background preloader

OpenSSH

OpenSSH
Related:  Secure Comm tools (dev included)

Top 10 Password Crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 5 months ago). crackers wireless UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. version 4.9.43 on Dec. 3, 2011 (10 months ago). sniffers fuzzers

Configuring Apache 2 for SSL/TLS Mutual Authentication using an Apache 2 and OpenSSL provide a useful, easy-to-configure and cost-effective mutual SSL/TLS authentication development and test environment. This document provides instructions for configuring X.509 client certificate authentication using the following system components: Apache 2.0 web server with built-in mod_ssl support on Linux/UNIX OpenSSL on Linux/UNIX Firefox 1.5 web browser Internet Explorer 6.0 web browser The following steps are required: Creating a Certificate Authority using OpenSSL A Certificate Authority (CA) creates and manages certificates for web servers, web clients, email encryption, code signing, etc. Although almost all commercial web sites use X.509 certificates issued by well known public certificate authorities like Verisign and Thawte, it is also common for companies to serve as their own certificate authority for intranet and extranet sites. Configuring OpenSSL % which openssl /usr/bin/openssl % cd /usr/local/ssl % cp openssl.cnf openssl.cnf.ORIG

Airsnarf - A rogue AP setup utility TheOnionRouter/TorifyHOWTO - Noreply Wiki Copyright (c) 2004 Thomas Sjogren. Copyright (C) 2004, 2005, 2006, 2007 Contributors Distributed under the MIT license, see Legal Stuff for a full text. Torifying software HOWTO ¶ This document explains how to configure particular programs to use Tor. Note that this is a very brief document on how to make various programs use Tor as a proxy; you should read the documentation at first. Feel free to edit this page --- it's a Wiki, after all. Basic Configuration Issues ¶ Unix and Linux Configuration ¶ First, we assume you installed Privoxy or Polipo. Under Unix and GNU/Linux, most HTTP capable applications, like lynx , wget and curl , will honor the value of the http_proxy environment variable. Add the following lines to your $HOME/.bash_profile, $HOME/.bashrc, or env settings: http_proxy= HTTP_PROXY=$http_proxy export http_proxy HTTP_PROXY Mac OSX Configuration ¶ First, we assume that you downloaded the Vidalia Bundle and not the Browser Bundle.

Firesheep - Wikipedia, the free encyclopedia - StumbleUpon The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist.[5] Countermeasures[edit] HTTPS[edit]

Réseau privé virtuel Un article de Wikipédia, l'encyclopédie libre. Pour les articles homonymes, voir VPN et RPV. Principe d'un VPN simple Le VPN permet donc d'obtenir une liaison sécurisée à moindre coût, si ce n'est la mise en œuvre des équipements terminaux. Le VPN vise à apporter certains éléments essentiels dans la transmission de données : l'authentification (et donc l'identification) des interlocuteurs, la confidentialité des données (le chiffrement vise à les rendre inutilisables par quelqu'un d'autre que le destinataire). L'utilisation d'un VPN en France est totalement légale. Fonctionnement[modifier | modifier le code] Exemple de réseau privé virtuel entre un siège et des agences régionales Un VPN repose sur un protocole, appelé protocole de tunnelisation, c'est-à-dire un protocole permettant aux données passant d'une extrémité à l'autre du VPN d'être sécurisées par des algorithmes de cryptographie. Protocoles de tunnelisation[modifier | modifier le code] Les principaux protocoles de tunnelisation sont :

Short Film of the Day: Stuxnet: Anatomy of a Computer Virus | Film School... - StumbleUpon Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics. It’s beautiful, compelling, and it does tell a story, but it’s nothing like most short films. What does it cost? Check out Stuxnet: Anatomy of a Computer Virus for yourself: Trust us.

Gtunnel – Le proxy qui passe par Skype Gtunnel – Le proxy qui passe par Skype GTunnel est un petit proxy (pour windows) qui permet d'éviter la censure en faisant passer toutes vos connexions via TOR (classique quoi) ou Skype ! Basé sur une initiative du Global Information Freedom Consortium, Gtunnel en passant par Skype assure que les paquets soient chiffrés du début à la fin. Votre IP est inconnue du serveur final et n'hésitez pas à coupler ce proxy avec des softs comme UltraSurf, FreeGate, FirePhoenix, GPass, et Ranking pour être sûr de passer à travers toutes les cyber murailles du web. Attention quand même si vous êtes en Chine, ne téléchargez pas la version chinoise de Skype qui contient peut être un mouchard, mais utilisez la version internationale dispo sur Skype.com [photo] Vous avez aimé cet article ?

Transferring your iTunes Library For most users, iTunes does a great job of handling all of the details of managing your media library for you, allowing you to manage your content through iTunes itself and not having to worry too much about the underlying files and folders that make up your iTunes library. Unfortunately, this user-friendly approach has one serious limitation: When it comes time to move your iTunes library, it can often be a bit of a challenge to figure out exactly what pieces you need to move and how to go about doing this. Many iTunes users start out with a basic iTunes library and use the default settings to store all of their media content on their primary internal hard drive. However, as you add new content over time, particularly with the additional video content now supported by iTunes, you may soon find that your library threatens to take over your computer. Another common scenario many users find themselves in is what to do when they upgrade to a new computer. How iTunes Manages Media Content

Perseus : un module pour protéger les communications privées... Un groupe de spécialistes en sécurité de l’ESIEA (Ecole Supérieure d’Informatique Electronique Automatique) a présenté au Luxembourg un module pour Firefox baptisé Perseus. Celui-ci est destiné à lutter contre le piratage des données personnelles en cryptant les échanges au format http entre deux ordinateurs. Le système fonctionne en plusieurs étapes : les données sont d’abord chiffrées, le code généré étant ensuite brouillé par un bruit numérique. Intercepter puis décoder les données ainsi protégées nécessite une puissance de calcul très importante que les pirates ne pourront ou ne voudront pas mobiliser. Car Perseus pourrait rapidement voir sa vocation initiale détournée au profit du téléchargement illégal.

Jailbreak basics: Everything you need to know for iPhone and iPad | TiPb We see quite a few questions in our Jailbreak Forums about jailbreak basics. So, we've decided to compile a master list of some basic jailbreak magic right here in one place. Hopefully this will help a lot of you beginner jailbreakers learn the ropes (and maybe even help some of you decide whether the leap to the jailbreak world has its advantages for you). We've included common jailbreak lingo, popular jailbreak apps and tools, and videos highlighting some awesome jailbreak utilities! Common ways to Jailbreak There are usually several ways to Jailbreak depending exactly when a new version of iOS is released, when a new exploit is found, and when new Jailbreaks are released. If you're not sure, here's how to find out which iOS software and iPhone modem firmware you're running. iOS 5.0 & 5.0.1 (GSM/CDMA) Jailbreak (untethered) iOS 5 & 5.0.1 (GSM/CDMA) Jailbreak (tethered) iOS 5 & 5.0.1 (GSM) Unlock How to unlock iOS 5 & 5.0.1 via ultrasn0w iOS 4.3.3 (AT&T/GSM) Jailbreak (untethered) Jailbreak

Créer gratuitement et en quelques secondes un serveur proxy Ce midi, on va apprendre a s'installer un petit serveur proxy rapidement et sans avoir besoin de serveur dédié... Simplement en utilisant Google App Engine qui offre un espace de stockage gratuit. Ce proxy est basé sur le code Mirrorr et a été porté par Amit Argawal sur Google App Engine. Il permet entre autre la consultation de vidéos flash (Youtube and co). J'ai repris cette technique décrite initialement pour Windows et j'ai essayé de la rendre compréhensible à la fois pour Windows, Mac mais aussi Linux. Le première étape consiste à vous créer un compte sur Google Apps. Cliquez sur le bouton "Create an application" et nommez votre application. Une fois que c'est fait, rendez vous sur le site de Python.org et téléchargez puis installez Python (Pour Linux, Windows ou Mac) ou faites un sudo apt-get install python Rendez vous ensuite sur la page de téléchargement du SDK Google app engine pour Python et téléchargez la version qui correspond à votre OS. . Et voilà, le tour est joué ! [source]

Password crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 7 months ago). crackers wireless version 4.9.43 on Dec. 3, 2011 (1 year ago). sniffers traffic-monitors fuzzers web-scanners

Related: