background preloader

Zenmap - Official cross-platform Nmap Security Scanner GUI

Zenmap - Official cross-platform Nmap Security Scanner GUI
Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. You can download Zenmap (often packaged with Nmap itself) from the Nmap download page. Here are some Zenmap action shots (click for full res):

p0f v3 Copyright (C) 2012 by Michal Zalewski <> Yeah, it's back! 1. What's this? P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Some of p0f's capabilities include: Highly scalable and extremely fast identification of the operating system and software on both endpoints of a vanilla TCP connection - especially in settings where NMap probes are blocked, too slow, unreliable, or would simply set off alarms. Common uses for p0f include reconnaissance during penetration tests; routine network monitoring; detection of unauthorized network interconnects in corporate environments; providing signals for abuse-prevention tools; and miscellanous forensics. You can read more about its design and operation in this document. Fun fact: The idea for p0f dates back to June 10, 2000. 2. 3. 4. 5.

Nessus Vulnerability Scanner With Advanced Support for Nessus Professional, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues. Advanced Support Plan Features Phone Support Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts. Chat Support Chat support available to names support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year. Tenable Community Support Portal All named support contacts can open support cases within the Tenable Community. SLAs P1-Critical: < 2 hr P2-High: < 4 hr P3-Medium: < 12 hr P4-Informational: < 24 hr Support Contacts Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software.

Wireshark · Go deep. Working Links To The Deep Web Hidden Wikis Index pages in Wiki-based format. The Hidden Wiki - The original Hidden Wiki (after Matt's), owned by ion. Created January 2009. Other indexes Other places/directories you may be able to find links. OnionBookmark - Keep bookmarks private or share with public. Search engines Google for Tor. Grizzly Search Engine - New search engine. Other general stuff to see Starting places. Tor WebDesign Guidelines - Suggestions to start making your own Hidden Service. Marketplace See also: The separate Drugs and Erotica sections for those specific services. Reviews of the marketplace experience does not belong to the list below. Be wary when using any of these services, especially Commercial. Financial Services Currencies, banks, money markets, clearing houses, exchangers. Banker and Co. - Professional money laundering and consultation service. Commercial Services DiamondsandGold - Sells stolen diamonds and gold. Scams / Likely Scams Hosting Services Filesharing TorShare - 2GB file upload limit.

Nmap - Free Security Scanner For Network Exploration & Security Audits. The 101 Most Useful Websites on the Internet Here are the most useful websites on the Internet that will make you smarter, increase productivity and help you learn new skills. These incredibly useful websites solve at least one problem really well. And they all have cool URLs that are easy to memorize thus saving you a trip to Google. Also see: The Best Android Apps Also see: The Best Mac Apps and Utilities – consult this site before choosing a seat for your next — an offline playground for building web projects in HTML, CSS and JavaScript. See: The Most Useful Tools for Programmers Also see: The Best Add-ons for Gmail, Docs and Sheets whereami — find the postal address of your current location on Google — create and share interactive reports, newsletters, presentations, and for storytelling. Also see: The Best Websites to Learn Coding

Penetration Testing Software | Metasploit 30 Specialist (and Super Smart) Search Engines Google is widely (and rightly) recognised as the mother of all search engines. But, if you need to drill down your searches by more specific details, do you trust Google to give you what you need every single time? Here’s a collection of 3o vertical search engines which you should have up your sleeve when you need some specialist power. Flights / Travel 1. – The leading flights search engine, providing information about all carriers to help you find the best deal. 2. 3. 4. 5. Images 7. 8. People 9. Forums 11. Music 12. Audio and Video 16. Resources 18. Domain names 20. Icons 22. Private search 25. Similar websites 26. All-rounders 27. While some of these are better alternatives to Google and the other major engines, for the most part, the big boys do it incredibly (incredibly, incredibly) well. olly via shutterstock

Microsoft Best Practices for Mitigating RPC and DCOM Vulnerabilities This white paper is being made available to assist system administrators and technical personnel in preventing damage caused by an exploit for vulnerabilities in the RPC and DCOM sub-systems in Microsoft’s operating systems. Several such vulnerabilities have been announced in Microsoft security bulletins MS03-026 and MS03-039. The vulnerabilities affect most currently supported Microsoft operating systems. However, this paper is primarily geared to technical personnel supporting organizational networks. On This Page Where Can I Get the Patch Contents Problem Description What Should Administrators Do Detecting Vulnerable Systems Mitigation How to Disinfect Infected Systems For Technical Assistance Where Can I Get the Patch Considering the importance of this issue, Microsoft highly encourages customers to install the necessary patches as soon as possible. Most customers have the 32-bit edition of the operating system. Contents Problem Description What Is a Buffer Overflow Patch your systems!