Pentesting using PDA with TigerSuite V.3
TigerSuite are Network Security Assessment set of tools for PocketPC and windows CE.
The purpose here is to introduce a suite of tools that can be used to facilitate a security analysisâ€”to discover, test, and even penetrate host computers and networks for and against security vulnerabilities.
Before launching into a discussion on the inner workings of TigerSuite PDA, some definitions are in order, some â€œtiger terminology,â€ if you will. We begin by identifying the role of a tiger team. Originally, a tiger team was a group of paid professionals whose purpose was to penetrate perimeter security, and test or analyze the inner-security policies of corporations. These people basically hacked into the computer systems, phone systems, safes, and so on to help the companies that hired them to know how to effectively
revamp their security policies.[Excerpt from Tigersuite guide]
TigerSuite includes modules for remote scanning, service detection, and penetration testing, plus network and file tools such a hex editor, IP subnetter, host collaboration and remote Trojan scanner with remediations. The suite operates from Main Memory or Storage Card, and is compatible with wireless, IR and LAN Internet and/or network connections.
- Larger database.
- Hex Editor—File Hack.
- IP Subnetter.
- Remote Trojan Scanner.
- Host Collaboration.
- Stealth Scanning.
- Port FIN Scanner.
- Session Sniffers.
- Service Recognition and Verification.
- TigerSim Virtual Server Simulators.
- WLAN Scanning with RC Site Query.
[TigerSuite has been added to Security-Database Tools Watch Process]