Difference between revisions of "ITSecurity"

From MioWiki
Jump to: navigation, search
(IT security tools)
 
(52 intermediate revisions by the same user not shown)
Line 2: Line 2:
  
  
=='''IT Security'''==
+
==IT certifications==
 
+
==IT Security certifications==
+
 
1. [http://www.isc2.org CISSP - Certified Information Services Security Professional]
 
1. [http://www.isc2.org CISSP - Certified Information Services Security Professional]
  
 
2. [http://www.opsa.org OSSTMM - OPSA]
 
2. [http://www.opsa.org OSSTMM - OPSA]
 +
 +
3. [http://www.itil.org/en/ ITIL]
 +
 +
==IT Security info==
 +
1. [http://blog.isc2.org ISC2 blog]
 +
 +
2. [http://www.milw0rm.com/papers/237 The Hacker's RFC]
 +
 +
3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links]
 +
 +
4. [http://www.ready.gov www.ready.gov]
 +
 +
5. [http://www.zeltser.com/security-assessments/security-assessment-rfp-cheat-sheet.html Security RFP cheat sheet]
  
 
==IT security tools==
 
==IT security tools==
 +
0. [http://sectools.org IT Security tools]
 +
 
1. [http://www.e-fense.com/helix/ Helix - a live Linux distribution oriented to Computer Forensics]
 
1. [http://www.e-fense.com/helix/ Helix - a live Linux distribution oriented to Computer Forensics]
  
Line 18: Line 31:
 
4. [http://www.hammerofgod.com/download.html HammerOfGod tools]
 
4. [http://www.hammerofgod.com/download.html HammerOfGod tools]
  
==IT security sites==
+
5. [http://php-ids.org/ PHPIDS]
 +
 
 +
6. [http://www.openvas.org/ OpenVAS - a Nessus fork]
 +
 
 +
7. [http://nmap.org/book/zenmap.html Zenmap]
 +
 
 +
8. [http://www.linux.com/articles/53009 OpenWRT + Snort]
 +
 
 +
9. [http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab]
 +
 
 +
10. [http://www.dban.org/ Darik's Boot And Nuke - Hard drive disk wipe]
 +
 
 +
11. [http://www.truecrypt.org/ Truecrypt]
 +
 
 +
12. [http://ucsniff.sourceforge.net UCSniff VoIP sniffer]
 +
 
 +
13. [http://www.bothunter.net/ BotHunter]
 +
 
 +
14. [http://www.metasploit.com The Metasploit Framework]
 +
 
 +
15. [http://tor.eff.org Tor - The Onion Router]
 +
 
 +
16. [http://www.cybsec.com/EN/research/sapyto.php SAP Penetration Testing Framework]
 +
 
 +
17. [http://www.guerrilladns.com/ GuerrillaDNS]
 +
 
 +
18. [http://w3af.org/ W3AF]
 +
 
 +
19. [https://www.oneperiodic.com/products/handsoff/ HandsOff]
 +
 
 +
==Forensics==
 +
1. [http://www.forensicfocus.com Forensic Focus]
 +
 
 +
2. [http://volatilesystems.blogspot.com/ Volatile Systems]
 +
 
 +
3. [http://www.securiteam.com/ SecuriTeam]
 +
 
 +
4. [http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm U.S. DoJ]
 +
 
 +
5. [ftp://fedoragcc.dyndns.org/ G4L disk cloning tool]
 +
 
 +
==IT security & networking sites==
 
1. [http://www.fosdem.org/ FOSDEM - Free and Open Source Software Developers' European Meeting]
 
1. [http://www.fosdem.org/ FOSDEM - Free and Open Source Software Developers' European Meeting]
  
Line 33: Line 87:
 
7. [http://oss-security.openwall.org Open Source Software Security]
 
7. [http://oss-security.openwall.org Open Source Software Security]
  
 +
8. [http://www.securitycompass.com Security Compass]
  
== Commands and scripts
+
9. [http://www.irongeek.com/i.php?page=security/hackingillustrated Hacking videos]
 +
 
 +
10. [http://www.infosecwriters.com/ InfoSecWriters]
 +
 
 +
11. [http://csrc.nist.gov/publications/PubsSPs.html NIST CSRC Special Publications (800 Series)]
 +
 
 +
12. [http://www.emergingthreats.net/ Emerging Threats]
 +
 
 +
13. [http://packetlife.net/ PacketLife]
 +
 
 +
14. [http://ciscoblog.com/ CiscoBlog]
 +
 
 +
15. [http://www.defcon.org/ DefCon]
 +
 
 +
16. [http://www.en.hakin9.org/ Hakin9]
 +
 
 +
17. [http://www.cheat-sheets.org/ Cheat sheets]
 +
 
 +
18. [http://uninformed.org Informative Information for the Uninformed]
 +
 
 +
19. [http://www.vyatta.com/ Vyatta - open source networking]
 +
 
 +
20. [http://www.milw0rm.com/ Milw0rm]
 +
 
 +
21. [http://osvdb.org/ OSVDB]
 +
 
 +
22. [http://www.offensive-security.com/ Offensive Security]
 +
 
 +
23. [http://www.ethicalhacker.net/ The ethical Hacker Network]
 +
 
 +
24. [http://vega.org.uk/ The Vega Science Trust]
 +
 
 +
25. [http://www1.cs.columbia.edu/~salman/skype/ Skype network & security]
 +
 
 +
26. [http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf TCP/IP Tutorial and Technical Overview, IBM Redbook]
 +
 
 +
27. [http://firstmonday.org FirstMonday]
 +
 
 +
28. [http://www.internethealthreport.com Internet Health Report]
 +
 
 +
== Commands and scripts ==
 
1. [[Scripts]]
 
1. [[Scripts]]
 +
 +
== Other open source tools ==
 +
1. [http://www.scilab.org/ Scilab]
 +
 +
2. [http://grass.osgeo.org/ GRASS GIS]
 +
 +
3. [http://www.inria.fr/valorisation/logiciels/index.en.html Software @inria.fr]
 +
 +
4. [http://www.cecill.info/logiciels.en.html Software under Cecill license]
 +
 +
5. [http://www.rocksclusters.org/ Linux Rock Cluster]
 +
 +
6. [http://celtx.com Celtx - media pre-production software]
 +
 +
== GRID computing ==
 +
1. [http://www.gridforum.org/ OpenGridForum]
 +
 +
2. [http://gridcafe.web.cern.ch/gridcafe/ GridCafé]
 +
 +
== Notes about nmap ==
 +
 +
list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup
 +
 +
nmap -sL a.b.c.d/24
 +
 +
 +
 +
nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24

Latest revision as of 15:12, 2 November 2015


IT certifications

1. CISSP - Certified Information Services Security Professional

2. OSSTMM - OPSA

3. ITIL

IT Security info

1. ISC2 blog

2. The Hacker's RFC

3. Cyber Security Awareness Month 2008 - Summary and Links

4. www.ready.gov

5. Security RFP cheat sheet

IT security tools

0. IT Security tools

1. Helix - a live Linux distribution oriented to Computer Forensics

2. BackTrack

3. Brutus

4. HammerOfGod tools

5. PHPIDS

6. OpenVAS - a Nessus fork

7. Zenmap

8. OpenWRT + Snort

9. WebScarab

10. Darik's Boot And Nuke - Hard drive disk wipe

11. Truecrypt

12. UCSniff VoIP sniffer

13. BotHunter

14. The Metasploit Framework

15. Tor - The Onion Router

16. SAP Penetration Testing Framework

17. GuerrillaDNS

18. W3AF

19. HandsOff

Forensics

1. Forensic Focus

2. Volatile Systems

3. SecuriTeam

4. U.S. DoJ

5. G4L disk cloning tool

IT security & networking sites

1. FOSDEM - Free and Open Source Software Developers' European Meeting

2. PacketStorm

3. OWASP

4. Sleuthkit

5. The Hacker Webzine

6. irongeek.com

7. Open Source Software Security

8. Security Compass

9. Hacking videos

10. InfoSecWriters

11. NIST CSRC Special Publications (800 Series)

12. Emerging Threats

13. PacketLife

14. CiscoBlog

15. DefCon

16. Hakin9

17. Cheat sheets

18. Informative Information for the Uninformed

19. Vyatta - open source networking

20. Milw0rm

21. OSVDB

22. Offensive Security

23. The ethical Hacker Network

24. The Vega Science Trust

25. Skype network & security

26. TCP/IP Tutorial and Technical Overview, IBM Redbook

27. FirstMonday

28. Internet Health Report

Commands and scripts

1. Scripts

Other open source tools

1. Scilab

2. GRASS GIS

3. Software @inria.fr

4. Software under Cecill license

5. Linux Rock Cluster

6. Celtx - media pre-production software

GRID computing

1. OpenGridForum

2. GridCafé

Notes about nmap

list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup

nmap -sL a.b.c.d/24


nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24