background preloader

Zenmap - Official cross-platform Nmap Security Scanner GUI

Zenmap - Official cross-platform Nmap Security Scanner GUI
Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. You can download Zenmap (often packaged with Nmap itself) from the Nmap download page. Here are some Zenmap action shots (click for full res):

http://nmap.org/zenmap/

Related:  Security & Analysis ToolsHacking & ExploitsSecurity and Analysis Tools

Nessus Vulnerability Scanner Detect & Assess Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. Report & Take Action Microsoft Best Practices for Mitigating RPC and DCOM Vulnerabilities This white paper is being made available to assist system administrators and technical personnel in preventing damage caused by an exploit for vulnerabilities in the RPC and DCOM sub-systems in Microsoft’s operating systems. Several such vulnerabilities have been announced in Microsoft security bulletins MS03-026 and MS03-039. The vulnerabilities affect most currently supported Microsoft operating systems. However, this paper is primarily geared to technical personnel supporting organizational networks.

Acunetix Web Vulnerability Scanner As many as 70% of websites have vulnerabilities that could lead to the theft of sensitive corporate data such as, credit card information and customer lists. Hackers concentrate their efforts on web-based applications – shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities using the compromised site.

HyperTerminal Alternatives for Windows 7 If you’ve recently upgraded to Windows 7 and are wondering what happened to HyperTerminal, you’re not alone! HyperTerminal was a sweet little program that let you connect to other computers, Telnet sites, host computers, BBSs, etc using your modem or Ethernet connection. In Windows 7 and Vista, you will no longer find the HyperTer minal program.

Free WiFi in Airports and Public Hotspots By Brian Wilson, CCNA, CCSE, CCAI, MCP, Network+, Security+, JNCIA Recently while traveling I noticed a hot spot and wanted to surf the internet. Once I connected to the AP I had seen that they wanted to charge me $8 per day to surf the internet. I thought that was just too much money for a quick internet connection, and my layover between flights was about 3 hours. I decided to see what I could access while connected to there AP. PuTTY Download Page Home | Licence | FAQ | Docs | Download | Keys | Links Mirrors | Updates | Feedback | Changes | Wishlist | Team PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham. The latest version is beta 0.67. LEGAL WARNING: Use of PuTTY, PSCP, PSFTP and Plink is illegal in countries where encryption is outlawed.

ssh(1): OpenSSH SSH client Name ssh - OpenSSH SSH client (remote login program) Synopsis ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [ -D[ bind_address:]port] [-e escape_char] [-F configfile][-i identity_file] [ -L [ bind_address:]port:host:hostport][-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [ -R [ bind_address:]port:host:hostport] [-S ctl_path] [-W host:port][ -w local_tun[:remote_tun]] [ user@]hostname [command] Description Top Five Hacker Tools Every CISO Should Understand As the role of the CISO continues to evolve within organizations towards that of an executive level position, we see a growing emphasis on traditional business administration skills over the more technical skills that previously defined the top security leadership job. Nonetheless, CISOs need to keep abreast of the latest down-in-the-weeds tools and technologies that can benefit their organization’s security posture, as well as those tools that are widely available which could be misused by malicious actors to identify and exploit network security weaknesses. In light of that fact, we recently spoke to Nabil Ouchn (@toolswatch), the organizer of the Arsenal Tools exhibit and activities at the BlackHat Conferences in both the US and Europe since 2011, as well as being the founder of the portal ToolsWatch.org. (Part Two Here: Five More Hacker Tools Every CISO Should Understand) Armitage

PsExec Introduction Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs on remote systems, but they can be a pain to set up and require that you install client software on the remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems. Note: some anti-virus scanners report that one or more of the tools are infected with a "remote admin" virus. None of the PsTools contain viruses, but they have been used by viruses, which is why they trigger virus notifications.

Related: