_ ";;1nfQrmationGatheriD9 ~
~- -·;;!ic=
M •t:oca ~ttaclcs
_ W"arelessiTesting ) .M •Qffline ~ttaclcs
1
Sniffi!.'9 & SP,22fing _M·•OnUne~ttaclcs
l~ o· .--, F.orensics
8
1
·ve
1(9 Reverse E!!§ineering
~t&. - ifools ~· ... -::. I
!lg
!.'9
i,'♦'EWJ•tlii,:J,i,b:Dt>
~
-~
..
llonGl\tint\9
donAna ls
tiifoili
Eorensics )~
) ,,~ ... RF.ID~&'NF.<: iTools
r. ~So .-are·oefined Radio
flli➔ t:t~
* •••
I ~
~ ~~
~
•
--- .... .. . .
Web ~ itationAna!J!!s ~
itationiTools >
.....
~
Acc:ess )
Post lion )
!ootti i(ools=-~
> • '•.utneriWirelessffools >
11:[mrJ
>
> ~ • Software Defined Radio D ~-31~
> ~ aircracl<~ng ltl . .
ll]mtterm
~ airge"ddon "\ mifar . - mctt
• fe'rffwifl "t:racl<er. "\ nfc:... li
· ggrx "\ nfc..m t\~i&"': ,
- ~ d _ . ~........_..-.
mclk3
IJ~ P.iXiO P.
1
tf l t.OV@,
~ wifl~
Most Used lfoo\s ~
) .. lMrl ~IM\f!IS )
,~ . · · lta8oii I MlY,!ls )
.) • . ; . diiiitooli )
>&~
~
~ . .~ . tfiiii
)
- .. Attacks )
iJ~
;,. Gbl11tira
i,1 • Fbfildt
• •
ftM ost Used irools >
/~ formation Gathering )
111
0~ U~
"\ ....
·
fal<e ~ _solicitate;6(:
~~{.;I(~•,
"' redir6
"\ sslsplit
"\ tcpreplay
"\ w ifi - honey
"\ yersinia
~ fJ Most OsecJ itools )
> JI Information Gattiirlng >
·> ulnerabili~A N!ls >
'., itat.onAM\Y,!IS )
·-~m!Olllt.01\tTools )
:~ intaini!.'9 Atcess )
_.,j,
~ Em 01lation ~
,',
h Attacks >
@~
1
iTesti!_lg >
~ :g SJ!!!fi!!9 >
i} ®•!,~
__,.-:-._-,-.-----_-.-.:_1.__________..,,.::::_,,r_r.:~-l!lJllll•ii(-tj•-,.-iti-lllGk.ii1cll4ilF.-;- ,_.,,----E)
_.-~~llll,-i;"';OO!ll:1-~-, --1 il (u3
_[ftmA,t--ff:3~ E) i} u,n.. . ~
~~ D i} ~
~raJ¥.irtfG
' ~
-~ rntmflJ
~ l .~01tU1eaifo&s
r-.'
i
P
> 11~,~rma- on GattirlnJ ~
> - ~1V,~lneteblU~ ANMil ~
> ftiW
tb AP.Pjlcttlon ·lnal~II ~
) • ftE~~l.oltatlonif.ooli ~
> (i)[MolntelnlM Acc111
·._lj
·~
e ~IP.olt Expjoltiiton ~ I
8 .Autc,motlve f .. >
G Revers, Englneerl!!9 > Forensic lma9!t19 iToo1s
:- Reporting[ools
~•-'t:.,
> 11 P.DF. Forensics iTools
• Sleuth Kit Suite
...
~ auto~v.
. . binwall<
\ti c~kroot~it, ,.,_,. ·'·
· ·,. ·t,- · . ~n_11,J_nm_,11__ 1_11_fli,"1'•;,1 , ,,· ·,
~1 1
-·
[fJi~;~~~$i. 1
- ·galleta
ft':Q
Q'l::i hashd,:ep
rti) rkhunter
~ xpllco
, . yara
Most Used il:ools
-5
or m t -, "\ ,,W,t'XPQl'it
■ !J,_U,tl ., '\ ~wflnfq
,&ii hHh~O@P " e.~~fi{V
Ii!) rk.11untor " 9uymi;1~er
iii ~pth;o
"t- y~ro
D
.ti~.
~ '.~ ifesti[lg
!_lg&S~ fi~
>
)
;M •D.igital F.orensics
> ll •F.orensic Carving iTools
e ~ ~ ~neeri!_lg > Ii •F.:orensic Imaging iTools
@ 1H epon . ifool5 ·>
• ~I
I)
.!"/.,
•Sleuth Kit Suite
~ autoRSV,
, bJnwallc
ti chkrootk.;ltr:!l,ftllffi!l~P~,,,,
1
1, •;
- 900.oto
Ma hHhgoop
i!'l"IJIIII
Ill) rktiuntt1 1
a; ~pu,o
, yor~
G Most Used irools
1
IGii•UuFU f.i alfu!aiJ ii@
W!i.uf§fi~ ~~
'1i!
.r .
VV.:u ~ ; tf.iliJctj~
ll\.i ~ r:rrtrn
• ___filti3
E!J!loitation · ~~
i@)·M,intaini!.'9 Access ~~
@.r>~ ~ oitation i)rITmrJ
~ ·.,·. Attacks il@
i)@M
~ W,~ lessiTesti!.19
i)lwtril
@JS .~ &S~ fit19
il~
:e • Digital F.orensics . f) u~
@ Dtiie > f l•F.orensic Catving iTools Di} ~
@ ,,Reverse ~ neeri!!9 > ~ • fiorensii~
r:j;~
D iJ Jm~ cat
@ Rt · . iroots > ~~ •~ D i}lliik!Jfill
Eor{gifo:fAfilli!:1
P.DF. ·
,;!
~ - -,---____,E tmn
~·~· ••
autoP-SYi i) ·cat.
~11Wfh3
D3i-t-B3n
• Mott U1td root, ,
>· · lnform1tlon G1ttirl!!9
>
) Vutne,11>111~ ~ftllY)II >
) Web AP.PJlc1tlori AftllVJII >
> ~■ Expjoltitlon il"ool, >
) ,g M1lntilnl09 ~CCIII ,
8 P.01t EXJ!IOltltlon ,
M P.111word Att1c~1 >
(I Wlrtl111 ir11tlng >
IIC21!9
• Sniffing & SJ!0Oflng c1nbii1loai:t
>
1
c1n-c1lc-bft-tlmfng
• ·~lglt1l F.oren1lc1 )
ClnifUfflP.
c1nfdt11t
Reverae Engineering
~ Ri~rtlng iTOOll
'- c1nlegserver.
" ClnP.l•v.er.
'\ cansnlfftr.
" lsotP.dUMP.
-~ ,t '~~e~~~,. -? _..,-1;·
·, '\ lsotprecv
'\ lsotpsend
'\ lsotpHrver
'\ lsotpsnlfffr
'\ lsotptu,,
'\ slcan_attuch
"\ slc~nd
"\ slci;1npty
· MostUsedLl'oats >
Information Gatherl!.19 >
~utnerablU Ana Is >
. A- :itmJ
Web AP.P]catlon
EXP.loltatlori ii'ooli
Maintaining Access
P.ost Expjoltatlon
P.assword Attacks
~ Wireless irestlng
1
~ Sniffing & S1>.9,gflng
Ii Digital F.orenslcs
(8 A~omotlve
t t t I I t
L - -rtlng
~ -- - --ji~
irools R•i -~ · s--:DDlil™1:r-1•WJ
, ' \ •Dicon
• ~ li{d11[.~;in
' \ •Dlsass D
• Rlzln
. F.1 f) II t-WZ.: i!I
, Cutter.
Most Used iTools >
Information Gatherl~ )
Wulnerablll~ Ana!Y,!ls J
Web - itltionAna~ s )
Em oitltionitooli ~
Maint1!!!!9 )
bt dcii ~
~ )
i1i >
& >
Most 1,•.t:li!.J
--..1:T-.Jr
••
> • DecomP.ilers
■ rz-gg
• rz-hash - block based hashing utlliW
• rz-pm - rlzln l)!Ckage manage~ . .;. : :#(
)
t
cs ) .....
.ar.
&~ideo )
ti Most Usedirooli
mmi~ ) :. lnformition Gattierl~
[Toots > D ~ratiili!Y, ~nalY!ls
> a1 Web~ cattonAria~Y!is
> M '~ oitation iTools
> a -Maintaining ~ccess-
P.ost ~ oitation
Password Attacks -
_ WirelessiTesting
D Sniffi!!9 g SJ>.2.2fi
Di-- ~l f.orensics >·
otive >
Reverse E~ ineering >
~• e~witness
I Faractav. Client (GT~
II metagoofll