Category IT

Cisco Switch commands

You can use the following Cisco port security feature to defend against MAC attacks. Examples switchport port-security Enables port security on the interface. switchport port-security maximum 1 Configures the maximum number of secure MAC addresses for the port switchport port-security…

List of Sniffing Tools

List of sniffing tools for computer: WireShark SteelCentral Packet Analyzer Source Capsa Network Analyzer OmniPeek Observer Analyzer PRTG Network Monitor Colasoft Packet Builder RSA NetWitness Investigator tcpdump NetFlow Analyzer CommView NetResident ntopng SmartSniff Free Network Analyzer CSniffer EtherApe Network Probe…

List of Rootkits

This is a non-exhaustive list of rootkits available in the market: Horse Pill Grayfish Windows kernel rootkit Sirefef Necurs WingBird Rootkit Avatar Azazel ZeroAccess Alureon List of Rootkits Horse Pill Linux kernel rootkit. Grayfish Windows kernel rootkit Sirefef Necurs …

List of Password Recovery Tools

This post contains a list of password recovery tools, also known as password cracking tools. List of password recovery tools: Passware Kit Forensic ( WINDOWS PASSWORD RECOVERY TOOL ULTIMATE ( Stellar Phoenix Password Recovery ( Windows Password Recovery Tool (…

Vulnerability Assessment Tools for PC

List of vulnerability assessment tools: One of the most popular are Nikto, N-Stalker or Burp Suite. The Open Web Application Security Project (OWASP) maintains a comprehensive list of vulnerability assessment tools: List of vulnerability assessment tools Nessus Web-based. Commercial.…