This section covers the defensive tools seen on CEH.The scanning algorithm is still not optimal, but already quite fast. Armitage (Linux, app) (GUI for metasploit).Session Hijacking Proxies to intercept or alter data/cookie.Theef Server (Windows app) (controlled by Theef Client).SwayzCryptor (Windows app) (controlled by njRAT Manager).njRAT Builder (Windows app) (controlled by njRAT Manager).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |