Difference between revisions of "ITSecurity"

From MioWiki
Jump to: navigation, search
(IT security & networking sites)
(IT security tools)
 
(7 intermediate revisions by the same user not shown)
Line 15: Line 15:
  
 
3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links]
 
3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links]
 +
 +
4. [http://www.ready.gov www.ready.gov]
 +
 +
5. [http://www.zeltser.com/security-assessments/security-assessment-rfp-cheat-sheet.html Security RFP cheat sheet]
  
 
==IT security tools==
 
==IT security tools==
Line 50: Line 54:
  
 
16. [http://www.cybsec.com/EN/research/sapyto.php SAP Penetration Testing Framework]
 
16. [http://www.cybsec.com/EN/research/sapyto.php SAP Penetration Testing Framework]
 +
 +
17. [http://www.guerrilladns.com/ GuerrillaDNS]
 +
 +
18. [http://w3af.org/ W3AF]
 +
 +
19. [https://www.oneperiodic.com/products/handsoff/ HandsOff]
  
 
==Forensics==
 
==Forensics==
Line 59: Line 69:
  
 
4. [http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm U.S. DoJ]
 
4. [http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm U.S. DoJ]
 +
 +
5. [ftp://fedoragcc.dyndns.org/ G4L disk cloning tool]
  
 
==IT security & networking sites==
 
==IT security & networking sites==
Line 112: Line 124:
  
 
26. [http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf TCP/IP Tutorial and Technical Overview, IBM Redbook]
 
26. [http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf TCP/IP Tutorial and Technical Overview, IBM Redbook]
 +
 +
27. [http://firstmonday.org FirstMonday]
 +
 +
28. [http://www.internethealthreport.com Internet Health Report]
  
 
== Commands and scripts ==
 
== Commands and scripts ==

Latest revision as of 15:12, 2 November 2015


IT certifications

1. CISSP - Certified Information Services Security Professional

2. OSSTMM - OPSA

3. ITIL

IT Security info

1. ISC2 blog

2. The Hacker's RFC

3. Cyber Security Awareness Month 2008 - Summary and Links

4. www.ready.gov

5. Security RFP cheat sheet

IT security tools

0. IT Security tools

1. Helix - a live Linux distribution oriented to Computer Forensics

2. BackTrack

3. Brutus

4. HammerOfGod tools

5. PHPIDS

6. OpenVAS - a Nessus fork

7. Zenmap

8. OpenWRT + Snort

9. WebScarab

10. Darik's Boot And Nuke - Hard drive disk wipe

11. Truecrypt

12. UCSniff VoIP sniffer

13. BotHunter

14. The Metasploit Framework

15. Tor - The Onion Router

16. SAP Penetration Testing Framework

17. GuerrillaDNS

18. W3AF

19. HandsOff

Forensics

1. Forensic Focus

2. Volatile Systems

3. SecuriTeam

4. U.S. DoJ

5. G4L disk cloning tool

IT security & networking sites

1. FOSDEM - Free and Open Source Software Developers' European Meeting

2. PacketStorm

3. OWASP

4. Sleuthkit

5. The Hacker Webzine

6. irongeek.com

7. Open Source Software Security

8. Security Compass

9. Hacking videos

10. InfoSecWriters

11. NIST CSRC Special Publications (800 Series)

12. Emerging Threats

13. PacketLife

14. CiscoBlog

15. DefCon

16. Hakin9

17. Cheat sheets

18. Informative Information for the Uninformed

19. Vyatta - open source networking

20. Milw0rm

21. OSVDB

22. Offensive Security

23. The ethical Hacker Network

24. The Vega Science Trust

25. Skype network & security

26. TCP/IP Tutorial and Technical Overview, IBM Redbook

27. FirstMonday

28. Internet Health Report

Commands and scripts

1. Scripts

Other open source tools

1. Scilab

2. GRASS GIS

3. Software @inria.fr

4. Software under Cecill license

5. Linux Rock Cluster

6. Celtx - media pre-production software

GRID computing

1. OpenGridForum

2. GridCafé

Notes about nmap

list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup

nmap -sL a.b.c.d/24


nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24