background preloader

Communication Consolidation

Communication Consolidation

John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL. To verify authenticity and integrity of your John the Ripper downloads, please use our PGP public key. Contributed resources for John the Ripper:

Open Port Check Tool PRISM – PRISM is the platform for service providers big and small. From deployments on thousands of servers down to a single netbook, PRISM lets you build, deploy, and manage valuable new applications and services. Applications like rich calling, presence, HD conferencing, and automated voice, text, or IM agents. Best yet, PRISM is 100% geek compliant and carrier compliant, with web-centric API support for Java, Node.JS, Ruby, and Groovy; plus tight integration with SIP and IMS devices, services, and carrier networks. PRISM’s Rayo protocol makes it easy to add support for any up and coming programming platform or religion. PRISM is in production use every day at the largest service providers in the world. PRISM ships with several pre-built applications.

Scanning the Internet with Nmap (Defcon 16) Tutorial Scanning The Internet With Nmap (Defcon 16) Description: How would you like to scan millions of hosts on the Internet and catalog all the interesting insights? This is exactly what Fyodor, the author of Nmap or Network Mapper did last summer. Thankfully, he then went on to share his finding with the community at Defcon 16 in his talk titled "Nmap: Scanning the Internet". Interestingly, as Fyodor notes in his talk that scanning such a large set of IP addresses did help him in uncovering many bugs in Nmap and also forced him to make enhancements and add new features to make the scanner really fast. The slides for the presentation are available here and a high resolution video can be downloaded here. Disclaimer: We are a infosec video aggregator and this video is linked from an external website.

OpenVAS - OpenVAS - Open Vulnerability Assessment System Community Site Introduction · rayo/rayo-server Wiki Introduction Rayo is a message-oriented XML protocol for controlling phone calls, audio mixers and a variety of advanced media resources such as speech recognizers, speech synthesizers and audio recorders. These capabilities can be combined to create a wide variety of applications such as menu-based phone systems, in-game conferencing and anonymous dating services. So why another protocol? While call and media control protocols are nothing new, existing options are either way too low level and difficult to use (e.g. SIP, MRCP, MGCP, etc.) or far too restrictive for highly interactive applications (e.g. Key Features Call Control: Incoming calls are "offered" to clients at which point they can be answered, rejected, redirected to another destination, etc. Clients and Servers Rayo is a client/server protocol. Server informing client of a new incoming call (Offer Event) Client telling server to answer the call (Answer Command) As previously mentioned, Rayo is a message-oriented XML protocol. <!

Nessus With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues. Advanced Support Plan Features Phone Support Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts. Chat Support Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year. Tenable Community Support Portal All named support contacts can open support cases within the Tenable Community. Initial Response Time P1-Critical: < 2 hr P2-High: < 4 hr P3-Medium: < 12 hr P4-Informational: < 24 hr Support Contacts Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software.

ShieldsUP! — Internet Vulnerability Profiling Your Internet connection's IP address is uniquely associated with the following "machine name": The string of text above is known as your Internet connection's "reverse DNS." The end of the string is probably a domain name related to your ISP. The concern is that any web site can easily retrieve this unique "machine name" (just as we have) whenever you visit. If the machine name shown above is only a version of the IP address, then there is less cause for concern because the name will change as, when, and if your Internet IP changes. There is no standard governing the format of these machine names, so this is not something we can automatically determine for you. Just something to keep in mind as you wander the Internet.

PsExec Introduction Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs on remote systems, but they can be a pain to set up and require that you install client software on the remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems. Note: some anti-virus scanners report that one or more of the tools are infected with a "remote admin" virus. None of the PsTools contain viruses, but they have been used by viruses, which is why they trigger virus notifications. Installation Just copy PsExec onto your executable path. Using PsExec Examples

Related: