Every device on a network has a unique address called its IP address, and this helps identify the device and enables other devices to communicate with it. For example, when you type a URL in your browser, such as www.espn.com, what essentially happens is that your device sends the URL to a Domain Naming Server […]
Find Device or IP Address Using MAC Address
How to Decrypt SSL With Wireshark?
Wireshark is a handy tool for analyzing your network traffic and gathering a ton of useful information from it, such as the performance of your network, the health of devices, and possibly even a cyber attack. So, how does this work? Data Packets Every time you open your browser and type a URL, what happens […]
Windows NTFS Permission Auditing & Reporting Tools and Software (Active Directory, Shares, Files/Folder, etc)
Here’s the Best Tools for Windows NTFS Permission Auditing and Reporting – [ Analyze Active Directory, Shares, Files/Folder and More with These DOWNLOADS! ]
Analysis of Wireshark Response Times using a Free TOOL – Tutorial!
Solarwinds’ Response Time Viewer for Wireshark is a standalone tool that analyzes the packets captured by Wireshark, so you can get in-depth information about your network in a dedicated viewer. This tool is a great one for troubleshooting network problems as you can analyze most common packet formats. Typically, you should use Wireshark for capturing […]
Access Rights Manager Review – How to Audit AD Permissions, File Shares & More!
/ — SecurityAuditing Active Directory, File Permissions, File Shares and More is Now Easier than Ever from a Centralized Location using Solarwinds Access Rights Manager, Here’s why!
Port Scanners for Scanning Windows/Linux Systems for Open Ports/Service
Port Scanners are an important tool when you want to investigate any remote or local network for security considerations. Used by programmers and network administrators, these port scanners are used to mainly know what ports are being used by what applications, so you can identify malicious programs right away. These port scanners can also be […]
Advanced Port Scanner – A Review of one of the Top Port Scanning Tools on the Market
/ — SecurityAdvanced Port Scanner is a Versatile Port Scanner that is 100% FREE – You can scan local networks and remote Networks (LAN & WAN) Fast & Free from Any computer!
Visualizing Network & Bandwidth Activity with GlassWire
GlassWire is a new type of graphical network monitor for Windows that focuses on endpoint monitoring. The software runs on Windows 7, 8, and 10, and there is also a version of the app for Android. Setting up GlassWire for Windows is fairly simple and only requires using a Windows installer that can be downloaded […]
Best Network Security Software & Frameworks for Pen-testing & Vulnerability Assessment
Finding Vulnerabilities and Exploits/Holes in your network infrastructure should be something you Do before a Hacker finds them – We’ve highlighted the Top Tools for Network Security Assessment, Vulnerability Scanning and much more!
WordPress Security and Available Plug-ins
WordPress is one of the most popular website platforms for bloggers and businesses as of 2017. It is easy to use and flexible as well as highly supported by developers and designers, but its security should also be considered. WordPress Security Issues It is a sad fact that a great many websites have been hacked […]
IPC$ Security Trick
It is possible to establish a security context with another domain by using the net use command. Syntax: net use \\<server name>\IPC$ /USER:<domain>\<account> Explanation: If you want to manage the Booky domain, with a PDC called Kooky, and you had an administrative account on Booky called bookadmin, you could use: net use \\kooky\IPC$ /USER:BOOKY\bookadmin you […]
Building a Chrooted sftp Environment
There was a time, not so very long ago, when we used to enjoy running an ftp server and locking our users into tiny little chrooted jails. While we still enjoy denying users their freedom, we now prefer to do so using a maximum security facility. The sftp file transfer program, which comes with OpenSSH […]
WinSCP Freeware SFTP and SCP client for Windows
WinSCP is a full featured GUI SCP client. This means that communication between the server and the client is encrypted well, unlike FTP or Explorer. WinSCP also includes synchronization options that will help minimize the amount of traffic needed to mirror filesystems. We installed all of the options: Here you can see the array of […]
TCPDump Lab
We picked up a DEC Alpha Multia cheap at auction a couple years ago. We will use this multia to dump the network traffic that NT creates on boot using TCPDump. The first problem we had was that our Multia is not Y2K compatible. Many of our files ended up with dates of 2019, and […]
Running Nmap on Windows
We wrote about Nmap in this article, but this assumed that you were running Nmap on GNU/Linux. There is another version available, now, for Windows. We used nmapwin_1.3.0_src.zip on a Windows 2000 workstation. It is important to scan your network, especially when there is a lot of virus activity. Hopefully before, but we know how […]
Running KeePass Password Management on GNU/Linux with Wine
Managing all of the passwords one needs to know for both personal and job-related security is quite a challenge. KeePass is a password management program for Windows. It is open-source and released under the GPL, which means it is highly likely that this project will stay around in some form. It also appears to use […]
NIMDA Scanner
Free NIMDA Scanner checks for known NIMDA worm files (admin.dll, load.exe, readme.exe, etc.), checks your system.ini, and remotely checks “Administrators” group for “Guest” account. Click here to download. [Beware of running free programs that scan for viruses… better look that gift horse in the mouth. 🙂 Ed.]
Scanning Tool To Determine Unpatched Windows Boxes
Microsoft has published a tool available here that will tell you what hosts need patching to protect against the 823980 buffer overrun in RPC flaw (Blaster).
Nmap Port Scanner
Nmap is a free port scanner you can use to audit your own network and ensure the security of your hosts from outside your firewall as well. It is also entirely likely that your external interfaces are being scanned at this very moment with Nmap, or tools like it. One cool thing about Nmap, is […]
New Worm that Doesn’t Need Attachment
There is a new bagle worm that uses an exploit in IE. It does not need to have the user open an attachment, they just need to read an email with HTML in it. !!! There is a test to see if you are vulnerable here: http://secunia.com/MS03-032 More detailed info here: href=http://secunia.com/advisories/9580/ Bagle Q info […]