cissp
16.4K subscribers
955 photos
66 videos
1.73K files
4.8K links
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
Download Telegram
SoNebuntu is a Linux distribution based on Ubuntu with pre installed tools for Social Network Analyzers.
SNA Tools:
Gephi
Cytoscape
MuxViz
SNAP
SocNetV
NetLogo
Visione

Crawler Tools:
Apache Nutch
Heritrix
Norconex
Open Search Server
Open Web Spider
Web Sphinx
https://sonebuntu.com/
Forwarded from cissp (Alireza Ghahrood)
https://t.me/cissp

International channel for Transmission Knowledge In the field of Cyber Security with a Focus on the Content of the CISSP-ISC2 course

+also group:
@cisspgroup
SANS
Securing Web Application Technologies (SWAT) Checklist
Poster AppSec
Secure DevOps Toolchain

https://www.sans.org/security-resources/posters/secure-devops-toolchain-swat-checklist/60/download
John the Ripper: Pen Testing Product Overview and Analysis:

John the Ripper is a fine tool for checking on password vulnerability. It should be viewed as more of a supplemental tool than a primary one in the penetration arsenal. As it combines several approaches to password cracking into one, it is well worth trying out.

Type of tool: Password cracker

Key Features: Passwords are a weak link in enterprise security. As requirements get stiffer for the number and type of characters, bad habits multiply such as post-it notes on screens, Word docs with passwords listed, retaining default passwords and other workarounds. That's why cybercriminals go after passwords so often. Once a hacker steals credentials, they can enter sensitive systems or wait in ambush to stage a devastating attack against a prized asset.
Penetration testing, therefore, pays close attention to password cracking. John the Ripper is a free, easy to use, open source tool that takes the best aspects of various password crackers and unites them into one package. As such it can be harnessed by pen testers to detect weak passwords and find a way into a system or database.

John the Ripper works by using the dictionary method favored by attackers as the easiest way to guess a password. It takes text string samples from a word list using common dictionary words. It can also deal with encrypted passwords, and address online and offline attacks.

Differentiator: It is a free tool that is easy to use and it is aimed squarely at password cracking.

What it can't do: Vulnerability analysis and test for other areas of penetration beyond passwords.

Cost: Free