background preloader

Top Network Security Tools

SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews.

http://sectools.org/

Related:  Tools and UtilitiesTools: Security - Forensics - Pentesting - Ethical Hackingsecurity and hackingSecurityHacking

The Unpatchable Malware That Infects USBs Is Now on the Loose It’s been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas, showing that it’s possible to corrupt any USB device with insidious, undetectable malware. Given the severity of that security problem—and the lack of any easy patch—Nohl has held back on releasing the code he used to pull off the attack. But at least two of Nohl’s fellow researchers aren’t waiting any longer. In a talk at the Derbycon hacker conference in Louisville, Kentucky last week, researchers Adam Caudill and Brandon Wilson showed that they’ve reverse engineered the same USB firmware as Nohl’s SR Labs, reproducing some of Nohl’s BadUSB tricks. And unlike Nohl, the hacker pair has also published the code for those attacks on Github, raising the stakes for USB makers to either fix the problem or leave hundreds of millions of users vulnerable. “The belief we have is that all of this should be public.

Most popular VMWare Virtual Appliances for IT Administrators Updated on September 23, 2009: Please review the updated list of virtual appliances. You may also be interested in reviewing virtual appliances for Security. The original post has been retained as a historical reference. The download links for most of the appliances in the following table no longer work since VMware has revamped the Appliance Marketplace. Open Source GPS Tracking System: Traccar Traccar is an open source GPS tracking system for various GPS tracking devices. This Maven Project is written in Java and works on most platforms with installed Java Runtime Environment. System supports more than 80 different communication protocols from popular vendors. It includes web interface to manage tracking devices online… Traccar is the best free and open source GPS tracking system software offers self hosting real time online vehicle fleet management and personal tracking… Traccar supports more than 80 GPS communication protocols and more than 600 models of GPS tracking devices. To start using Traccar Server follow instructions below:

Does the Universe Need God? I’ve had God on my mind lately, as I’ve been finishing an invited essay for the upcoming Blackwell Companion to Science and Christianity. The title is “Does the Universe Need God?“, and you can read the whole thing on my website by clicking. I commend the editors, Jim Stump and Alan Padgett, for soliciting a contribution that will go against the grain of most of the other essays.

GNU hackers discover HACIENDA government surveillance and give us a way to fight back — Free Software Foundation — working together for free software According to Heise newspaper, the intelligence agencies of the United States, Canada, United Kingdom, Australia, and New Zealand, have used HACIENDA to map every server in twenty-seven countries, employing a technique known as port scanning. The agencies have shared this map and use it to plan intrusions into the servers. Disturbingly, the HACIENDA system actually hijacks civilian computers to do some of its dirty work, allowing it to leach computing resources and cover its tracks. But this was not enough to stop the team of GNU hackers and their collaborators.

Ipredia OS for anonymous browsing and communications Ipredia OS is a Fedora based Linux operating system for anonymous web browsing, email, chat and file sharing, unlike similar projects like Tails and Liberte Linux based on tor, Ipredia anonymity takes root around the I2P anonymous network, with websites and services only accessible through an i2p proxy tunnel. The distribution can be downloaded with the Gnome or LXDE desktop, I tested the LXDE version because it is best for a live CD since it is lightweight and it should load quicker, there is the option to install Ipredia OS in your hard drive and some people might prefer the Gnome desktop for that. The operating system includes all of the basic applications an average computer user needs. Anonymous operating system Ipredia OS Anonymous live CD Ipredia OS

Black-Box CAN Network Analysis Framework: CANToolz Yet Another Car Hacking Tool CANToolz is a framework forCANbus network and device analysis. This tool consist of various different modules which can be piped together and used by security researchers and automotive/OEM security testers for black-box analysis of any CANbus system. You can use this software for ECU discovery, MITM testing, fuzzing, bruteforcing, scanning and etc This platform is a try to unify all tricks/tools and other things that you can do with CAN bus in one place. UFO Part 1 of 16 The FBI’s Reading Room contains many files of public interest and historical value. In compliance with the National Archives and Records Administration (NARA) requirements, some of these records are no longer in the physical possession of the FBI, eliminating the FBI’s capability to re-review and/or re-process this material. Please note, that the information found in these files may no longer reflect the current beliefs, positions, opinions, or policies currently held by the FBI. The image quality contained within this site is subject to the condition of the original documents and original scanning efforts.

Black Hat: Top 20 hack-attack tools Network World - Turn someone else’s phone into an audio/video bug. Check. Use Dropbox as a backdoor into corporate networks. Check. Suck information out of pacemakers.

Related: