Tag: Network Forensics

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

Total Network Monitor

Total Network Monitor is a free network monitoring software for the continuous monitoring of the local network, individual computers, and services that require careful attention and thorough control. TNM will alert you of any problem in advance and generate a detailed report on the circumstances of the failure. How it works Monitor is a special …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/02/03/total-network-monitor-2/

CAINE (Computer Aided INvestigative Environment)

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/01/24/caine-computer-aided-investigative-environment/

BackBox Linux

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/11/17/backbox-linux/

Justniffer

Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, can emulate Apache web server log files, track response times and extract all “intercepted” files from the HTTP traffic. It lets you interactively trace tcp traffic from a live network or from a previously saved capture file. Justniffer’s …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/11/07/justniffer/

nogotofail

Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on devices and applications in a flexible, scalable, powerful way. It includes testing for common SSL certificate verification issues, HTTPS and TLS/SSL library bugs, SSL and STARTTLS stripping issues, cleartext issues, …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/11/07/nogotofail/

SEANux

SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme. It is charged up with penetration testing tools and other useful applications for general purposes. http://seanux.sea.sy/#download

Permanent link to this article: https://www.darknessgate.com/2014/11/02/seanux/

Kernel Exchange EDB Viewer

Kernel Exchange EDB Viewer is an advanced and professional software for opening EDB files of MS Exchange Server. Some of the prominent features of the tool include: An EDB explorer tool available to download and use for absolutely free of cost. Assists in opening MS Exchange Server EDB files quickly and flawlessly. A stand-alone tool …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/10/18/kernel-exchange-edb-viewer/

Network and Computer Security

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/10/17/network-computer-security/

Basic Steps in Forensic Analysis of Unix Systems

This Web tutorial instructs learners on forensic analysis of machines running the Unix operating system. It covers steps used for analysis and includes graphics, illustrations and references. The tutorial also provides sample Unix scripts and protocols. In addition, the materials demonstrate how to run analysis using standard Unix tools, specifically The Coroner’s Toolkit (TCT), which …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/10/12/basic-steps-forensic-analysis-unix-systems/

Audio/Video Recordings about Wireless and Mobile Networking

CSE574:Wireless and Mobile Networks (2010) – Podcasts available: (2008, 2006 also available) Course Overview | Wireless Networking: Issues and Trends | Wireless Physical Layer Concepts: Part I, Part II, Part III | Wireless Local Area Networks: Part I, Part II | Wireless Personal Area Networks: Part I, Part II | Wireless Metropolitan Area Networks: Part …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/12/audiovideo-recordings-wireless-mobile-networking/