background preloader

Go Deep.

https://www.wireshark.org/

Related:  ToolShedUtility ResourcesIT Stuff

aircrack-ng Description Aircrack-ng is an 802.11 WEP and WPA/WPA2-PSK key cracking program. Aircrack-ng can recover the WEP key once enough encrypted packets have been captured with airodump-ng. John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL.

Autopsy Forensic Browser: Description Description Autopsy is a graphical interface to the command line digital investigation analysis tools in The Sleuth Kit. Together, they can analyze Windows and UNIX disks and file systems (NTFS, FAT, UFS1/2, Ext2/3). The Sleuth Kit and Autopsy are both Open Source and run on UNIX platforms (you can use Cygwin to run them both on Windows). As Autopsy is HTML-based, you can connect to the Autopsy server from any platform using an HTML browser.

List of TCP and UDP port numbers Wikimedia list article This is a list of TCP and UDP port numbers used by protocols of the Internet protocol suite for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full-duplex, bidirectional traffic. CCIE Security - Cisco Networking Certification Courses Expert Level Knowledge and Experience Cisco Certified Internetwork Expert (CCIE) is the highest level of technical networking certification offered by Cisco. Put your knowledge and experience to the test. Achieve Cisco CCIE certification and accelerate your career.

Have I been pwned? API v2 Overview You're reading about v2 of the API which is presently the current version and returns a significant amount of additional data over v1. You can still access the documentation for v1 which continues to be available in the form it was originally released in. Index Specifying the API version The second version of the API is consumable in a variety of different fashions depending on how you'd like to specify the version. Computer acting funny? It may be infected with a virus! One great thing about computers is that they often warn us when something is wrong. Sometimes they suddenly slow down to a crawl, other times they start to freeze up or even crash for what seems to be no reason at all. Most of the time though, there is a reason why our computers start to act funny.

Macintosh Security Site -> Mac OS X Firewalk - Firewall Configur Firewalk X - Mac OS XFirewall Configuration Utility Firewalk X 2 is out now - download @ bottom of page! What is Firewalk? Firewalk is a Mac OS X configuration utility for the built in firewall. Internet protocol suite The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination.

Wi-Fi Protected Setup Flaws Make Wireless Network Brute-force Attacks Feasible Design flaws in the Wi-Fi Protected Setup (WPS) wireless standard can make it easier for attackers to obtain access codes for secured wireless networks by brute force. The vulnerabilities identified by security researcher Stefan Viehbock affect a large number of WPS-enabled routers and wireless access points. The WPS standard was created in 2007 by the Wi-Fi Alliance in order to provide non-technical users with a simple method of setting up wireless networks. The standard supports several Wi-Fi authentication methods including one that requires pushing a physical button on the router and one that uses a predefined PIN number printed on a sticker by the device manufacturer. The PIN-based method is mandatory for WPS-certified devices, which support it by default. Devices that are WPS-capable, but aren't certified, are also likely to use the method.

What is decision support system (DSS)? - Definition from WhatIs.com A decision support system (DSS) is a computer program application that analyzes business data and presents it so that users can make business decisions more easily. It is an "informational application" (to distinguish it from an "operational application" that collects the data in the course of normal business operation).Typical information that a decision support application might gather and present would be: By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners.

Related:  Cisco 1ShadowSecurityHacking / HackenOpSecTracking systems and companiesPenetration Testing Tools and How2sToolshackin9SecuritynetworkingInternet Security InfoToolsToolsusefultechnologie