background preloader

TCPDUMP/LIBPCAP public repository

TCPDUMP/LIBPCAP public repository

http://www.tcpdump.org/

Related:  Security ToolsNetworks tools ToolsFundamentals of Information SecuritySecurity

Autopsy Forensic Browser: Description Description Autopsy is a graphical interface to the command line digital investigation analysis tools in The Sleuth Kit. Together, they can analyze Windows and UNIX disks and file systems (NTFS, FAT, UFS1/2, Ext2/3). The Sleuth Kit and Autopsy are both Open Source and run on UNIX platforms (you can use Cygwin to run them both on Windows). As Autopsy is HTML-based, you can connect to the Autopsy server from any platform using an HTML browser.

MS-DOS help and commands Short for Microsoft Disk operating system, MS-DOS is a non-graphical command line operating system created for IBM compatible computers that was first introduced by Microsoft in August 1981 and was last updated in 1994 when MS-DOS 6.22 was released. Although the MS-DOS operating system is not often used today, the command shell commonly known as the Windows command line is still used and recommended. Continue reading >> Tip: If you are new to MS-DOS or the Windows command line we suggest reading how to use the Windows command line (DOS).

John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL.

Security: NTLM Multiprotocol replay attack - Smbrelay 3 - Iceweasel Introduction Most Windows networks still support insecure authentication schemes by default. This is for example what happends with NTLM who is enable by default until lastest Windows Vista. NTLM allows users to reply incomming connections against third part systems, and authenticate themselves without knowing the password. Therefore, connecting to a system with NTLM means that you can be owned.

Macintosh Security Site -> Mac OS X Firewalk - Firewall Configur Firewalk X - Mac OS XFirewall Configuration Utility Firewalk X 2 is out now - download @ bottom of page! What is Firewalk? Firewalk is a Mac OS X configuration utility for the built in firewall. How to search like a spy: Google's secret hacks revealed The National Security Agency just declassified a hefty 643-page research manual called Untangling the Web: A Guide to Internet Research (PDF) that, at least at first, doesn't appear all that interesting. That is, except for one section on page 73: "Google Hacking." "Say you're a cyberspy for the NSA and you want sensitive inside information on companies in South Africa," explains Kim Zetter at Wired.

Scanning the Internet with Nmap (Defcon 16) Tutorial Scanning The Internet With Nmap (Defcon 16) Description: How would you like to scan millions of hosts on the Internet and catalog all the interesting insights? This is exactly what Fyodor, the author of Nmap or Network Mapper did last summer. Thankfully, he then went on to share his finding with the community at Defcon 16 in his talk titled "Nmap: Scanning the Internet". Interestingly, as Fyodor notes in his talk that scanning such a large set of IP addresses did help him in uncovering many bugs in Nmap and also forced him to make enhancements and add new features to make the scanner really fast.

BleachBit - Iceweasel Skip to main content BleachBit Open source system cleaner Help <div style="padding: 2em; width: 200px; text-align: center"><p style="font-size:200%">Donate to BleachBit<br /></p><form action=" method="post"><fieldset style="display:none"><! HashDig 1 Welcome To The HashDig Project HashDig technology is a collection of utilities designed to help practitioners automate the process of resolving MD5 and SHA1 hashes. In the early stages of an investigation, it is not typically possible or practical to examine all subject files. Therefore, practitioners need reliable methods that can quickly reduce the number of files requiring examination. One such method is to group files into two general categories: known and unknown. This method can be implemented quite effectively by manipulating hashes and comparing them to one or more reference databases.

ftp () NOTE: click here if you get an empty page. FTP(1) BSD General Commands Manual FTP(1) ftp - Internet file transfer program Nessus Vulnerability Scanner Detect & Assess Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. Report & Take Action

Related:  C++ LibrarySniffer-WareNetwork