The top program provides a dynamic real-time view of a running system. It can display system summary information as well as a list of tasks currently being managed by the Linux kernel. The types of system sum-
mary information shown and the types, order and size of information displayed for tasks are all user configurable and that configuration can be made persistent across restarts.
The program provides a limited interactive interface for process manipulation as well as a much more extensive interface for personal configuration — encompassing every aspect of its operation. And
while top is referred to throughout this document, you are free to name the program anything you wish. That new name, possibly an alias, will then be reflected on top’s display and used when reading and
writing a configuration file.
Htop is spin-off of top and much more visually appealing and extenisive in options.
pstree shows running processes as a tree. The tree is rooted at either pid or init if pid is omitted. If a user name is specified, all process trees rooted at processes owned by that user are shown.
pstree visually merges identical branches by putting them in square
brackets and prefixing them with the repetition count, e.g.
Security Cloak is designed to protect against TCP/IP stack fingerprinting and computer identification/information leakage via timestamp and window options by modifying relevant registry keys. The settings used are based on the results of SYN packet analysis by p0f. While the OS reported by other OS detection scanners were not identical to those of p0f, testing against Nmap, xprobe2, queso and cheops showed that they were unable to identify the correct operating system/version after Security Cloak settings had been applied.
Note that in order to properly emulate some Operating Systems, the MTU must be changed. While most of these require the MTU to be 1500 (the default for most network connections),depending on your network connection, this could degrade/interfere with your connectivity, so be sure to check your current MTU before applying these changes. It is recommended that you save all the original key values before using this program in the event that your computer responds negatively to the changes.
Windows Binary: http://www.craigheffner.com/security/
Security Cloak in Action:
I am preety sure I am not running Sega Dreamcast 3.0 .
On a Seperate note. Not Using Security Cloak but trying some modification I changed my server banner into this: (netcraft hasn’t been updated yet as of this writing)
Hacking Hacking Linux News News Software Review Hacking Tools Linux News News Nmap Software Review
Since the beginning of the Backtrack 2 hacking tools review till now, we have reviewed every single one tools under the Information Gathering Banner. That’s 26 in total!! Some doesn’t work anymore (1 2&3), but most do.
Here is a list of all the tools with links reviewed sofar:
Goog Mail Enum
Intrace & Itrace
Netenum & DNSenum
It’s been fun. Next will Network Mapping collection of tools.
Backtrack 2 Hacking Hacking Tools Linux News