Quantcast
Channel: Doug Vitale Tech Blog » Info Security and/or Ethical Hacking Tools
Browsing latest articles
Browse All 17 View Live

Image may be NSFW.
Clik here to view.

HackerStorm Open Source Vulnerability Database

The HackerStorm Open Source Vulnerability Database (OSVDB) tool is a web-based utility (runs in a web browser) that enables you to research vulnerabilities associated with various software companies,...

View Article



Image may be NSFW.
Clik here to view.

Spoofing MAC addresses in Linux and Windows

Recall that each network adapter (whether wired or wireless) has a hard-coded  (“burned in”) Media Access Control (MAC) address that uniquely identifies the adapter on the local network to which it is...

View Article

Image may be NSFW.
Clik here to view.

How to block malware with the hosts file

On the Microsoft Most Valuable Players (MVPs) website you can download a custom hosts file to prevent unwanted connections to thousands of websites that distribute malware in its many forms – adware,...

View Article

Image may be NSFW.
Clik here to view.

Send spoofed emails with telnet

You can send spoofed emails (i.e., emails with a fake source address) if you can establish a telnet session with an email server. (Before continuing, go here if you need to brush up on your telnet...

View Article

Image may be NSFW.
Clik here to view.

SoftPerfect Network Scanner

SoftPerfect Network Scanner is one of the most popular free programs in Download.com’s Network Tools category. It offers many features and options for detecting and probing network hosts. It is a...

View Article


Image may be NSFW.
Clik here to view.

Reset Windows passwords with Offline NT Password & Registry Editor

The Offline NT Password & Registry Editor is a small Linux boot disk that you can use to change or delete Windows passwords outside of the Windows OS environment for local accounts. This can be...

View Article

Image may be NSFW.
Clik here to view.

Retina Network Security Scanner

Unlike most of the software applications reviewed here, Retina Network Security Scanner by eEye Digital Security is not available as freeware. As it is a highly capable and fully-featured security...

View Article

Image may be NSFW.
Clik here to view.

Tenable Nessus

If Nmap is the most popular free network scanning tool, then Nessus by Tenable is undoubtedly the most widely used commercial security application. Nessus is designed to comprehensively scan network...

View Article


Image may be NSFW.
Clik here to view.

Tor anonymity: how it works and how to use it

The Onion Router (TOR) network is intended to help protect the privacy of Internet users and promote greater freedom of expression online. Tor is a system of volunteer servers that acts as a buffer...

View Article


Image may be NSFW.
Clik here to view.

Browser-based penetration testing with Firefox and Chrome

With the proper extensions installed, you can hack from the comfort of your Firefox or Chrome browser. Within Firefox, add-ons are divided into three categories: extensions, appearance themes, and...

View Article

Image may be NSFW.
Clik here to view.

Linux file permissions and chmod

When you view files and directories on Linux hosts, how can you tell which users have access? And how do you determine the extent of their access? Before approaching the sizable (but very important)...

View Article

Image may be NSFW.
Clik here to view.

Increase online privacy with RetroShare

In a previous article I described how to significantly increase your online privacy with the Tor service. RetroShare is another option for Internet users who are concerned with staying anonymous...

View Article

Image may be NSFW.
Clik here to view.

Using TrueCrypt on Linux and Windows

After numerous revelations this year of the National Security Agency’s (NSA) frightening capabilities of mass spying on phone calls and Internet traffic (see, for example, PRISM), there has been a...

View Article


Image may be NSFW.
Clik here to view.

OSSEC, the free and open source IDS

Intrusion detection software is meant to monitor network traffic or host activities for malicious actions, such as successful or unsuccessful intrusion attempts, hostile traffic (i.e., malicious scans...

View Article
Browsing latest articles
Browse All 17 View Live




Latest Images