Difference between pages "Tools:Network Forensics" and "Twofish"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Network Forensics Packages and Appliances)
 
(Introduction, links, relation to Blowfish.)
 
Line 1: Line 1:
=Network Forensics Packages and Appliances=
+
{{Expand}}
; [[E-Detective]]
+
: http://www.edecision4u.com/
+
: http://www.digi-forensics.com/home.html
+
  
; [[Burst]]
+
'''Twofish''' is an [[encryption]] algorithm designed designed by [[Bruce Schneier]], John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson, Eli Biham and Lars Knudsen as a candidate for the Advanced Encryption Standard [[AES]] competition, where it got third place with 31 votes ([[Rijndael]] got 86 votes, and was selected by [[NIST]] as the [[AES]], and [[Serpent]] got 59 votes).
: http://www.burstmedia.com/release/advertisers/geo_faq.htm
+
: Expensive [[IP geolocation]] service.
+
  
; [[chkrootkit]]
+
Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It is related to the earlier [[Blowfish]] block cipher, also designed by [[Bruce Schneier]].
: http://www.chkrootkit.org
+
  
; [[cryptcat]]
+
== External Links ==
: http://farm9.org/Cryptcat/
+
  
; [[Enterasys Dragon]]
+
[http://www.schneier.com/twofish.html Twofish Homepage]
: http://www.enterasys.com/products/advanced-security-apps/index.aspx
+
[http://en.wikipedia.org/wiki/Twofish Wikipedia article on Twofish]
: Instrusion Detection System, includes session reconstruction.
+
 
+
; [[MaxMind]]
+
: http://www.maxmind.com
+
: [[IP geolocation]] services and data provider for offline geotagging. Free GeoLite country database. Programmable APIs.
+
 
+
; [[netcat]]
+
: http://netcat.sourceforge.net/
+
 
+
; [[netflow]]/[[flowtools]]
+
: http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
+
: http://www.splintered.net/sw/flow-tools/
+
: http://silktools.sourceforge.net/
+
: http://www.vmware.com/vmtn/appliances/directory/293 Netflow Appliance (VMWare)
+
 
+
; NetIntercept
+
: http://www.sandstorm.net/products/netintercept
+
: NetIntercept captures whole packets and reassembles up to 999,999 TCP connections at once, reconstructing files that were sent over your network and creating a database of its findings. It recognizes over 100 types of network protocols and file types, including web traffic, multimedia, email, and IM.
+
 
+
; [[NetworkMiner]]
+
: http://networkminer.wiki.sourceforge.net/NetworkMiner
+
: NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network [[sniffer]]/packet capturing tool or to parse PCAP files for off-line analysis.
+
 
+
; [[rkhunter]]
+
: http://rkhunter.sourceforge.net/
+
 
+
; [[ngrep]]
+
: http://ngrep.sourceforge.net/
+
 
+
; [[nslookup]]
+
: http://en.wikipedia.org/wiki/Nslookup
+
: Name Server Lookup command line tool used to find IP address from domain name.
+
 
+
; [[Sguil]]
+
: http://sguil.sourceforge.net/
+
 
+
; [[Snort]]
+
: http://www.snort.org/
+
 
+
; [[ssldump]]
+
: http://ssldump.sourceforge.net/
+
 
+
; [[tcpdump]]
+
: http://www.tcpdump.org
+
 
+
; [[tcpxtract]]
+
: http://tcpxtract.sourceforge.net/
+
 
+
; [[tcpflow]]
+
: http://www.circlemud.org/~jelson/software/tcpflow/
+
 
+
; [[truewitness]]
+
: http://www.nature-soft.com/forensic.html
+
: Linux/open-source. Based in India.
+
 
+
; [[OmniPeek]] by [[WildPackets]]
+
: http://www.wildpackets.com/solutions/network_forensics
+
: http://www.wildpackets.com/products/network_analysis/omnipeek_network_analyzer/forensics_search
+
: OmniPeek is a network forensics tool used to capture, store, and analyze historical network traffic.
+
 
+
; [[Whois]]
+
: http://en.wikipedia.org/wiki/WHOIS Web service and command line tool to look up registry information for internet domain.
+
: http://www.arin.net/registration/agreements/bulkwhois.pdf Bulk WHOIS data request from ARIN
+
 
+
; [[IP Regional Registries]]
+
: http://www.arin.net/community/rirs.html
+
: http://www.arin.net/index.shtml American Registry for Internet Numbers (ARIN)
+
: http://www.afrinic.net/ African Network Information Center (AfriNIC)
+
: http://www.apnic.net/ Asia Pacific Network Information Centre (APNIC)
+
: http://www.lacnic.net/en/ Latin American and Caribbean IP Address Regional Registry (LACNIC)
+
: http://www.ripe.net/ RIPE Network Coordination Centre (RIPE NCC)
+
 
+
; [[Wireshark]] / Ethereal
+
: http://www.wireshark.org/
+
: Open Source protocol analyzer previously known as ethereal.
+
 
+
; [[Kismet]]
+
: http://www.kismetwireless.net/
+
: Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.
+
 
+
; [[Xplico]]
+
: http://www.xplico.org/
+
: Open Source Network Forensic Analysis Tool (NFAT). Protocols supported: [http://www.xplico.org/status HTTP, SIP, FTP, IMAP, POP, SMTP, TCP, UDP, IPv4, IPv6, ...]
+
 
+
=Command-line tools=
+
 
+
[[arp]] - view the contents of your ARP cache
+
 
+
[[ifconfig]] - view your mac and IP address
+
 
+
[[ping]] - send packets to probe remote machines
+
 
+
[[tcpdump]] - capture packets
+
 
+
[[snoop]] - captures packets from the network and displays their contents ([[Solaris]])
+
 
+
[[nemesis]] - create arbitrary packets
+
 
+
[[tcpreplay]] - replay captured packets
+
 
+
[[traceroute]] - view a network path
+
 
+
[[gnetcast]] - GNU rewrite of netcat
+
 
+
[[packit]] - packet generator
+
 
+
[[nmap]] - utility for network exploration and security auditing
+
 
+
[[Xplico]] Open Source Network Forensic Analysis Tool (NFAT)
+
 
+
==ARP and Ethernet MAC Tools==
+
 
+
[[arping]] - transmit ARP traffic
+
 
+
[[arpdig]] - probe LAN for MAC addresses
+
 
+
[[arpwatch]] - watch ARP changes
+
 
+
[[arp-sk]] - perform denial of service attacks
+
 
+
[[macof]] - CAM table attacks
+
 
+
[[ettercap]] - performs various low-level Ethernet network attacks
+
 
+
==CISCO Discovery Protocol Tools==
+
[[cdpd]] - transmit and receive CDP announcements; provides forgery capabilities
+
 
+
==ICMP Layer Tests and Attacks==
+
[[icmp-reset]]
+
 
+
[[icmp-quench]]
+
 
+
[[icmp-mtu]]
+
 
+
[[ish]] - ICMP shell (like SSH, but uses ICMP)
+
 
+
[[isnprober]]
+
 
+
==IP Layer Tests==
+
[[iperf]] - IP multicast test
+
 
+
[[fragtest]] - IP fragment reassembly test
+
 
+
==UDP Layer Tests==
+
 
+
[[udpcast]] - includes UDP-receiver and UDP-sender
+
 
+
==TCP Layer==
+
 
+
[[lft]] http://pwhois.org/lft - TCP tracing
+
 
+
[[etrace]] http://www.bindshell.net/tools/etrace
+
 
+
[[firewalk]] http://www.packetfactory.net
+

Revision as of 08:45, 17 December 2007

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Twofish is an encryption algorithm designed designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson, Eli Biham and Lars Knudsen as a candidate for the Advanced Encryption Standard AES competition, where it got third place with 31 votes (Rijndael got 86 votes, and was selected by NIST as the AES, and Serpent got 59 votes).

Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It is related to the earlier Blowfish block cipher, also designed by Bruce Schneier.

External Links

Twofish Homepage Wikipedia article on Twofish