background preloader

Open Port Check Tool

Open Port Check Tool

John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. To verify authenticity and integrity of your John the Ripper downloads, please use our PGP public key. There's a wiki section with John the Ripper user community resources.

Nmap - Free Security Scanner For Network Exploration & Security Audits. Check an Open Relay Retrouver un mot de passe oublié ou perdu sur Windows Vous avez perdu ou oublié votre mot de passe Windows ? Je vais vous montrer comment réinitialiser le mot de passe d’un de vos comptes utilisateurs pour que vous puissiez accéder de nouveau à Windows ;) On ne peut pas à proprement parlé retrouver un mot de passe perdu ou oublié sur Windows. En revanche, je vous propose deux méthodes pour effacer ou réinitialiser le mot de passe d’un utilisateur : Première méthode : exploiter une faille de sécurité de Windows grâce au CD d’installation de Windows ou avec le CD d’une distribution Linux permettant de réinitialiser le mot de passe de n’importe quel utilisateurDeuxième méthode : utiliser le programme Offline NT Password & Registry Editor qui permet d’effacer ou modifier les mots de passe de n’importe quel utilisateur en modifiant les données du SAM (Security Account Manager), la base de données des comptes utilisateur de Windows Les deux méthodes présentées pour réinitialiser un mot de passe oublié fonctionnent avec Windows XP, Vista, 7 et 8.

iftop: display bandwidth usage on an interface iftop does for network usage what top(1) does for CPU usage. It listens to network traffic on a named interface and displays a table of current bandwidth usage by pairs of hosts. Handy for answering the question "why is our ADSL link so slow?". Requirements libpcap libcurses Download The latest stable version of iftop is 0.17. Download: iftop-0.17.tar.gz or iftop-1.0pre4.tar.gz. If you wish to be notified of new releases of iftop then please subscribe to the Freshmeat project, or the mailing list. Change log The change log for iftop is available here. Mailing list There is a mailing list for iftop. Patches and contributions Patches are always very welcome, and I try to give credit appropriately. git repository The iftop source code is maintained in git: Screenshots Standard view, port display off, two lines per host pair Host names hidden, source port shown, one line per host pair = network traffic by service Hosted by:

Nessus From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Today, Nessus is trusted by more than 27,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. See for yourself - explore the product here. 1 in Accuracy Nessus has the industry's lowest false positive rate with six-sigma accuracy. 1 in Coverage Nessus has the deepest and broadest vulnerability coverage in the industry. 100+ new plugins released weekly 1 in Adoption 1 in Hearts and Minds Don't just take our word for it.

FreeSWITCH | Communication Consolidation Wireshark · Go deep. ophcrack download List of device bandwidths This is a list of device bit rates, or physical layer information rates, net bit rates, useful bit rates, peak bit rates or digital bandwidth capacity, at which digital interfaces of computer peripheral equipment and network devices can communicate over various kinds of buses and networks. Bar chart of common computer interface speeds The distinction can be arbitrary between a bus, (which is inside a box and usually relies on many parallel wires), and a communications network cable, (which is external, between boxes and rarely relies on more than four wires). Many device interfaces or protocols (e.g., SATA, USB, SCSI, PCI and a few variants of Ethernet) are used both inside many-device boxes, such as a PC, and one-device-boxes, such as a hard drive enclosure. Accordingly, this page lists both the internal ribbon and external communications cable standards together in one sortable table. Factors limiting actual performance, criteria for real decisions[edit] Conventions[edit] Bandwidths[edit]

Scanning the Internet with Nmap (Defcon 16) Tutorial Scanning The Internet With Nmap (Defcon 16) Description: How would you like to scan millions of hosts on the Internet and catalog all the interesting insights? This is exactly what Fyodor, the author of Nmap or Network Mapper did last summer. Thankfully, he then went on to share his finding with the community at Defcon 16 in his talk titled "Nmap: Scanning the Internet". In this talk Fyodor demos many of the new features he has added in Nmap lately including but not limited to - optimizing the host discovery process using TCP and UDP techniques, finding most used TCP and UDP ports on the Internet and inside Intranets of large corporations, packet rate control with a minimum and maximum setting, the pack trace option, ncat - which is a netcat clone and ndiff which allows one to diff between different scan dumps. The slides for the presentation are available here and a high resolution video can be downloaded here.

comment configurer NTP pour utiliser ? Si vous voulez simplement synchroniser les horloges de vos ordinateurs au réseau, le fichier de configuration (pour le programme ntpd de la distribution, sur n'importe lequel des systèmes d'exploitation supportés : Linux, *BSD, Windows et même quelques systèmes plus exotiques) est vraiment simple : driftfile /var/lib/ntp/ntp.drift server server server server Les noms 0, 1, 2 et pointent vers un ensemble aléatoire de serveurs qui change toutes les heures. Vérifiez que l'horloge de votre ordinateur est réglée à peu près correctement (dans un intervalle de quelques minutes autour de la « vraie » heure) : vous pouvez utiliser ntpdate ou simplement la commande date pour mettre l'horloge de votre ordinateur à l'heure de votre montre. Démarrez ntpd et après un certain temps (cela peut durer jusqu'à une demi-heure !) net time / en ligne de commande. Remarques supplémentaires :

Effacer un mot de passe administrateur Windows sous XP, Vista ou Seven et accéder au système | Keroinsite Par Keroin le Lundi, 27 avril 2009, sous Informatique, Logiciels Si vous ne vous rappelez plus du mot de passe vous permettant d’accéder à la session administrateur de votre système Windows il n’y a pas des masses de solutions possibles, soit vous formatez la machine, soit vous vous résignez à ne pas utiliser la session administrateur et vous restez sur un compte « invité ». Comme le formatage de la machine est quand même une opération difficile à effectuer correctement pour la plupart des utilisateurs, nous allons voir comment effacer ou modifier le mot de passe administrateur en quelques clics grâce à un petit cd qui boot sous….Linux. Afin de ne pas trop compliquer la chose et que la procédure reste accessible au plus grand nombre, je vais prendre un exemple concret avec un tutoriel en image pas à pas pour effacer le mot de passe d’un PC fonctionnant sous Windows XP professionnel avec le Service Pack 3 installé. 1. Télécharger et graver l’image Linux : 2. Ensuite vous obtenez ceci : 1.