All these tools are useful for administratively troubleshooting networks. But remember it is like a double edge sword, you can use them either way. People are currently serving jail terms simple because they try to break networks they weren’t authorized to. So if you plan to use these tools negatively, you better have a rethink. And as usual, your mile may vary: standard disclaimer.
The important part here is not to show how to attack something, but to show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
Before we start, however, let me make one thing absolutely clear: I neither condone nor will we ever aid or defend those who attack networks or systems they do not own or that they have not been asked to attack. One of the greatest challenges the security community faces is lack of information on the enemy. Questions like who is the threat, why do they attack, how do they attack, what are their tools, and possibly when will they attack? It is questions like these the security community often cannot answer. For centuries military organizations have focused on information gathering to understand and protect against an enemy. To defend against a threat, you have to first know about it. However, in the information security world we have little such information.
This is about securing networks, not distributing tools to break them. Certain information systems security professionals, namely those who are charged with pen testing, have a legitimate use for these tools. In addition, to stop a criminal hacker requires the ability to think like a criminal. After all, the objective is to demonstrate what an attacker would do. Most of us have been taught from a very early age to be good law-abiding people and are simply not good at thinking up very plausible and innovative criminal schemes.
check these tools out: you can google them if you like
Ettercap - I've been personally using Ettercap for over a year and one of the most useful features I have found is it's flooding technique. Using the required plugins, you are able to bring a P4 with 512MB ram Linux server to its knees in around 40 seconds! Amongst the 20 plugins it comes with, here are the most popular:
Lamia- This plug-in allows you to become the root in a switched network that uses the STP protocol to avoid loops.
Spectre: Floods the LAN with random MAC addresses
Banshee: Described as "They kill without discretion... "
Golem: A dangerous D.O.S plugin and lastly its useful Hxx_xxx series plugins
They allow you to steal passwords and data from HTTP, POP, SMTP and a number of other types of streams.