Difference between revisions of "ITSecurity"

From MioWiki
Jump to: navigation, search
(IT security tools)
 
(21 intermediate revisions by the same user not shown)
Line 15: Line 15:
  
 
3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links]
 
3. [http://isc.sans.org/diary.html?storyid=5279&rss Cyber Security Awareness Month 2008 - Summary and Links]
 +
 +
4. [http://www.ready.gov www.ready.gov]
 +
 +
5. [http://www.zeltser.com/security-assessments/security-assessment-rfp-cheat-sheet.html Security RFP cheat sheet]
  
 
==IT security tools==
 
==IT security tools==
Line 41: Line 45:
 
11. [http://www.truecrypt.org/ Truecrypt]
 
11. [http://www.truecrypt.org/ Truecrypt]
  
12.[http://ucsniff.sourceforge.net UCSniff VoIP sniffer]
+
12. [http://ucsniff.sourceforge.net UCSniff VoIP sniffer]
 +
 
 +
13. [http://www.bothunter.net/ BotHunter]
 +
 
 +
14. [http://www.metasploit.com The Metasploit Framework]
 +
 
 +
15. [http://tor.eff.org Tor - The Onion Router]
 +
 
 +
16. [http://www.cybsec.com/EN/research/sapyto.php SAP Penetration Testing Framework]
 +
 
 +
17. [http://www.guerrilladns.com/ GuerrillaDNS]
 +
 
 +
18. [http://w3af.org/ W3AF]
 +
 
 +
19. [https://www.oneperiodic.com/products/handsoff/ HandsOff]
 +
 
 +
==Forensics==
 +
1. [http://www.forensicfocus.com Forensic Focus]
 +
 
 +
2. [http://volatilesystems.blogspot.com/ Volatile Systems]
 +
 
 +
3. [http://www.securiteam.com/ SecuriTeam]
 +
 
 +
4. [http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm U.S. DoJ]
 +
 
 +
5. [ftp://fedoragcc.dyndns.org/ G4L disk cloning tool]
  
 
==IT security & networking sites==
 
==IT security & networking sites==
Line 85: Line 114:
  
 
21. [http://osvdb.org/ OSVDB]
 
21. [http://osvdb.org/ OSVDB]
 +
 +
22. [http://www.offensive-security.com/ Offensive Security]
 +
 +
23. [http://www.ethicalhacker.net/ The ethical Hacker Network]
 +
 +
24. [http://vega.org.uk/ The Vega Science Trust]
 +
 +
25. [http://www1.cs.columbia.edu/~salman/skype/ Skype network & security]
 +
 +
26. [http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf TCP/IP Tutorial and Technical Overview, IBM Redbook]
 +
 +
27. [http://firstmonday.org FirstMonday]
 +
 +
28. [http://www.internethealthreport.com Internet Health Report]
  
 
== Commands and scripts ==
 
== Commands and scripts ==
Line 97: Line 140:
  
 
4. [http://www.cecill.info/logiciels.en.html Software under Cecill license]
 
4. [http://www.cecill.info/logiciels.en.html Software under Cecill license]
 +
 +
5. [http://www.rocksclusters.org/ Linux Rock Cluster]
 +
 +
6. [http://celtx.com Celtx - media pre-production software]
  
 
== GRID computing ==
 
== GRID computing ==
Line 106: Line 153:
  
 
list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup
 
list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup
 +
 
nmap -sL a.b.c.d/24
 
nmap -sL a.b.c.d/24
 +
 +
 +
 +
nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24

Latest revision as of 15:12, 2 November 2015


IT certifications

1. CISSP - Certified Information Services Security Professional

2. OSSTMM - OPSA

3. ITIL

IT Security info

1. ISC2 blog

2. The Hacker's RFC

3. Cyber Security Awareness Month 2008 - Summary and Links

4. www.ready.gov

5. Security RFP cheat sheet

IT security tools

0. IT Security tools

1. Helix - a live Linux distribution oriented to Computer Forensics

2. BackTrack

3. Brutus

4. HammerOfGod tools

5. PHPIDS

6. OpenVAS - a Nessus fork

7. Zenmap

8. OpenWRT + Snort

9. WebScarab

10. Darik's Boot And Nuke - Hard drive disk wipe

11. Truecrypt

12. UCSniff VoIP sniffer

13. BotHunter

14. The Metasploit Framework

15. Tor - The Onion Router

16. SAP Penetration Testing Framework

17. GuerrillaDNS

18. W3AF

19. HandsOff

Forensics

1. Forensic Focus

2. Volatile Systems

3. SecuriTeam

4. U.S. DoJ

5. G4L disk cloning tool

IT security & networking sites

1. FOSDEM - Free and Open Source Software Developers' European Meeting

2. PacketStorm

3. OWASP

4. Sleuthkit

5. The Hacker Webzine

6. irongeek.com

7. Open Source Software Security

8. Security Compass

9. Hacking videos

10. InfoSecWriters

11. NIST CSRC Special Publications (800 Series)

12. Emerging Threats

13. PacketLife

14. CiscoBlog

15. DefCon

16. Hakin9

17. Cheat sheets

18. Informative Information for the Uninformed

19. Vyatta - open source networking

20. Milw0rm

21. OSVDB

22. Offensive Security

23. The ethical Hacker Network

24. The Vega Science Trust

25. Skype network & security

26. TCP/IP Tutorial and Technical Overview, IBM Redbook

27. FirstMonday

28. Internet Health Report

Commands and scripts

1. Scripts

Other open source tools

1. Scilab

2. GRASS GIS

3. Software @inria.fr

4. Software under Cecill license

5. Linux Rock Cluster

6. Celtx - media pre-production software

GRID computing

1. OpenGridForum

2. GridCafé

Notes about nmap

list scan (-sL option): enumerate every IP address in the given target netblock(s) and do a reverse-DNS lookup

nmap -sL a.b.c.d/24


nmap -sS -p -PS<ports> -PA<ports> -PU<ports> -PE -A -T<level> -oA <file> a.b.c.d/24