Difference between revisions of "ITSecurity"
(→IT security sites) |
(→IT security tools) |
||
(62 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | + | {{728x90_as}} | |
− | ==IT | + | |
+ | ==IT certifications== | ||
1. [http://www.isc2.org CISSP - Certified Information Services Security Professional] | 1. [http://www.isc2.org CISSP - Certified Information Services Security Professional] | ||
2. [http://www.opsa.org OSSTMM - OPSA] | 2. [http://www.opsa.org OSSTMM - OPSA] | ||
+ | 3. [http://www.itil.org/en/ ITIL] | ||
+ | ==IT Security info== | ||
+ | 1. [http://blog.isc2.org ISC2 blog] | ||
+ | 2. [http://www.milw0rm.com/papers/237 The Hacker's RFC] | ||
+ | |||
+ | 3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links] | ||
+ | |||
+ | 4. [http://www.ready.gov www.ready.gov] | ||
+ | |||
+ | 5. [http://www.zeltser.com/security-assessments/security-assessment-rfp-cheat-sheet.html Security RFP cheat sheet] | ||
==IT security tools== | ==IT security tools== | ||
+ | 0. [http://sectools.org IT Security tools] | ||
+ | |||
1. [http://www.e-fense.com/helix/ Helix - a live Linux distribution oriented to Computer Forensics] | 1. [http://www.e-fense.com/helix/ Helix - a live Linux distribution oriented to Computer Forensics] | ||
Line 18: | Line 31: | ||
4. [http://www.hammerofgod.com/download.html HammerOfGod tools] | 4. [http://www.hammerofgod.com/download.html HammerOfGod tools] | ||
− | ==IT security sites== | + | 5. [http://php-ids.org/ PHPIDS] |
+ | |||
+ | 6. [http://www.openvas.org/ OpenVAS - a Nessus fork] | ||
+ | |||
+ | 7. [http://nmap.org/book/zenmap.html Zenmap] | ||
+ | |||
+ | 8. [http://www.linux.com/articles/53009 OpenWRT + Snort] | ||
+ | |||
+ | 9. [http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] | ||
+ | |||
+ | 10. [http://www.dban.org/ Darik's Boot And Nuke - Hard drive disk wipe] | ||
+ | |||
+ | 11. [http://www.truecrypt.org/ Truecrypt] | ||
+ | |||
+ | 12. [http://ucsniff.sourceforge.net UCSniff VoIP sniffer] | ||
+ | |||
+ | 13. [http://www.bothunter.net/ BotHunter] | ||
+ | |||
+ | 14. [http://www.metasploit.com The Metasploit Framework] | ||
+ | |||
+ | 15. [http://tor.eff.org Tor - The Onion Router] | ||
+ | |||
+ | 16. [http://www.cybsec.com/EN/research/sapyto.php SAP Penetration Testing Framework] | ||
+ | |||
+ | 17. [http://www.guerrilladns.com/ GuerrillaDNS] | ||
+ | |||
+ | 18. [http://w3af.org/ W3AF] | ||
+ | |||
+ | 19. [https://www.oneperiodic.com/products/handsoff/ HandsOff] | ||
+ | |||
+ | ==Forensics== | ||
+ | 1. [http://www.forensicfocus.com Forensic Focus] | ||
+ | |||
+ | 2. [http://volatilesystems.blogspot.com/ Volatile Systems] | ||
+ | |||
+ | 3. [http://www.securiteam.com/ SecuriTeam] | ||
+ | |||
+ | 4. [http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm U.S. DoJ] | ||
+ | |||
+ | 5. [ftp://fedoragcc.dyndns.org/ G4L disk cloning tool] | ||
+ | |||
+ | ==IT security & networking sites== | ||
1. [http://www.fosdem.org/ FOSDEM - Free and Open Source Software Developers' European Meeting] | 1. [http://www.fosdem.org/ FOSDEM - Free and Open Source Software Developers' European Meeting] | ||
Line 25: | Line 79: | ||
3. [http://owasp.org/ OWASP] | 3. [http://owasp.org/ OWASP] | ||
− | + | 4. [http://www.sleuthkit.org/ Sleuthkit] | |
+ | |||
+ | 5. [http://www.0x000000.com/ The Hacker Webzine] | ||
+ | |||
+ | 6. [http://irongeek.com/ irongeek.com] | ||
+ | |||
+ | 7. [http://oss-security.openwall.org Open Source Software Security] | ||
+ | |||
+ | 8. [http://www.securitycompass.com Security Compass] | ||
+ | |||
+ | 9. [http://www.irongeek.com/i.php?page=security/hackingillustrated Hacking videos] | ||
+ | |||
+ | 10. [http://www.infosecwriters.com/ InfoSecWriters] | ||
+ | |||
+ | 11. [http://csrc.nist.gov/publications/PubsSPs.html NIST CSRC Special Publications (800 Series)] | ||
+ | |||
+ | 12. [http://www.emergingthreats.net/ Emerging Threats] | ||
+ | |||
+ | 13. [http://packetlife.net/ PacketLife] | ||
+ | |||
+ | 14. [http://ciscoblog.com/ CiscoBlog] | ||
+ | |||
+ | 15. [http://www.defcon.org/ DefCon] | ||
+ | |||
+ | 16. [http://www.en.hakin9.org/ Hakin9] | ||
+ | |||
+ | 17. [http://www.cheat-sheets.org/ Cheat sheets] | ||
+ | |||
+ | 18. [http://uninformed.org Informative Information for the Uninformed] | ||
+ | |||
+ | 19. [http://www.vyatta.com/ Vyatta - open source networking] | ||
+ | |||
+ | 20. [http://www.milw0rm.com/ Milw0rm] | ||
+ | |||
+ | 21. [http://osvdb.org/ OSVDB] | ||
+ | |||
+ | 22. [http://www.offensive-security.com/ Offensive Security] | ||
+ | |||
+ | 23. [http://www.ethicalhacker.net/ The ethical Hacker Network] | ||
+ | |||
+ | 24. [http://vega.org.uk/ The Vega Science Trust] | ||
+ | |||
+ | 25. [http://www1.cs.columbia.edu/~salman/skype/ Skype network & security] | ||
+ | |||
+ | 26. [http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf TCP/IP Tutorial and Technical Overview, IBM Redbook] | ||
+ | |||
+ | 27. [http://firstmonday.org FirstMonday] | ||
+ | |||
+ | 28. [http://www.internethealthreport.com Internet Health Report] | ||
+ | |||
+ | == Commands and scripts == | ||
+ | 1. [[Scripts]] | ||
+ | |||
+ | == Other open source tools == | ||
+ | 1. [http://www.scilab.org/ Scilab] | ||
+ | |||
+ | 2. [http://grass.osgeo.org/ GRASS GIS] | ||
+ | |||
+ | 3. [http://www.inria.fr/valorisation/logiciels/index.en.html Software @inria.fr] | ||
+ | |||
+ | 4. [http://www.cecill.info/logiciels.en.html Software under Cecill license] | ||
+ | |||
+ | 5. [http://www.rocksclusters.org/ Linux Rock Cluster] | ||
+ | |||
+ | 6. [http://celtx.com Celtx - media pre-production software] | ||
+ | |||
+ | == GRID computing == | ||
+ | 1. [http://www.gridforum.org/ OpenGridForum] | ||
+ | |||
+ | 2. [http://gridcafe.web.cern.ch/gridcafe/ GridCafé] | ||
+ | |||
+ | == Notes about nmap == | ||
+ | |||
+ | list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup | ||
+ | |||
+ | nmap -sL a.b.c.d/24 | ||
+ | |||
+ | |||
+ | |||
+ | nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24 |
Latest revision as of 15:12, 2 November 2015
Contents
IT certifications
1. CISSP - Certified Information Services Security Professional
3. ITIL
IT Security info
1. ISC2 blog
3. Cyber Security Awareness Month 2008 - Summary and Links
IT security tools
1. Helix - a live Linux distribution oriented to Computer Forensics
2. BackTrack
3. Brutus
5. PHPIDS
7. Zenmap
9. WebScarab
10. Darik's Boot And Nuke - Hard drive disk wipe
11. Truecrypt
13. BotHunter
16. SAP Penetration Testing Framework
17. GuerrillaDNS
18. W3AF
19. HandsOff
Forensics
3. SecuriTeam
4. U.S. DoJ
IT security & networking sites
1. FOSDEM - Free and Open Source Software Developers' European Meeting
2. PacketStorm
3. OWASP
4. Sleuthkit
6. irongeek.com
7. Open Source Software Security
10. InfoSecWriters
11. NIST CSRC Special Publications (800 Series)
12. Emerging Threats
13. PacketLife
14. CiscoBlog
15. DefCon
16. Hakin9
17. Cheat sheets
18. Informative Information for the Uninformed
19. Vyatta - open source networking
20. Milw0rm
21. OSVDB
23. The ethical Hacker Network
26. TCP/IP Tutorial and Technical Overview, IBM Redbook
27. FirstMonday
Commands and scripts
1. Scripts
Other open source tools
1. Scilab
2. GRASS GIS
4. Software under Cecill license
6. Celtx - media pre-production software
GRID computing
2. GridCafé
Notes about nmap
list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup
nmap -sL a.b.c.d/24
nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24