Pentesting using PDA with TigerSuite V.3

TigerSuite are Network Security Assessment set of tools for PocketPC and windows CE.

The purpose here is to introduce a suite of tools that can be used to facilitate a security analysis—to discover, test, and even penetrate host computers and networks for and against security vulnerabilities.

Before launching into a discussion on the inner workings of TigerSuite PDA, some definitions are in order, some “tiger terminology,†if you will. We begin by identifying the role of a tiger team. Originally, a tiger team was a group of paid professionals whose purpose was to penetrate perimeter security, and test or analyze the inner-security policies of corporations. These people basically hacked into the computer systems, phone systems, safes, and so on to help the companies that hired them to know how to effectively
revamp their security policies.[Excerpt from Tigersuite guide]

TigerSuite includes modules for remote scanning, service detection, and penetration testing, plus network and file tools such a hex editor, IP subnetter, host collaboration and remote Trojan scanner with remediations. The suite operates from Main Memory or Storage Card, and is compatible with wireless, IR and LAN Internet and/or network connections.

V3.0 Additions:

  • Larger database.
  • Hex Editor—File Hack.
  • IP Subnetter.
  • Remote Trojan Scanner.
  • Host Collaboration.
  • Stealth Scanning.
  • Port FIN Scanner.
  • Session Sniffers.
  • Service Recognition and Verification.
  • TigerSim Virtual Server Simulators.
  • WLAN Scanning with RC Site Query.

[TigerSuite has been added to Security-Database Tools Watch Process]

Post scriptum

Compliance Mandates

  • Vulnerability Scanner :

    PCI DSS 11.2, 6.6, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001-27002 12.6, 15.2.2


Related Articles

Vulnerability Scanner