Change cover
Change cover

CyberSecurity Tools Info

CyberSecurity Tools Information
1) IoTSeeker
Locate connected IoT devices and check for default passwords
2) Metasploitable Vulnerable Machine
Test Metasploit with this virtual machine based on Linux that contains several intentional vulnerabilities for you to exploit.
3) SQL Injection Cheat Sheet
Includes the attack strings and commands as well as default usernames and passwords for the five most common databases.
4) Injection Cheat Sheet
This simple one pager details all the syntax and commands necessary to hack an application with any of the injection attacks.
5) SQL Invader
Exploit or demonstrate SQL injection vulnerabilities within your web applications.
6) Nmap
map your network and ports with the number one port scanning tool. Nmap now features powerful NSE scripts that can detect vulnerabilities, misconfiguration and security related information around network services. After you have nmap installed be sure to look at the features of the included ncat - its netcat on steroids.
7) OpenVAS
open source vulnerability scanning suite that grew from a fork of the Nessus engine when it went commercial. Manage all aspects of a security vulnerability management system from web based dashboards. For a fast and easy external scan with OpenVAS try our online OpenVAS scanner.
host based intrusion detection system or HIDS, easy to setup and configure. OSSEC has far reaching benefits for both security and operations staff.
9)Security Onion
a network security monitoring distribution that can replace expensive commercial grey boxes with blinking lights. Security Onion is easy to setup and configure. With minimal effort you will start to detect security related events on your network. Detect everything from brute force scanning kids to those nasty APT's.
10) Metasploit Framework
test all aspects of your security with an offensive focus. Primarily a penetration testing tool, Metasploit has modules that not only include exploits but also scanning and auditing.
11) OpenSSH
secure all your traffic between two points by tunnelling insecure protocols through an SSH tunnel. Includes scp providing easy access to copy files securely. Can be used as poor mans VPN for Open Wireless Access points (airports, coffee shops). Tunnel back through your home computer and the traffic is then secured in transit. Access internal network services through SSH tunnels using only one point of access. From Windows, you will probably want to have putty as a client and winscp for copying files. Under Linux just use the command line ssh and scp.
12) Wireshark
view traffic in as much detail as you want. Use Wireshark to follow network streams and find problems. Tcpdump and Tshark are command line alternatives. Wireshark runs on Windows, Linux, FreeBSD or OSX based systems.
13) BackTrack
an Ubuntu based Linux distribution that is configured with hundreds of security testing tools and scripts. Backtrack is well known with penetration testers and hobbyists alike.
14) Nikto
a web server testing tool that has been kicking around for over 10 years. Nikto is great for firing at a web server to find known vulnerable scripts, configuration mistakes and related security problems. It won't find your XSS and SQL web application bugs, but it does find many things that other tools miss. To get started try the Nikto Tutorial or the online hosted version.
15) Truecrypt
encrypt all the things. Truecrypt is a strong encryption utility that can encrypt entire volumes or create an encrypted container within a file system. Use Truecrypt to protect your flash drives. If it gets lost, even the NSA will have trouble reading the data.
16) Get secure office hardware
Reduce your risk through security-centered device management and proactive practices and policies to engage each employee in the security process ad to creating a secure network, small businesses must select secure hardware and adopt secure protocols to really protect themselves.
17) Keep spies out of your email
Marketers, lawyers and sales people are widely using email tracking solutions to improve sales and better engage with prospects and current clients. Those solutions are popular in CRM systems as well. But cybercriminals are also using these tools to track the date and time emails are opened, where they are opened, where they are forwarded and so forth.
MailControl allows companies to block spymail from hitting their inbox. It is an especially effective tool in preventing targeted phishing attacks from reaching your business.
18) Stop ransomware
The most prevalent cyber security risk to small businesses today is ransomware that over 5,000 U.S. businesses are infected by ransomware every day. Ransomware takes control of the files on small business networks by encrypting them and holding them for ransom. The existing tools, like anti-virus, are not effective against the rapidly changing variants. WatchPoint has an easy to use tool, called CryptoStopper, which small businesses can download and install to protect their network. CryptoStopper deploys bait files throughout a network. When these bait files are encrypted, the infected user is isolated, and the ransomware is stopped before doing damage. This is a new and unique approach to stopping ransomware.
19) Train your employees
One of the most common, and preventable, attacks on small businesses is a social-engineering attack triggered by phishing attempts, improper web use or incoming phone calls. The most current training systems on the market are designed for large enterprises, but some companies set up our solution to help any size business, from those with just a few employees to those with thousands. Security Awareness Training -- Security Mentor: Employees aren’t always ready to combat a cyberattack or know when they are being baited into one. Security Mentor has created 10-minute lessons with its Security Awareness Training program. Small businesses will be able to train employees to be aware and alert, while making the right choices in a potential cyber crisis through these brief, online lessons.
20) Get SLL for your website
Traditionally, companies have used SSL/TLS certificates (displayed as “https”) only on shopping carts or login pages. This can help, as it encrypts the data being sent between the customer’s computer and the SMB’s web server. Also, if companies use an Extended Validation (EV) certificate, the web browser will display a green padlock and website-address bar, as well as the company’s name next to the website address. Companies are encouraged to follow what’s known as Always on SSL. This means that the entire website is protected by https, instead of just a couple of pages. This helps protect against modern attacks that seek to steal information when a site visitor browses between secure and not-secure pages.
21) FTK Imager
FTK is a court-accepted digital investigations platform that is built for speed, analytics and enterprise-class scalability. Known for its intuitive interface, email analysis, customizable data views and stability, FTK lays the framework for seamless expansion, so your computer forensics solution can grow with your organization’s needs.
22) Sans Investigagte Forensic Toolkit
The SIFT Workstation is a VMware appliance, pre-configured with the necessary tools to perform detailed digital forensic examination in a variety of settings. It is compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. The brand new version has been completely rebuilt on an Ubuntu base with many new capabilities and tools such as log2timeline that provides a timeline that can be of enormous value to investigator.
22) Metasploit
Simplifies network discovery and vulnerability verification, increasing the effectiveness of vulnerability scanners such as
23) OllyDbg
OllyDbg is a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable.
24) SiLK
the System for Internet-Level Knowledge, is a collection of traffic analysis tools developed by the CERT Network Situational Awareness Team (CERT NetSA) to facilitate security analysis of large networks. The SiLK tool suite supports the efficient collection, storage, and analysis of network flow data, enabling network security analysts to rapidly query large historical traffic data sets


0 (0 Grades)