Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil’s main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures. Sguil facilitates the practice of Network Security Monitoring and event driven analysis. The Sguil client is written in tcl/tk and can be run …
Tag: wireless networks
Permanent link to this article: https://www.darknessgate.com/2015/03/06/sguil/
Snort 2.9.7.0
Open-Source IDS/IPS Download Snort
Permanent link to this article: https://www.darknessgate.com/2015/03/04/snort-2-9-7-0/
RainbowCrack
RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. It crack hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers. A brute force hash cracker generate all possible plaintexts and compute the corresponding hashes on the fly, then compare the hashes …
Permanent link to this article: https://www.darknessgate.com/2015/03/02/rainbowcrack-2/
Wfuzz
Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc. Some features: * Multiple Injection points capability with multiple dictionaries * Recursion (When doing …
Permanent link to this article: https://www.darknessgate.com/2015/02/26/wfuzz/
Medusa Parallel Network Login Auditor
Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …
Permanent link to this article: https://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/
Crowbar
Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …
Permanent link to this article: https://www.darknessgate.com/2015/02/23/crowbar/
Aircrack-ng
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng …
Permanent link to this article: https://www.darknessgate.com/2015/02/12/aircrack-ng-3/
Justniffer
Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, can emulate Apache web server log files, track response times and extract all “intercepted” files from the HTTP traffic. It lets you interactively trace tcp traffic from a live network or from a previously saved capture file. Justniffer’s …
Permanent link to this article: https://www.darknessgate.com/2014/11/07/justniffer/
Network and Computer Security
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …
Permanent link to this article: https://www.darknessgate.com/2014/10/17/network-computer-security/
Hot Topics in High-Performance Computing: Networking and Fault Tolerance
Topics: Hot Topics in High Performance Parallel Computing: Networks and Fault Tolerance. Large-scale computer systems such as Petascale or upcoming Exascale machines pose significant challenges on the system and software designers. In this course, we will address to very important topics in this design: HPC networking and Fault Tolerance. The network will soon be the …
Permanent link to this article: https://www.darknessgate.com/2014/09/27/hot-topics-high-performance-computing-networking-fault-tolerance/
Data Communications and Computer Networks
Goals and Learning Outcomes The goal of this module is to: provide a good understanding of the electrical characteristics of digital signals and the basic methods of data transmission. introduce the concept of communication protocols and give an overview of Data Communication Standards. give an introduction to the area of computer networks, with emphasis on …
Permanent link to this article: https://www.darknessgate.com/2014/09/26/data-communications-computer-networks/