background preloader

Wireshark · Go Deep.

https://www.wireshark.org/

Related:  Cisco 1Hacking tutorials sites & toolsSecurity ToolsOpSecPenetration Testing Tools and How2s

List of TCP and UDP port numbers This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half-duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full-duplex, bidirectional traffic. John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL.

Autopsy Forensic Browser: Description Description Autopsy is a graphical interface to the command line digital investigation analysis tools in The Sleuth Kit. Together, they can analyze Windows and UNIX disks and file systems (NTFS, FAT, UFS1/2, Ext2/3). The Sleuth Kit and Autopsy are both Open Source and run on UNIX platforms (you can use Cygwin to run them both on Windows). As Autopsy is HTML-based, you can connect to the Autopsy server from any platform using an HTML browser.

BleachBit Portable cache, temp file and history cleaner BleachBit quickly frees disk space, removes hidden junk, and easily guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and delete temporary files. Version 1.10 for Windows, Multilingual 6MB download / 8MB installed (Details) - Support BleachBit development Configure WDS with Tomato Firmware From "Must-Have Firmware Tips by Souvik A Wireless Distribution System is a system that enables the wireless interconnection of access points in an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without the need for a wired backbone to link them, as is traditionally required. This is a cheap and easy way to extend your wireless network coverage. It's cheap, because you can extend your network with couple of routers (which usually costs less that 60$) with the open-source firmware like Tomato including the Linux-powered Netgear wgr614L or other compatible routers. It's easy, because you need only apply a few configuration settings to your routers, creating a repeater bridge to extend your wireless network. WDS Rules & Regulation

Internet protocol suite The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination.

Computer acting funny? It may be infected with a virus! One great thing about computers is that they often warn us when something is wrong. Sometimes they suddenly slow down to a crawl, other times they start to freeze up or even crash for what seems to be no reason at all. Most of the time though, there is a reason why our computers start to act funny. Macintosh Security Site -> Mac OS X Firewalk - Firewall Configur Firewalk X - Mac OS XFirewall Configuration Utility Firewalk X 2 is out now - download @ bottom of page! What is Firewalk? Firewalk is a Mac OS X configuration utility for the built in firewall.

IO Ninja Scriptable/Programmable The word "programmable" speaks for itself. Now you can turn IO Ninja into your personal IO debugger and tune it to your liking with Jancy scripting. E4210-16-PoE Switch (JE031A) specifications - HP Product for Business products - Nightly HP 4210 Switch Series are entry-level 10/100 Ethernet LAN switches with enterprise-class quality of service (QoS), security, and management features, delivering high value for network administrators looking for an economical edge device. Available Power over Ethernet (PoE) models are ideal for Voice over IP and wireless networking installations, while non-PoE models are also available for simple port expansion. Dual-personality ports allow flexibility, setting them apart from lower-end devices. The series supports an industry-standard command-line interface, Web-based administration, and SNMP management. Switches can be clustered in any combination up to 255 units for simplified administration.

Brief History of the Internet - Internet Timeline Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C.

Related:  IT Securityweb security toolsShadowHacking / HackenSecurityWindowsSecuriteopen source system management toolsNetwork securityda tubesSoftware Tools & ServicesToolssoftwarebufferbloatMisc