Attacker’s Toolkit Framework

Mi'kail Eli'yah
4 min readSep 3, 2021

_

[Infrastructure — Network] 
1. Topology Scanner: Finding the weak joint for partition attacks
2. Packer sniffer (Wireless and Wire tappers, access point detection and discovery, Man-in-the-middle interception tool)"""
Gathering all the resources with malicious intent at the juncture, there is almost no defense for the bastion against 10 000 bots, where there is no reinforcement abut nor at sight. - regarding bot attacks, "Security do not exist", 2006-06.27
"""
[System]
1. Malware generator: Collection of Trojans, Viruses, Worms, Malware, Denial of service (DoS) tools, Distributed denial of service (DDoS) tools, Spyware, Backdoors (akin OpenSSH Secure remote access), etc
2. Vulnerability assessment tool:
2.1. Internal scans: Discovery and analysis on Certificate, ssh keys, vulnerable modules marked by CVEs, Intrusion detection (internal tripwires and honey pots)
2.2. External scans: Port protocols, port scanner (active status and activity)
3. Password bruteforce-recovery tool (include hash cracker)
Programmable payload analysis (including Built-in format utilities for customizable data structure, format and meta-tag recognizers, etc)
"""
Criteria for meaning is the criteria for memory, and to separate the gap to divide the…

--

--