Hot Downloads

×

Notice

The forum is in read only mode.
Welcome, Guest
Username: Password: Remember me

TOPIC: sites you need to visit

Re: sites you need to visit 10 years 3 months ago #29571

  • sose
  • sose's Avatar Topic Author
  • Offline
  • Honored Member
  • Honored Member
  • Posts: 814
  • Karma: 3
  • Thank you received: 4
when I am not watching my laptop screen then I could be reading some novels like the john grisham novel. sadly I have exusted all his novels , the chase series and the ludlum series.

I got most of these books in this site

booksdownload247.blogspot.com/

www.4shared.com/network/search.jsp?searc...rchName=john+grisham

Re: sites you need to visit 10 years 3 months ago #29603

  • sose
  • sose's Avatar Topic Author
  • Offline
  • Honored Member
  • Honored Member
  • Posts: 814
  • Karma: 3
  • Thank you received: 4
these are important sites worth visiting, I even pinpoint intersting articles and papers in the sites that are worth going through.

just make sure you have a pot of coffee by your side :D

A Stateful Inspection of CheckPoint Firewall 1

Kevin Mitnick vs. Tsutomu Shimomura www.takedown.com



www.apa.state.va.us/info_sys_security/sample_pol_proc.htm

domino.mms.de/tech.nsf/0/adfd89bf4f5669a...y_based_routing.pdf\



www.incidents.org/papers/OSfingerprinting.php

IP VPN Services

www.networkmagazine.com/shared/article/s...ml?articleID=8703357



What is a Virtual Private Network?

www.networkmagazine.com/shared/article/s...ml?articleID=8706528



VPN Vulnerabilities

www.networkmagazine.com/shared/article/s...ml?articleID=8703359






This is an interesting article about the Sapphire Worm (Slapper), that could go right through the VPN and cause a little havoc.



www.networkmagazine.com/shared/article/s...ml?articleID=8703534



www.computerworld.com.au/index.php?id=20...amp;fp=16&fpid=0



www.securityfocus.com/infocus/1694



www.firewall.cx/firewall_topologies.php



'Penetration Testing Methodology - For Fun And Profit' - Efrain Tores and LoNoise, you can Google for this paper and find it.



An Approach To Systematic Network Auditing - Mixter ( mixter.void.ru )

'Penetration Testing - The Third Party Hacker' - Jessica Lowery. ( www.sans.org/rr/papers/index.php?id=264 )

'




Penetration Testing - Technical Overview' - Timothy P. Layton

Sr. also from the www.sans.org ( www.sans.org ) reading room




www.ietf.org/rfc/rfc2132.txt?number=2131

www.ietf.org/rfc/rfc2132.txt?number=2132

homepages.wmich.edu/~mchugha/w2kfirewall.htm

entreelibre.com/cctt/index_en.html



Securing IIS webservers

www.securityfocus.com/infocus/1755



Securing PHP www.securityfocus.com/infocus/1706



packetstormsecurity.org/papers/protocols..._to_arp_spoofing.pdf



grc.com/dos/drdos.htm



www.visualware.com/whitepapers/tutorials/email.html



www.securityfocus.com/infocus/1759

news.zdnet.co.uk/internet/security/0,39020375,39160000,00.htm

www.uwsg.indiana.edu/hypermail/Linux/kernel/0406.0/0497.html



www.isecom.org/osstmm/



web.lemuria.org/security/WormPropagation.pdf



hxxp://www.infoshackers.com/index.php



And go to SniffingTraQ (first register)



Linux Newbie Administration Guide

www.ultrasoftware.net/viruslist/descr.asp?id=101

news.bbc.co.uk/1/hi/technology/4190607.stm

www.radarhack.com/dir/papers/hping2_v1.5.pdf



cert.uni-stuttgart.de/archive/bugtraq/2004/04/msg00351.html

www.giac.org/practical/GSEC/Vernon_Vail_GSEC.pdf



www.phenoelit.de



Hacking exposed - Windows 2003 book by Joel Scambray and Stuart McClure




www.isaserver.org/tutorials/How_to_creat...s_Ping_Requests.html



www.robertgraham.com/pubs/sniffing-faq.html

www.securiteam.com/tools/AntiSniff_-_fin...r_local_network.html



www.derkeiler.com/Newsgroups/microsoft.p...ty/2004-01/1621.html

www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.htm

www.fefe.de/switch/

www.nsacom.net:1952/txt/Website_Mirrors/...niff/tech-paper.html



www.robertgraham.com/pubs/sniffing-faq.html

www.zurich.ibm.com/~dac/Prog_RAID98/Full...ector.html/index.htm

www.safesquid.com



www.safesqid.com/mktg/safesquid.pdf



www.cisco.com/univercd/cc/td/doc/product...x/pdm/v_30/index.htm

www.cisco.com/en/US/products/sw/netmgtsw...user_guide_list.html

www.stunnel.org/

stunnel.mirt.net/

www.onsight.com/faq/stunnel/



www.watchguard.com/infocenter/editorial/135324.asp

en.wikipedia.org/wiki/Type_1_product

( myitforum.techtarget.com/articles/12/view.asp?id=7724 )



www.jms1.net/nt-unlock.html

www.tracking-hackers.com .
www.securityfocus.com/infocus/1674

www.hack.gr/Linux/gazette/issue63/sharma.html

www.cert.org/advisories/CA-1996-21.html

www.phrack.org/phrack/48/P48-14

bau2.uibk.ac.at/matic/spoofing.htm

www.iss.net/security_center/advice/...ing/default.htm

staff.washington.edu/dittrich/talks...ora/hijack.html

www.cs.cornell.edu/Courses/CS519/20...Ctcphijack.html

weadmin.com/satish/talk/non_blind_s...ion_hijack.html

www.phrack.org/phrack/33/P33-08

www.phrack.org/phrack/34/P34-08

www.cisco.com/univercd/cc/td/doc/ci.../ito_doc/ip.htm

www.cisco.com/warp/public/535/4.html

www.garykessler.net/library/tcpip.html

www.acm.org/crossroads/xrds1-1/tcpjmy.html

www.governmentsecurity.org/forum

Re: sites you need to visit 10 years 3 months ago #29605

  • sose
  • sose's Avatar Topic Author
  • Offline
  • Honored Member
  • Honored Member
  • Posts: 814
  • Karma: 3
  • Thank you received: 4
note some of these site may no longer be floating

some did not renew their domain registration

laws came up in some countries that disallow the floating of some fo these sites etc

check this out




These are educative sites for subscriptions



www.jupiterwebcasts.com/security



Send your name address telephone and destination address of organization to This email address is being protected from spambots. You need JavaScript enabled to view it.



This email address is being protected from spambots. You need JavaScript enabled to view it. USENET newsgroup "comp. risks



LISTSERV%LEHIIBM1.BITNET@MITVMA.MIT.EDU send this line :SUB VIRUS-L name



TK0JUT2%NIU.bitnet@mitvma.mit.edu mail replies to This email address is being protected from spambots. You need JavaScript enabled to view it..



This email address is being protected from spambots. You need JavaScript enabled to view it. comp.protocols.tcp-ip



This email address is being protected from spambots. You need JavaScript enabled to view it. comp.security.announce



This email address is being protected from spambots. You need JavaScript enabled to view it.



NIC.DDN.MIL, in SCC:DDN-SECURITY-yy-nn.TXT



CSRC.NCSL.NIST.GOV



This email address is being protected from spambots. You need JavaScript enabled to view it.

bugtraq



This email address is being protected from spambots. You need JavaScript enabled to view it. USENET newsgroup "ddn.mgt-bulletin



This email address is being protected from spambots. You need JavaScript enabled to view it..




quarterly magazine, "CIPHER".



quarterly magazine, "SIGSAC Review



quarterly magazine called "ISSA Access".



Bugtraq

Wayback machine

Gigaweb




www.security-portal.com

www.cert.org -

www.securityfocus.com/archive/1 -

www.insecure.org

seclists.org

www.eeye.com rm.

www.nessus .

www.zonelabs.com -

www.secinf.net

www.searchsecurity.com

www.antioffline.com - A very good library section on buffer

www.packetstormsecurity.nl - The largest selection of tools and exploits possible.

Re: sites you need to visit 10 years 3 months ago #29607

  • S0lo
  • S0lo's Avatar
  • Offline
  • Moderator
  • Moderator
  • Posts: 1577
  • Karma: 3
  • Thank you received: 7
I Couldn't resist posting this although it's OT

www.cartalk.com/Radio/WeeklyShow/online.html

Listen to the segments. These two brothers are supposed to help people fix their cars. And they do. Butttaaa......... :lol:
Studying CCNP...

Ammar Muqaddas
Forum Moderator
www.firewall.cx

Re: sites you need to visit 10 years 3 months ago #29622

  • sose
  • sose's Avatar Topic Author
  • Offline
  • Honored Member
  • Honored Member
  • Posts: 814
  • Karma: 3
  • Thank you received: 4
dont miss this opportunity

try this one
g.ho.st/?language=en

Re: sites you need to visit 10 years 3 months ago #29671

  • sose
  • sose's Avatar Topic Author
  • Offline
  • Honored Member
  • Honored Member
  • Posts: 814
  • Karma: 3
  • Thank you received: 4
All these tools are useful for administratively troubleshooting networks. But remember it is like a double edge sword, you can use them either way. People are currently serving jail terms simple because they try to break networks they weren’t authorized to. So if you plan to use these tools negatively, you better have a rethink. And as usual, your mile may vary: standard disclaimer.

The important part here is not to show how to attack something, but to show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.


Before we start, however, let me make one thing absolutely clear: I neither condone nor will we ever aid or defend those who attack networks or systems they do not own or that they have not been asked to attack. One of the greatest challenges the security community faces is lack of information on the enemy. Questions like who is the threat, why do they attack, how do they attack, what are their tools, and possibly when will they attack? It is questions like these the security community often cannot answer. For centuries military organizations have focused on information gathering to understand and protect against an enemy. To defend against a threat, you have to first know about it. However, in the information security world we have little such information.



This is about securing networks, not distributing tools to break them. Certain information systems security professionals, namely those who are charged with pen testing, have a legitimate use for these tools. In addition, to stop a criminal hacker requires the ability to think like a criminal. After all, the objective is to demonstrate what an attacker would do. Most of us have been taught from a very early age to be good law-abiding people and are simply not good at thinking up very plausible and innovative criminal schemes.

check these tools out: you can google them if you like






Ettercap - I've been personally using Ettercap for over a year and one of the most useful features I have found is it's flooding technique. Using the required plugins, you are able to bring a P4 with 512MB ram Linux server to its knees in around 40 seconds! Amongst the 20 plugins it comes with, here are the most popular:





Lamia- This plug-in allows you to become the root in a switched network that uses the STP protocol to avoid loops.





Spectre: Floods the LAN with random MAC addresses





Banshee: Described as "They kill without discretion... "



Golem: A dangerous D.O.S plugin and lastly its useful Hxx_xxx series plugins

They allow you to steal passwords and data from HTTP, POP, SMTP and a number of other types of streams.



www.nwfusion.com/bg/firewalls/firewallsr..._tablename=firewalls



www.snort.org (IDS)

tripwire(IDS)

CERT (system scanner)

black ice (IDS)

www.gfi.com/mailsecurity/wpexploitengine.htm

eeye.com (network scanner)

retina

core impact ($$) network scanner

www.securityfocus.com/data/vulnerabilities/exploits/kaht2.zip (vul scanner) www.astalavista.com/tools/auditing/netwo...ultiscanner/RPC2.zip scanner

winsock API

www.stealthnet.com

www.insecure.org/nmap

tcpdump

iris

ethereal

Ettercap ( ettercap.sourceforge.net

nesus

john the ripper

l0phtcrack

nickto

cisco scanner

sophie script

sid2user

SEQ-scan

legion

pwdump2

netcat

hping2

superscan

butrus,hydra

www.samspade.org/ssw/

securitypronews.com/securitypronews-24-2...oofingandBeyond.html

ettercap.sourceforge.net

Email tracker pro

nmap,

hping,

nc,

sing,

icmpenum,

Languard Network Scanner (GFI),

Retina (eEye).

hping3

www.tomsnetworking.com/Reviews-150-ProdID-LBU-1.php

kismet

www.foundstone.com/index.htm?subnav=reso...ources/freetools.htm AntiSniff

www.l0pht.com/antisniff/

CPM (Check Promiscuous Mode)

ftp://coast.cs.purdue.edu/pub/tools/unix/cpm/

Neped

www.apostols.org/projectz/neped/

Sentinel

www.packetfactory.net/Projects/sentinel/

ifstatus

m0n0.ch/wall/

www.ipcop.org/

www.isaserver.org

www.safesquid.com/forum

Nessus. www.insecure.org/tools.html

www.dnsstuff.com

www.e-messenger.net/

snort-inline.sourceforge.net/
freebsd.rogness.net/snort_inline/

( www.safer-networking.org/en/download/index.html )

www.anonymizer.com

tor.eff.org



www.controlkids.com/

cybersitter

proxomitron

Wi-Fi Defense - www.otosoftware.com/wireless.asp

sourceforge.net/projects/yahoopops/

www.jaybe.org/info.htm

CacheDump (http://http://www.cr0.net:8040/misc/cachedump.html).

www.cr0.net:8040/misc/cachedump.html

www.oxid.it/cain.html

www.openwall.com/john/

www.paessler.com

cybersitter

websnake

webwacker


Bugtraq

Wayback machine

Gigaweb




www.security-portal.com

www.cert.org -

www.securityfocus.com/archive/1 -

www.insecure.org

seclists.org

www.eeye.com.rm .

www.nessus.com

www.zonelabs.com -

www.secinf.net

www.searchsecurity.com

www.antioffline.com - A very good library section on buffer

www.packetstormsecurity.nl - The largest selection of tools and exploits possible.
Time to create page: 0.159 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup