ICT Security Tools
14.9K views | +0 today
Follow
ICT Security Tools
A collection of best ICT Security Tools + tutorials how to use them...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Sicherheitsforscher-Werkzeug: Ein Kali Linux, das wie Windows aussieht | #CyberSecurity #Pentest #Forensics

Sicherheitsforscher-Werkzeug: Ein Kali Linux, das wie Windows aussieht | #CyberSecurity #Pentest #Forensics | ICT Security Tools | Scoop.it

Sicherheitsforscher aufgepasst: Die Linux-Distribution für digitale Forensik und Penetrationstests ist in der Version 2019.4 erschienen. In der aktuellen Ausgabe haben die Entwickler unter anderem einen neuen Default-Desktop, den Kernel 5.3.9 und den Undercover-Modus implementiert.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/ict-security-tools/?&tag=Penetration-Test

 

Gust MEES's insight:

Sicherheitsforscher aufgepasst: Die Linux-Distribution für digitale Forensik und Penetrationstests ist in der Version 2019.4 erschienen. In der aktuellen Ausgabe haben die Entwickler unter anderem einen neuen Default-Desktop, den Kernel 5.3.9 und den Undercover-Modus implementiert.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/ict-security-tools/?&tag=Penetration-Test

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Kali Linux - the most advanced and state of the art penetration testing distribution available.

Kali Linux - the most advanced and state of the art penetration testing distribution  available. | ICT Security Tools | Scoop.it

From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created. BackTrack has grown far beyond its humble roots as a live CD and has now become a full-fledged operating system. With all this buzz, you might be asking yourself

Gust MEES's insight:

 

From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created. BackTrack has grown far beyond its humble roots as a live CD and has now become a full-fledged operating system. With all this buzz, you might be asking yourself...


No comment yet.
Scooped by Gust MEES
Scoop.it!

OWASP Zed Attack Proxy Project - OWASP

OWASP Zed Attack Proxy Project - OWASP | ICT Security Tools | Scoop.it

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

 

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

 

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Scylla – Framework for Penetration Testing

Scylla – Framework for Penetration Testing | ICT Security Tools | Scoop.it
Scylla is another tool that you can use for penetration testing protocols used by different applications. Scylla works with three basic stages, the pre-hack
Gust MEES's insight:

 

Download it at Google Code:

 

https://code.google.com/p/scylla-v1/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

MagicTree: Data management for penetration testers

MagicTree: Data management for penetration testers | ICT Security Tools | Scoop.it

Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host or service? Or copy-pasting bits of output from a bunch of typescripts into a report?

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers pierce network with jerry-rigged mouse • The Register

Hackers pierce network with jerry-rigged mouse • The Register | ICT Security Tools | Scoop.it
When hackers from penetration testing firm Netragard were hired to pierce the firewall of a customer, they knew they had their work cut out. The client specifically ruled out the use of social networks, telephones, and other social-engineering vectors, and gaining unauthorized physical access to computers was also off limits.

Deprived of the low-hanging fruit attackers typically rely on to get a toe-hold onto their target, Netragard CTO Adriel Desautels borrowed a technique straight out of a plot from Mission Impossible: He modified a popular, off-the-shelf computer mouse to include a flash drive and a powerful microcontroller that ran custom attack code that compromised whatever computer connected to it.
No comment yet.