Saturday, 18. February 2012
What Is A Rootkit?
At the core of the term "rootkit" are two words- "root" and "kit". Root refers to the all-powerful, "Administrator" account on Unix and Linux systems, and kit refers to a set of programs or utilities that allow someone to maintain root-level access to a computer. However, one other aspect of a rootkit, beyond maintaining root-level access, is that the presence of the rootkit should be undetectable.

Dowload BootRoot
http://www.eeye.com/Resources/Security-Center/Research/Tools/BootRoot

Download Jynx
http://www.blackhatacademy.org/security101/index.php?title=Jynx

Permalink

 


Intersect 2.0 - Post Exploitation Automation - Linux
Intersect 2.0 is a Python script written to perform automated Post-Exploitation information gathering and reporting.
The general idea is that after you have exploited a target, you run this script and it performs a variety of tasks
that you would normally need to perform manually. Intersect will collect password files, copy SSH keys, enumerate
processes and installed applications, gather detailed network information, map the hosts internal network (for pivoting),
locate and identify common anti-virus and firewall applications and much more.

Download
https://github.com/ohdae/Intersect-2.0/

Permalink