Difference between revisions of "ITSecurity"
(→IT security tools) |
|||
Line 48: | Line 48: | ||
15. [http://tor.eff.org Tor - The Onion Router] | 15. [http://tor.eff.org Tor - The Onion Router] | ||
+ | |||
+ | ==Forensics== | ||
+ | 1. [http://www.forensicfocus.com Forensic Focus] | ||
+ | |||
+ | 2. [http://volatilesystems.blogspot.com/ Volatile Systems] | ||
+ | |||
+ | 3. [http://www.securiteam.com/ SecuriTeam] | ||
+ | |||
==IT security & networking sites== | ==IT security & networking sites== |
Revision as of 13:00, 5 December 2008
Contents
IT certifications
1. CISSP - Certified Information Services Security Professional
3. ITIL
IT Security info
1. ISC2 blog
3. Cyber Security Awareness Month 2008 - Summary and Links
IT security tools
1. Helix - a live Linux distribution oriented to Computer Forensics
2. BackTrack
3. Brutus
5. PHPIDS
7. Zenmap
9. WebScarab
10. Darik's Boot And Nuke - Hard drive disk wipe
11. Truecrypt
13. BotHunter
Forensics
3. SecuriTeam
IT security & networking sites
1. FOSDEM - Free and Open Source Software Developers' European Meeting
2. PacketStorm
3. OWASP
4. Sleuthkit
6. irongeek.com
7. Open Source Software Security
10. InfoSecWriters
11. NIST CSRC Special Publications (800 Series)
12. Emerging Threats
13. PacketLife
14. CiscoBlog
15. DefCon
16. Hakin9
17. Cheat sheets
18. Informative Information for the Uninformed
19. Vyatta - open source networking
20. Milw0rm
21. OSVDB
23. The ethical Hacker Network
Commands and scripts
1. Scripts
Other open source tools
1. Scilab
2. GRASS GIS
4. Software under Cecill license
GRID computing
2. GridCafé
Notes about nmap
list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup
nmap -sL a.b.c.d/24
nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24