Difference between revisions of "ITSecurity"
(→IT security tools) |
|||
(21 intermediate revisions by the same user not shown) | |||
Line 15: | Line 15: | ||
3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links] | 3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links] | ||
+ | |||
+ | 4. [http://www.ready.gov www.ready.gov] | ||
+ | |||
+ | 5. [http://www.zeltser.com/security-assessments/security-assessment-rfp-cheat-sheet.html Security RFP cheat sheet] | ||
==IT security tools== | ==IT security tools== | ||
Line 41: | Line 45: | ||
11. [http://www.truecrypt.org/ Truecrypt] | 11. [http://www.truecrypt.org/ Truecrypt] | ||
− | 12.[http://ucsniff.sourceforge.net UCSniff VoIP sniffer] | + | 12. [http://ucsniff.sourceforge.net UCSniff VoIP sniffer] |
+ | |||
+ | 13. [http://www.bothunter.net/ BotHunter] | ||
+ | |||
+ | 14. [http://www.metasploit.com The Metasploit Framework] | ||
+ | |||
+ | 15. [http://tor.eff.org Tor - The Onion Router] | ||
+ | |||
+ | 16. [http://www.cybsec.com/EN/research/sapyto.php SAP Penetration Testing Framework] | ||
+ | |||
+ | 17. [http://www.guerrilladns.com/ GuerrillaDNS] | ||
+ | |||
+ | 18. [http://w3af.org/ W3AF] | ||
+ | |||
+ | 19. [https://www.oneperiodic.com/products/handsoff/ HandsOff] | ||
+ | |||
+ | ==Forensics== | ||
+ | 1. [http://www.forensicfocus.com Forensic Focus] | ||
+ | |||
+ | 2. [http://volatilesystems.blogspot.com/ Volatile Systems] | ||
+ | |||
+ | 3. [http://www.securiteam.com/ SecuriTeam] | ||
+ | |||
+ | 4. [http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm U.S. DoJ] | ||
+ | |||
+ | 5. [ftp://fedoragcc.dyndns.org/ G4L disk cloning tool] | ||
==IT security & networking sites== | ==IT security & networking sites== | ||
Line 85: | Line 114: | ||
21. [http://osvdb.org/ OSVDB] | 21. [http://osvdb.org/ OSVDB] | ||
+ | |||
+ | 22. [http://www.offensive-security.com/ Offensive Security] | ||
+ | |||
+ | 23. [http://www.ethicalhacker.net/ The ethical Hacker Network] | ||
+ | |||
+ | 24. [http://vega.org.uk/ The Vega Science Trust] | ||
+ | |||
+ | 25. [http://www1.cs.columbia.edu/~salman/skype/ Skype network & security] | ||
+ | |||
+ | 26. [http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf TCP/IP Tutorial and Technical Overview, IBM Redbook] | ||
+ | |||
+ | 27. [http://firstmonday.org FirstMonday] | ||
+ | |||
+ | 28. [http://www.internethealthreport.com Internet Health Report] | ||
== Commands and scripts == | == Commands and scripts == | ||
Line 97: | Line 140: | ||
4. [http://www.cecill.info/logiciels.en.html Software under Cecill license] | 4. [http://www.cecill.info/logiciels.en.html Software under Cecill license] | ||
+ | |||
+ | 5. [http://www.rocksclusters.org/ Linux Rock Cluster] | ||
+ | |||
+ | 6. [http://celtx.com Celtx - media pre-production software] | ||
== GRID computing == | == GRID computing == | ||
Line 106: | Line 153: | ||
list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup | list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup | ||
+ | |||
nmap -sL a.b.c.d/24 | nmap -sL a.b.c.d/24 | ||
+ | |||
+ | |||
+ | |||
+ | nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24 |
Latest revision as of 15:12, 2 November 2015
Contents
IT certifications
1. CISSP - Certified Information Services Security Professional
3. ITIL
IT Security info
1. ISC2 blog
3. Cyber Security Awareness Month 2008 - Summary and Links
IT security tools
1. Helix - a live Linux distribution oriented to Computer Forensics
2. BackTrack
3. Brutus
5. PHPIDS
7. Zenmap
9. WebScarab
10. Darik's Boot And Nuke - Hard drive disk wipe
11. Truecrypt
13. BotHunter
16. SAP Penetration Testing Framework
17. GuerrillaDNS
18. W3AF
19. HandsOff
Forensics
3. SecuriTeam
4. U.S. DoJ
IT security & networking sites
1. FOSDEM - Free and Open Source Software Developers' European Meeting
2. PacketStorm
3. OWASP
4. Sleuthkit
6. irongeek.com
7. Open Source Software Security
10. InfoSecWriters
11. NIST CSRC Special Publications (800 Series)
12. Emerging Threats
13. PacketLife
14. CiscoBlog
15. DefCon
16. Hakin9
17. Cheat sheets
18. Informative Information for the Uninformed
19. Vyatta - open source networking
20. Milw0rm
21. OSVDB
23. The ethical Hacker Network
26. TCP/IP Tutorial and Technical Overview, IBM Redbook
27. FirstMonday
Commands and scripts
1. Scripts
Other open source tools
1. Scilab
2. GRASS GIS
4. Software under Cecill license
6. Celtx - media pre-production software
GRID computing
2. GridCafé
Notes about nmap
list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup
nmap -sL a.b.c.d/24
nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24