Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources Top 50 Hacking Tools That You Must Have Whether you are a Penetration tester, a hacker or an aspiring newbie trying to learn Cyber Security, you must have a nice catalogue of tools to make your life easier. While these tools do make working simpler but cannot compensate for the vast amount of knowledge required in this field. In this post i’m going to mention 50 different tools under 9 categories that your ‘Hack Lab’ must have. Most of the tools mentioned in this post are pre-included in Kali Linux which you can install to have them at once. Intrusion Detection Systems :- These are the tools you must have if you’re building a hack lab for penetration testing or for any security arrangement. SnortNetCop Encryption Tools :- While the above tools do identify any suspicious activity but they can’t protect your data, you need encryption tools for that. TrueCrypt (The project has been shut down and no longer supported)OpenSSHPuttyOpenSSLTorOpenVPNStunnelKeePass Port Scanners :- NmapSuperscanAngry IP Scanner Packet Sniffers :- Enjoy..!!
Why were the '90s so cynical? People say the '90s were the decade of cynicism--Why so?I mean the '00s even with the tragedies of that decade weren't that cynical, and the '80s seem to have been the decade of optimism despite the nation just suffering through Vietnam and it's after effects, Watergate, Jimmy Carter's Malaise, the rebirth of the Cold War under Carter/Reagan, and the economic dispartiy caused by Reagan's "Trickle-Down" economics. You'd think the '90s would've been a period of optimism--The Cold War was finally over and thus the threat of nuclear war seemed pretty much finished, a new generation was in power, there was economic prosperity...So why the cynicism? What the hamster said. "I saw the decade end, when it seemed the world could change in the blink of an eye And if anything, then there's your sign -- of the times." - Jesus Jones, Right Here, Right Now: singing about the fall of the Berlin Wall, and not anticipating how ironic that line would sound in Post-9/11 America.
A Guide to Efficiently Using Irssi and Screen | quadpoint.org Irssi is a text-only IRC client. It does not get in your way and its commands are intuitive and useful. Non-standard features are implemented with perl scripts, rather than in the core. Irssi can range from a functional, no-frills client to a highly-customized and automated client. Irssi is not the only focus of this guide. Getting Connected The first step is to start irssi. irssi You should now see Irssi in its default state–disconnected, with some blue bars at the top and bottom. In Irssi, there are three important connection-related commands: /server, /connect, and /disconnect. For example, typing /connect irc.foo.com will open a new network connection and connect to irc.foo.com. (05:23:10) (ms[+abilorsuwxyz]) (1:NullIRC (change with ^X)) In this example, NullIRC is the active network. At this point you should have a just-opened instance of Irssi, with no connections to any server. /connect irc.nullirc.net If everything connected fine, join a channel by typing: /join #test Switching Windows
Metropol iPhone: Subway, Bus and Train Maps For Cities Worldwide | MakeUseOf.com This iPhone Friendly mobile website provides you with a comprehensive collection of subway, bus and train route maps for cities worldwide. Currently maps for more then 70 cities are available and more being added. The website is really simple to use, just type www.med44.com/metro/ in to your mobile or iPhone browser and find the city of your interest. Features: Get subway, bus or train maps for cities worldwide.Access maps using your iPhone or from any web enabled mobile phone.Currently maps for 70 major cities are available (and more being added).Download and save maps to your phone.Contribute by submitting map of your city. You might be also interested in other similar tools that we have covered earlier: - iSubwayMaps (subway maps for your iPhone or iPod Touch) - Schmap (free city guides for your PC and Mobile) - SubwayMaps (printable metro maps) Check out Metropol iPhone @ www.med44.com/metro/
Mozilla Firefox Freedom of speech should not be sacrificed in the recording industry's war to restrict the public from making copies of digital music. EFF has asked a federal court to declare that scientists from Princeton and Rice University can publish their research on digital music security weaknesses at the USENIX Conference in August 2001. When a team led by Princeton Professor Edward Felten accepted a public challenge by the Secure Digital Music Initiative (SDMI) to break new security systems, they did not give up their First Amendment right to teach others what they learned. Yet they have been threatened by SDMI and the Recording Industry Association of America (RIAA) to keep silent or face litigation under the Digital Millennium Copyright Act (DMCA). Professor Felten has a career teaching people about security, yet the recording industry has censored him for finding weaknesses in their security. Frequently Asked Questions About Felten v. Supplemental Declaration of Ed Felten - Plaintiff Prof.
Security War Games Information security keeps evolving, but our educational methods are not evolving rapidly enough to win the cold cyberwar Let's face it: Protecting your technical environment from internal and external attacks isn't much different than the age-old wars fought since mankind picked up a rock. The goal is to keep people in and/or keep people out. Just much less blood. How are you preparing your Blue Team from getting decimated on the virtual battlefield? When it comes to information security, I've always found the "traditional" classroom-based training difficult to retain and recall at a moment's notice unless it was a hands-on exercise. Update: A reader caught my bad math. Oh, I forgot to mention that we did this without the instructor's knowledge. I barely recall other lessons the instructor presented, but I will never forget how we educated each other through unsanctioned war games. Our brains haven't evolved enough during the past 16 years to change how it stores data, but our wisdom has.
Clonezilla Welcome, Symantec Ghost goodbye Clonezilla is a partition or disk clone tool similar to Norton Ghost®. It saves and restores only used blocks in hard drive.. Two types of Clonezilla are available, Clonezilla live : It is suitable for single machine backup and restore. Clonezilla SE (server edition). : It can clone many computers simultaneously, it was used to clone 41 computers simultaneously and It took only about 10 minutes to clone a 5.6 GBytes system image to all 41 computers via multicasting! Clonezilla support most of the filesystem liek: ext2, ext3, ext4, reiserfs, xfs, jfs of GNU/Linux, FAT, NTFS of MS Windows, and HFS+ of Mac OS. Now we will see how it works, to do that first download Clonezilla : Download Clonezilla Now burn the image ISo in a cd and restart your computer. ( click on screenshots bellow to see full-size image) Clonezilla is a partition or disk clone tool similar to Norton Ghost®. Choose you language : 2- Choose to start Clonezilla 5- Choose which mode beginner or advanced mode Links :
www.linux-ntfs.org - Home (In)Security of the WEP algorithm This is some information about our analysis of the Wired Equivalent Privacy (WEP) algorithm, which is part of the 802.11 standard. This work was performed jointly by Nikita Borisov, Ian Goldberg, and David Wagner. If you have any questions, please contact us at firstname.lastname@example.org. Executive Summary We have discovered a number of flaws in the WEP algorithm, which seriously undermine the security claims of the system. Passive attacks to decrypt traffic based on statistical analysis. Our analysis suggests that all of these attacks are practical to mount using only inexpensive off-the-shelf equipment. Note that our attacks apply to both 40-bit and the so-called 128-bit versions of WEP equally well. WEP setup The 802.11 standard describes the communication that occurs in wireless local area networks (LANs). WEP relies on a secret key that is shared between a mobile station (eg. a laptop with a wireless ethernet card) and an access point (ie. a base station). Problems Attacks Monitoring