fbpx

Complemento Backtrack 5 Toolkit

Backtrack contain a list of different tools that are really helpful in the process of penetration testing and ethical hacking. Complemento is another a good tool or it is a toolkit that is a collection of multiple tools. When we combine Letdown, ReverseRaider and Httsquash this is called Complemeno. It is available on backtrack 5.

LetDown DOS

LetDown is a “full” tcp flooder. It’s not a simple syn flooder: it’s able to interrupt the communication at any stage of the TCP protocol.
That means you can manage a complete connection (with a standard fin/fin-ack ending) or stop the connection early, leaving the target’s network stack in various possible states
.

ReverseRaider

ReverseRaider is a domain scanner that uses brute force wordlist scanning to find a target subdomain or reverse resolution of IP ranges. It supports permutation on wordlist, IPv6 and also some DNS options.

HttSquash

Httsquash is an http server scanner, banner grabber and data retriever. It can be used to scann large ranges of IP addresses to find networked devices and http servers. It supports IPv6, personalized requests and a basic fingerprint engine.

Video Tutorial of LetDown


Download


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...