Difference between revisions of "ITSecurity"
(→IT security & networking sites) |
(→IT security tools) |
||
(10 intermediate revisions by the same user not shown) | |||
Line 15: | Line 15: | ||
3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links] | 3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links] | ||
+ | |||
+ | 4. [http://www.ready.gov www.ready.gov] | ||
+ | |||
+ | 5. [http://www.zeltser.com/security-assessments/security-assessment-rfp-cheat-sheet.html Security RFP cheat sheet] | ||
==IT security tools== | ==IT security tools== | ||
Line 48: | Line 52: | ||
15. [http://tor.eff.org Tor - The Onion Router] | 15. [http://tor.eff.org Tor - The Onion Router] | ||
+ | |||
+ | 16. [http://www.cybsec.com/EN/research/sapyto.php SAP Penetration Testing Framework] | ||
+ | |||
+ | 17. [http://www.guerrilladns.com/ GuerrillaDNS] | ||
+ | |||
+ | 18. [http://w3af.org/ W3AF] | ||
+ | |||
+ | 19. [https://www.oneperiodic.com/products/handsoff/ HandsOff] | ||
==Forensics== | ==Forensics== | ||
Line 57: | Line 69: | ||
4. [http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm U.S. DoJ] | 4. [http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm U.S. DoJ] | ||
+ | |||
+ | 5. [ftp://fedoragcc.dyndns.org/ G4L disk cloning tool] | ||
==IT security & networking sites== | ==IT security & networking sites== | ||
Line 106: | Line 120: | ||
24. [http://vega.org.uk/ The Vega Science Trust] | 24. [http://vega.org.uk/ The Vega Science Trust] | ||
+ | |||
+ | 25. [http://www1.cs.columbia.edu/~salman/skype/ Skype network & security] | ||
+ | |||
+ | 26. [http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf TCP/IP Tutorial and Technical Overview, IBM Redbook] | ||
+ | |||
+ | 27. [http://firstmonday.org FirstMonday] | ||
+ | |||
+ | 28. [http://www.internethealthreport.com Internet Health Report] | ||
== Commands and scripts == | == Commands and scripts == |
Latest revision as of 15:12, 2 November 2015
Contents
IT certifications
1. CISSP - Certified Information Services Security Professional
3. ITIL
IT Security info
1. ISC2 blog
3. Cyber Security Awareness Month 2008 - Summary and Links
IT security tools
1. Helix - a live Linux distribution oriented to Computer Forensics
2. BackTrack
3. Brutus
5. PHPIDS
7. Zenmap
9. WebScarab
10. Darik's Boot And Nuke - Hard drive disk wipe
11. Truecrypt
13. BotHunter
16. SAP Penetration Testing Framework
17. GuerrillaDNS
18. W3AF
19. HandsOff
Forensics
3. SecuriTeam
4. U.S. DoJ
IT security & networking sites
1. FOSDEM - Free and Open Source Software Developers' European Meeting
2. PacketStorm
3. OWASP
4. Sleuthkit
6. irongeek.com
7. Open Source Software Security
10. InfoSecWriters
11. NIST CSRC Special Publications (800 Series)
12. Emerging Threats
13. PacketLife
14. CiscoBlog
15. DefCon
16. Hakin9
17. Cheat sheets
18. Informative Information for the Uninformed
19. Vyatta - open source networking
20. Milw0rm
21. OSVDB
23. The ethical Hacker Network
26. TCP/IP Tutorial and Technical Overview, IBM Redbook
27. FirstMonday
Commands and scripts
1. Scripts
Other open source tools
1. Scilab
2. GRASS GIS
4. Software under Cecill license
6. Celtx - media pre-production software
GRID computing
2. GridCafé
Notes about nmap
list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup
nmap -sL a.b.c.d/24
nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24