HackerStorm Open Source Vulnerability Database
The HackerStorm Open Source Vulnerability Database (OSVDB) tool is a web-based utility (runs in a web browser) that enables you to research vulnerabilities associated with various software companies,...
View ArticleSpoofing MAC addresses in Linux and Windows
Recall that each network adapter (whether wired or wireless) has a hard-coded (“burned in”) Media Access Control (MAC) address that uniquely identifies the adapter on the local network to which it is...
View ArticleHow to block malware with the hosts file
On the Microsoft Most Valuable Players (MVPs) website you can download a custom hosts file to prevent unwanted connections to thousands of websites that distribute malware in its many forms – adware,...
View ArticleSend spoofed emails with telnet
You can send spoofed emails (i.e., emails with a fake source address) if you can establish a telnet session with an email server. (Before continuing, go here if you need to brush up on your telnet...
View ArticleSoftPerfect Network Scanner
SoftPerfect Network Scanner is one of the most popular free programs in Download.com’s Network Tools category. It offers many features and options for detecting and probing network hosts. It is a...
View ArticleReset Windows passwords with Offline NT Password & Registry Editor
The Offline NT Password & Registry Editor is a small Linux boot disk that you can use to change or delete Windows passwords outside of the Windows OS environment for local accounts. This can be...
View ArticleRetina Network Security Scanner by BeyondTrust
Unlike most of the software applications reviewed here, Retina Network Security Scanner by BeyondTrust is not available as freeware. As it is a highly capable and fully-featured security vulnerability...
View ArticleTenable Nessus
If Nmap is the most popular free network scanning tool, then Nessus by Tenable is undoubtedly the most widely used commercial security application. Nessus is designed to comprehensively scan network...
View ArticleTor anonymity: how it works and how to use it
The Onion Router (TOR) network is intended to help protect the privacy of Internet users and promote greater freedom of expression online. Tor is a system of volunteer servers that acts as a buffer...
View ArticleBrowser-based penetration testing with Firefox and Chrome
With the proper extensions installed, you can hack from the comfort of your Firefox or Chrome browser. Within Firefox, add-ons are divided into three categories: extensions, appearance themes, and...
View ArticleLinux file permissions and chmod
When you view files and directories on Linux hosts, how can you tell which users have access? And how do you determine the extent of their access? Before approaching the sizable (but very important)...
View ArticleIncrease online privacy with RetroShare
In a previous article I described how to significantly increase your online privacy with the Tor service. RetroShare is another option for Internet users who are concerned with staying anonymous...
View ArticleUsing TrueCrypt on Linux and Windows
Update 2: TrueCrypt audit results released (PDF) Update: the TrueCrypt project unexpectedly shut down on 28 May 2014. A mirrored copy of TrueCrypt.org is available on Andryou.com. The home page of the...
View ArticleOSSEC, the free and open source IDS
Intrusion detection software is meant to monitor network traffic or host activities for malicious actions, such as successful or unsuccessful intrusion attempts, hostile traffic (i.e., malicious scans...
View Article