Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Archive | General RSS feed for this section

Theef

  Theef is a backdoor Trojan.     External references https://www.djrohan.com/blog/2009/11/theef-backdoor-trojan/ https://github.com/digitaldisarray/theef

Comments { 0 }

netcat Syntax

      Examples nc -l -p 2222 | nc 10.1.0.43 1234 Netcat will listen on port 2222 and output anything received to a remote connection on 10.1.0.43 port 1234

Comments { 0 }

List of Disk Encryption Tools

VeraCrypt https://veracrypt.codeplex.com Symantec Drive Encryption https://www.symantec.com BitLockerDrive Encryption https://docs.microsoft.com Gillsoft Full Disk Encryption (http://www.gilisoft.in Endpoint Full Disk Encryption (https://www.checkpoint.com Dell Data Protection | Encryption (http://www.dell.com AxCrypt (https://www.axcrypt.net Folder Lock (http://www.newsoftwares.net Full Disk Encryption Software (https://www.winmagic.com SafeGuard Encryption (https://www.sophos.com Alertsec (https://www.alertsec.com DriveCrypt (http://www.securstar.com ShareCrypt (http://www.securstar.com PocketCrypt (http://www.securstar.com DriveCrypt Plus Pack (http://www.securstar.com Rohos Disk Encryption (http://www.rohos.com east-tec […]

Comments { 0 }

List of IoT Information Gathering Tools

List of IoT Information Gathering Tools Shodan https://www.shodan.io/ Shodan is a search engine that provides information about all the internet connected devices such as routers, traffic lights, CCTV cameras, servers, smart home devices, industrial devices, etc. Attackers can make use of this tool to gather information such as IP address, hostname, ISP, device’s location and […]

Comments { 0 }

List of IoT Vulnerability Scanner Tools

nmap RIoT Vulnerabilty Scanner sniffin Foren6 List of IoT Vulnerability Scanner Tools nmap RIoT Vulnerability Scanner sniffin Foren6 Foren6 uses sniffers to capture 6LoWPAN traffic and renders the network state in a graphical user interface. It detects routing problems. The Routing Protocol for 6LoWPAN Networks, RPL, is an emerging IETF standard. Foren6 captures all RPL-related […]

Comments { 0 }

List of Bluetooth Security Tools

Bluetooth Firewall http://www.fruitmobile.com FruitMobile Bluetooth Firewall protects your android device against all sorts of bluetooth attack from devices around you. It displays alerts when bluetooth activities occur. You can also scan your device and detect apps with bluetooth capabilities. Bluediving (http://bluediving.sourceforge.net Bluelog (http://www.digifail.com) Blooover II (https://trifinite.org) Btscanner (https://packages.debian.org) BlueRanger (http://cyborg.ztrela.com

Comments { 0 }

List of Wi-Fi Predictive Planning Tools

AirMagnet Planner Source: http://enterprise.netscout.com Cisco Prime Infrastructure (https://www.cisco.com AirTight Planner (http://www.moupiri.co.nz LANPlanner (http://www.prologixdistribution.com RingMaster Software (https://www.juniper.net Ekahau Site Survey (ESS) (https://www.ekahau.com Connect EZ Turnkey Wireless LAN Bundle (http://www.connect802.com TamoGraph Site Survey (http://www.tamos.com NetSpot (https://www.netspotapp.com Wi-Fi Designer (https://wfd.cloud.xirrus.com

Comments { 0 }

Wi-Fi Security Auditing Tools

Cisco Adaptive Wireless IPS Source: https://www.cisco.com Cisco Adaptive Wireless Intrusion Prevention System (IPS) offers advanced network security for dedicated monitoring and detection of wireless network anomalies, unauthorized access, and RF attacks. Fully integrated with the Cisco Unified Wireless Network, this solution delivers integrated visibility and control across the network, without the need for an overlay […]

Comments { 0 }

List of Web Server Malware Infection Monitoring Tools

List of Web Server Malware Infection Monitoring Tools: QualysGuard Malware Detection Service Source Sucuri (https://sucuri.net) Quttera (https://www.quttera.com) Web Inspector (https://www.webinspector.com) List of Web Server Malware Infection Monitoring Tools QualysGuard Malware Detection Service Source https://www.qualys.com Sucuri (https://sucuri.net) Quttera (https://www.quttera.com) Web Inspector (https://www.webinspector.com)

Comments { 0 }

Vulnerability Assessment Tools

List of vulnerability assessment tools: Qualys Vulnerability Managment (Qualys VM) Nessus Professional GFI LanGuard Qualys FreeScan Nikto Burp Suite OpenVAS Retina CS SAINT Microsoft Baseline Security Analizer (MBSA) Automated Vulnerability Detection System (AVDS) Core Impact Pro N-Stalker Web Application Security Scanner X Enterprise Edition Acunetix Web Vulnerability Scanner Nipper Studio Nexpose Secunia Personal Software Inspector […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional