What Proxies Are For
When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among
Home / Blog / EH Security / Habu: Python Network Hacking Toolkit
These are essential capacities that assist with a few undertakings for Ethical Hacking and Penetration Testing. A great part of the capacities are truly essential (like get our open IP address), however are truly valuable sometimes.
Almost all commands implement the verbose mode with the ‘-v’ option. This can give you some extra info about what habu is doing.
This command sends ARP ‘is-at’ packets to each victim, poisoning their ARP tables for send the traffic to your system.
This command listen for ARP packets and shows information each device.
This command tries to connect to various services and check if you can reach them using your internet connection.
This command send a DHCP request and shows what devices has replied. Using the ‘-v’ parameter (verbose) you can see all the options (like DNS servers) included on the responses.
This command prints the EICAR test string that can be used to test antimalware engines.
This command computes various hashes for the input data, that can be a file or a stream.
This command prints your current public IP based on the response from https://api.ipify.org.
This command creates TCP connections and prints the TCP initial sequence numbers for each connections.
This command implements the LAND attack, that sends packets forging the source IP address to be the same that the destination IP. Also uses the same source and destination port. The attack is very old, and can be used to make a Denial of Service on old systems, like Windows NT 4.0. More
This command implements the classic ‘ping’ with ICMP echo requests.
This command launches snmp-get queries against an IP, and tells you when finds a valid community string (is a simple SNMP cracker). The dictionary used is the distributed with the onesixtyone tool
This command launches a lot of TCP connections and keeps them opened. Some very old systems can suffer a Denial of Service with this.
This command send TCP packets with different flags and tell you what responses receives. It can be used to analyze how the different TCP/IP stack implementations and configurations responds to packet with various flag combinations.
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among
You might have heard that the iPhone is almost completely impossible to hack or that Samsung devices have some of the best firewalls in the
As with any technological component, security must be a primary consideration when managing a Kubernetes environment. Applications are constantly at the risk of compromising with
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings