網絡工程師常備工具
If you're a penetration tester, there are numerous tools you can use to help you accomplish your goals.
如果您是滲透測試人員,則可以使用許多工具來幫助您實現目標。
From scanning to post-exploitation, here are ten tools you must know if you are into cybersecurity.
從掃描到漏洞利用后,您必須了解以下十種工具,以確保您參與網絡安全。
什么是網絡安全? (What is Cybersecurity?)
Being a cybersecurity engineer means being responsible for an entire network. This network includes computers, routers, mobile phones, and everything that connects to the internet.
成為網絡安全工程師意味著要對整個網絡負責。 該網絡包括計算機,路由器,移動電話以及連接到Internet的所有內容。
Thanks to the rise of Internet of Things, we see more and more devices connecting to the internet every day. Services like Shodan are proof of how dangerous it is to have an internet-connected device without adequate security.
由于物聯網的興起,我們每天看到越來越多的設備連接到互聯網。 Shodan之類的服務證明了擁有沒有足夠安全性的互聯網連接設備有多么危險。
We cannot rely on Antivirus software either, given how sophisticated today’s hackers are. Besides, most attacks nowadays use social engineering as their entry point. This makes it even harder for cybersecurity professionals to detect and mitigate these attacks.
考慮到當今黑客的復雜程度,我們也不能依靠防病毒軟件。 此外,當今大多數攻擊都以社會工程學為切入點。 這使得網絡安全專業人員更加難以檢測和緩解這些攻擊。
Covid-19 has become another major catalyst for growing cyber-attacks. Employees working from home don’t have access to the same enterprise-level security architectures in their workplace.
Covid-19已成為發展網絡攻擊的另一主要催化劑。 在家工作的員工無法在工作場所訪問相同的企業級安全體系結構。
The growing number of cyber-attacks have also increased the demand for cybersecurity professionals around the world. Due to this increasing demand, Cybersecurity has been attracting a lot of experts as well as beginners.
越來越多的網絡攻擊也增加了對全球網絡安全專業人員的需求。 由于這種需求的增長,網絡安全吸引了許多專家和初學者。
For those of you who are new to Cybersecurity, hacking is not as cool as it looks on TV. And there is a high probability that you will end up in jail.
對于網絡安全新手來說,黑客攻擊并不像在電視上看起來那么酷。 而且您很有可能最終入獄。
However, being a penetration tester or a white hat hacker is different – and beneficial – since you will be playing with the same tools black hat hackers (the bad ones) play with. Except for this time, it's legal, and your goal is to help companies discover security vulnerabilities so they can fix them.
但是,作為滲透測試人員或白帽黑客是不同的-也是有益的-因為您將使用與黑帽黑客(壞人)相同的工具。 除了這次,這是合法的,您的目標是幫助公司發現安全漏洞,以便他們可以修復它們。
You can learn more about the types of hackers here.
您可以在此處了解有關黑客類型的更多信息 。
It is always hard to find the right tools to get started in any domain, especially if you are a beginner. So here are 10 tools to help you get started as a cybersecurity engineer.
在任何領域都很難找到合適的入門工具,特別是如果您是初學者。 因此,這里有10種工具可幫助您入門,成為網絡安全工程師。
初學者網絡安全工程師的頂級工具 (Top Tools for Beginner Cybersecurity Engineers)
Wireshark (Wireshark)
Having a solid foundation in Networking is essential to becoming a good penetration tester. After all, the internet is a bunch of complex networks that communicate with each other. If you are new to Networking, I recommend this playlist by Network Direction.
扎實的網絡基礎對于成為一名優秀的滲透測試人員至關重要。 畢竟,互聯網是一堆相互通信的復雜網絡。 如果您不熟悉網絡,建議通過Network Direction推薦此播放列表 。
Wireshark is the world’s best network analyzer tool. It is an open-source software that enables you to inspect real-time data on a live network.
Wireshark是世界上最好的網絡分析器工具。 它是一個開源軟件,使您可以檢查實時網絡上的實時數據。
Wireshark can dissect packets of data into frames and segments giving you detailed information about the bits and bytes in a packet.
Wireshark可以將數據包分解為幀和段,從而為您提供有關包中位和字節的詳細信息。
Wireshark supports all major network protocols and media types. Wireshark can also be used as a packet sniffing tool if you are in a public network. Wireshark will have access to the entire network connected to a router.
Wireshark支持所有主要的網絡協議和媒體類型。 如果您在公共網絡中,也可以將Wireshark用作數據包嗅探工具。 Wireshark將有權訪問連接到路由器的整個網絡。
Sites like Facebook and Twitter are encrypted now, thanks to HTTPS. This means that even though you can capture packets from a victim computer in transit to Facebook, those packets will be encrypted.
借助HTTPS,現在可以對諸如Facebook和Twitter之類的網站進行加密。 這意味著,即使您可以捕獲從受害者計算機傳輸到Facebook的數據包,這些數據包也將被加密。
Still, being able to capture data packets in realtime is an important utility for a penetration tester.
盡管如此,對于滲透測試人員而言,能夠實時捕獲數據包仍然是重要的工具。
地圖 (Nmap)
Nmap is the first tool you will come across when you begin your career as a penetration tester. It is a fantastic network scanning tool that can give you detailed information about a target. This includes open ports, services, and the operating system running on the victim’s computer.
Nmap是您作為滲透測試員開始職業時會遇到的第一個工具。 這是一個了不起的網絡掃描工具,可以為您提供有關目標的詳細信息。 這包括打開的端口,服務以及在受害者計算機上運行的操作系統。
Nmap is popular among penetration testers for many reasons. It is simple, flexible, and extensible. It offers a simple command-line interface where you can add a few flags to choose different types of scans.
Nmap在滲透測試人員中很受歡迎,原因有很多。 它簡單,靈活且可擴展。 它提供了一個簡單的命令行界面,您可以在其中添加一些標志來選擇不同類型的掃描。
Nmap also offers simple ping scans all the way up to aggressive scans that provide detailed ports and service information.
Nmap還提供簡單的ping掃描,一直到提供詳細端口和服務信息的主動掃描。
Nmap also provides a GUI tool called Zenmap with added utilities. You can build visual network maps and choose scans via dropdowns. Zenmap is a great place to start playing with Nmap commands if you are a beginner.
Nmap還提供了一個名為Zenmap的GUI工具,其中添加了實用程序。 您可以構建可視網絡圖并通過下拉菜單選擇掃描。 如果您是初學者,Zenmap是開始使用Nmap命令的好地方。
I recently wrote a detailed article on Nmap that you can read here.
我最近在Nmap上寫了一篇詳細的文章, 您可以在這里閱讀。
Ncat(以前是Netcat) (Ncat (Previously Netcat))
Netcat is often referred to as the swiss-army knife in networking.
Netcat在網絡中通常被稱為“瑞士軍刀”。
Netcat is a simple but powerful tool that can view and record data on a TCP or UDP network connections. Netcat functions as a back-end listener that allows for port scanning and port listening.
Netcat是一個簡單但功能強大的工具,可以查看和記錄TCP或UDP網絡連接上的數據。 Netcat用作允許端口掃描和端口監聽的后端監聽器。
You can also transfer files through Netcat or use it as a backdoor to your victim machine. This makes is a popular post-exploitation tool to establish connections after successful attacks. Netcat is also extensible given its capability to add scripting for larger or redundant tasks.
您還可以通過Netcat傳輸文件,或將其用作受害者計算機的后門 。 這使得成功利用攻擊后建立連接的流行的利用后工具。 由于Netcat具有為大型或冗余任務添加腳本的功能,因此它也是可擴展的。
In spite of the popularity of Netcat, it was not maintained actively by its community. The Nmap team built an updated version of Netcat called Ncat with features including support for SSL, IPv6, SOCKS, and HTTP proxies.
盡管Netcat頗受歡迎,但社區并未積極維護它。 Nmap團隊構建了Netcat的更新版本,稱為Ncat ,其功能包括對SSL,IPv6,SOCKS和HTTP代理的支持。
Metasploit (Metasploit)
If there is one tool I love, its Metasploit. Metasploit is not just a tool, but a complete framework that you can use during an entire penetration testing lifecycle.
如果有我喜歡的一種工具,那就是Metasploit。 Metasploit不僅是一個工具,而且是您可以在整個滲透測試生命周期中使用的完整框架。
Metasploit contains exploits for most of the vulnerabilities in the Common Vulnerabilities and Exposure database. Using metasploit, you can send payloads to a target system and gain access to it though a command line interface.
Metasploit包含“ 常見漏洞和披露”數據庫中大多數漏洞的利用。 使用metasploit,您可以將有效載荷發送到目標系統并通過命令行界面訪問它。
Metasploit is very advanced with the ability to do tasks such as port scanning, enumeration, and scripting in addition to exploitation. You can also build and test your own exploit using the Ruby programming language.
Metasploit非常先進,除了可以利用漏洞外,還可以執行端口掃描,枚舉和腳本編寫等任務。 您還可以使用Ruby編程語言來構建和測試您自己的漏洞利用。
Metasploit was open-source until 2009 after which Rapid7 acquired the product. You can still access free community edition and use all its features.
Metasploit在2009年之前一直是開源的,之后Rapid7收購了該產品。 您仍然可以訪問免費社區版并使用其所有功能。
Metasploit used to be a purely command-line tool. A Java-based GUI called Armitage was released in 2013.
Metasploit過去只是一個純命令行工具。 2013年發布了基于Java的Armitage GUI。
尼克托 (Nikto)
Nikto is an open-source tool that is capable of performing extensive web server scans. Nikto can help you scan for harmful files, misconfigurations, outdated software installations, and so on.
Nikto是一種開源工具,能夠執行廣泛的Web服務器掃描。 Nikto可以幫助您掃描有害文件,配置錯誤,軟件安裝過時等等。
It also checks for the presence of multiple index files, HTTP server configurations, and the installed web server software.
它還會檢查是否存在多個索引文件,HTTP服務器配置以及已安裝的Web服務器軟件。
Nikto is the preferred tool for general web server security audits. Nikto is fast, but not quiet. You can scan a large web server pretty quickly but intrusion detection systems will easily pick up these scans. However, there is support for anti-IDS plugins in case you want to perform stealthy scans.
Nikto是常規Web服務器安全性審核的首選工具。 Nikto速度很快,但并不安靜。 您可以相當快地掃描大型Web服務器,但是入侵檢測系統可以輕松進行這些掃描。 但是,如果您要執行隱形掃描,則支持反IDS插件。
打p套房 (Burp Suite)
When it comes to pen-testing web applications, Burpsuite has all the answers for you. BurpSuite aims to be an all in one set of tools for a variety of web application pen-testing use cases. It is also a popular tool among professional web app security researchers and bug bounty hunters.
當涉及筆測試Web應用程序時,Burpsuite可以為您提供所有答案。 BurpSuite旨在成為針對各種Web應用程序筆測試用例的多功能工具。 在專業的Web應用程序安全研究人員和錯誤賞金獵人中,它也是一種流行的工具。
Burpsuite’s tools work together to support the entire web application testing lifecycle. From scanning to exploitation, Burpsuite offers all the tools you need for breaking into web applications.
Burpsuite的工具可以協同工作,以支持整個Web應用程序測試生命周期。 從掃描到開發,Burpsuite提供了進入Web應用程序所需的所有工具。
One of Burp Suite’s main features is its ability to intercept HTTP requests. HTTP requests usually go from your browser to a web server and then the web server sends a response back. With Burp Suite, you can perform Man-in-the-middle operations to manipulate the request and response.
Burp Suite的主要功能之一是能夠攔截HTTP請求。 HTTP請求通常從瀏覽器發送到Web服務器,然后Web服務器將響應發送回去。 使用Burp Suite,您可以執行中間人操作來操縱請求和響應。
Burpusite has an excellent user interface. Burpsuite also has tools for automation to make your work faster and more efficient.
Burpusite具有出色的用戶界面。 Burpsuite還具有自動化工具,可以使您的工作更快,更高效。
In addition to its default features, Burpsuite is extensible by adding plugins called BApps.
除了其默認功能外,Burpsuite還可以通過添加名為BApps的插件進行擴展。
開膛手約翰 (John the Ripper)
Passwords are still the de-facto standard of authentication in most systems. Even if you successfully get into a server or a database you will have to decrypt the password to gain privilege escalation.
在大多數系統中,密碼仍然是實際的身份驗證標準。 即使您成功進入服務器或數據庫,也必須解密密碼才能獲得特權升級 。
John the Ripper is a simple tool used for cracking passwords. It is a super-fast password cracker with support for custom wordlists. It can run against most types of encryption methods like MD5 and SHA.
開膛手約翰(John the Ripper)是用于破解密碼的簡單工具。 這是一個超快速密碼破解程序,支持自定義單詞列表。 它可以針對大多數類型的加密方法(例如MD5和SHA)運行。
空襲 (Aircrack-ng)
Aircrack-ng is a set of tools that help you to work with wireless networks. Aircrack comprises of tools that can capture wireless networks, crack WPA keys, inject packets, and so on.
Aircrack-ng是一組工具,可幫助您使用無線網絡。 Aircrack包含可捕獲無線網絡,破解WPA密鑰,注入數據包等的工具。
A few tools in the Aircrack-ng suite include:
Aircrack-ng套件中的一些工具包括:
- airodump?—?Captures packets airodump —捕獲數據包
- aireplay?—?Packet injection aireplay —數據包注入
- aircrack?—?Crack WEP and WPA aircrack —破解WEP和WPA
- airdecap?—?Decrypt WEP and WPA airdecap —解密WEP和WPA
Aircrack contains excellent algorithms for cracking WiFi passwords and to capture wireless traffic. It can also decrypt encrypted packets, making it a complete suite of tools for wireless penetration testing.
Aircrack包含用于破解WiFi密碼和捕獲無線流量的出色算法。 它還可以解密加密的數據包,使其成為用于無線滲透測試的完整工具套件。
In short, you can use Aircrack for monitoring, attacking, and debugging all types of wireless networks.
簡而言之,您可以使用Aircrack監視,攻擊和調試所有類型的無線網絡。
Nessus (Nessus)
Nessus is a popular enterprise vulnerability scanner. Nessus is built to be a complete vulnerability analysis and reporting tool. While you can scan and find ports or services using Nmap, Nessus will tell you the list of vulnerabilities and how they can be exploited.
Nessus是一種流行的企業漏洞掃描程序。 Nessus被構建為一個完整的漏洞分析和報告工具。 雖然您可以使用Nmap掃描和查找端口或服務,但Nessus會告訴您漏洞列表以及如何利用它們。
Nessus has an excellent user interface, tens of thousands of plugins, and supports embedded scripting. It is often favored by enterprises since it helps companies audit for various compliances like PCI and HIPPA. Nessus will also tell you the severity of the vulnerabilities so that you can focus on those threats accordingly.
Nessus具有出色的用戶界面,數以萬計的插件,并支持嵌入式腳本。 它通常受到企業的青睞,因為它可以幫助公司審核各種合規性,例如PCI和HIPPA。 Nessus還將告訴您這些漏洞的嚴重性,以便您可以相應地關注這些威脅。
Nessus is not a free software, but offers a limited free home edition. Nessus has an open-source alternative called Open-Vas that offers similar features.
Nessus不是免費軟件,但提供了有限的免費家庭版。 Nessus有一個稱為Open-Vas的開源替代方案,它提供類似的功能。
鼻息 (Snort)
Snort is an open-source software for detecting and preventing intrusions in a network. It can perform live traffic analysis and log incoming packets to detect port scans, worms, and other suspicious behavior.
Snort是用于檢測和阻止網絡入侵的開源軟件。 它可以執行實時流量分析并記錄傳入的數據包,以檢測端口掃描,蠕蟲和其他可疑行為。
Snort is used for defense compared to most of the other tools in this list. However, snort helps you understand the attacker’s methods by logging their activity. You can also build DNS sinkholes to redirect attacker traffic while finding attack vectors through Snort.
與該列表中的大多數其他工具相比,Snort用于防御。 但是,snort通過記錄攻擊者的活動來幫助您了解攻擊者的方法。 您還可以建立DNS漏洞以重定向攻擊者流量,同時通過Snort查找攻擊媒介。
Snort also has a web-based GUI called BASE (Basic Analysis and Security Engine). BASE provides a web front-end to query and analyze the alerts coming from Snort.
Snort還具有一個基于Web的GUI,稱為BASE(基本分析和安全引擎)。 BASE提供了一個Web前端來查詢和分析來自Snort的警報。
結論 (Conclusion)
In today’s networked world, everyone from government agencies to banks stores critical information in the cloud. Cyber-attacks even have the potential to cripple an entire nation. Hence, protecting these networks is not a choice, but an absolute necessity.
在當今的網絡世界中,從政府機構到銀行的每個人都將關鍵信息存儲在云中。 網絡攻擊甚至有可能削弱整個國家。 因此,保護??這些網絡不是選擇,而是絕對必要。
Whether you are a beginner or an experienced cybersecurity engineer, you will find these ten tools invaluable. Good luck on your journey to becoming a successful penetration tester. Learn more tools from the Security Tools Directory.
無論您是初學者還是經驗豐富的網絡安全工程師,您都會發現這十種工具非常寶貴。 祝您成功成為滲透測試員,祝您旅途順利。 從“ 安全工具目錄”中了解更多工具。
I regularly write about Machine Learning, Cyber Security, and AWS. You can signup for my weekly newsletter here.
我定期撰寫有關機器學習,網絡安全和AWS的文章。 您可以 在這里 注冊我的 每周新聞 。
翻譯自: https://www.freecodecamp.org/news/10-tools-you-should-know-as-a-cybersecurity-engineer/
網絡工程師常備工具