The first step in any penetration testing or ethical hacking exercise is to find out what hosts are alive on the network and what services they are running. One of the best tools for carrying out such enumeration is NMAP. Here I show you some of the basic uses of NMAP in a clear, easy to follow format.
Some neat utilities that can help in making your day brighter. Tools to permanently delete files, diagnostic tools, file recovery tools, and a whole lot more. Let us know about your best tool by leaving a comment.
I received an email from Qualys with some FREE security tools they offer. They are really worth a look.
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
If you want to dodge ad trackers, have sensitive sources to protect or you just want to conduct your normal online activities without being spied on, then The Amnesiac Incognito Live System (better known as Tails) could help.
Find within this post some of my favorite mailing list for different types of information.
See below a short list of Linux Distribution you can use for Security Testing, Penetration Testing, or other security purpose. As usual, if your preferred distribution is not on the list let me know.
See my list of TOP resources that I like to visit, learn from, view, browse, and enjoy on a daily basis.