Archive for November 2014
10 Free Hacking Tools
1. Nmap Security Scanner
Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts areRead more...
2. Tor:anonymity online
Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Read more...
3. Net
Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.Read more...
4. sol Editer
A flash hacking alternative to variable editing and cheat engine, you can change values saved by the game in a “.sol” file. You will find the .SOL files in x:\Documents and Settings\[account-name]\Application Data\Macromedia\Flash Player\#SharedObjects\ followed by the name of the website. If the game was running from your computer, the .SOL will be in the “localhost” folder. Replace ‘x’ with your main drive, the one with your OS, and the account-name with the currently logged in user.Download...
5. Cain & Abel
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any softwareRead more...
6. Wireshark
Network protocol analyzer for Windows and Unix that allows examination of data from a live network, or from a capture file on diskRead more...
7. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).Read more...
8. DollarDNS Whois
DollarDNS Whois Direct allows users to make advanced WHOIS queries against a domain, including raw queries Read more...
9. Firebug
Firebug integrates with Firefox to put a wealth of web development tools at your fingertips while you browse. You can edit, debug, and monitor CSS, HTML, JavaScript, and network activity live in any web page.Download...
10. Tamper Data
Use tamperdata to view and modify HTTP/HTTPS headers and post parameters... Download...
11. Add N Edit Cookies
Cookie Editor that allows you add and edit "session" and saved...Download..
Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts areRead more...
2. Tor:anonymity online
Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Read more...
Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.Read more...
4. sol Editer
A flash hacking alternative to variable editing and cheat engine, you can change values saved by the game in a “.sol” file. You will find the .SOL files in x:\Documents and Settings\[account-name]\Application Data\Macromedia\Flash Player\#SharedObjects\ followed by the name of the website. If the game was running from your computer, the .SOL will be in the “localhost” folder. Replace ‘x’ with your main drive, the one with your OS, and the account-name with the currently logged in user.Download...
5. Cain & Abel
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any softwareRead more...
6. Wireshark
Network protocol analyzer for Windows and Unix that allows examination of data from a live network, or from a capture file on diskRead more...
7. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).Read more...
8. DollarDNS Whois
DollarDNS Whois Direct allows users to make advanced WHOIS queries against a domain, including raw queries Read more...
9. Firebug
Firebug integrates with Firefox to put a wealth of web development tools at your fingertips while you browse. You can edit, debug, and monitor CSS, HTML, JavaScript, and network activity live in any web page.Download...
10. Tamper Data
Use tamperdata to view and modify HTTP/HTTPS headers and post parameters... Download...
11. Add N Edit Cookies
Cookie Editor that allows you add and edit "session" and saved...Download..
Top 9 Firewall Devices
There are some malicious people in this world that gain enjoyment or financial benefit from harming other people's computers or by stealing their personal information. One way to protect against this is to place a firewall between the computer and the connection to the Internet. A firewall is a great security feature for computer networks, as well as for individual computers. Having the right firewall in place keeps a computer safe from hackers, as well as prying eyes.
The other component to consider searching for is scalability. Not all firewall devices are capable of being able to become part of a larger network. If expansion might be needed in the future, then perform a search for a modular firewall device. These are the ones that are mounted on a server rack and they are easily networked together to create an even larger firewall to protect the network as the business expands.
1 | Dell SonicWall TZ 215 Firewall Device |
The SonicWall appliance is made by Dell Computers. It features what they call a UTM or "Unified Threat Management" firewall that aids in delivering effective protection against malware and intrusions, providing superior content or URL filtering. It performs comprehensive deep packet inspection that doesn't diminish network performance at all. It ensures that there is alwaysavailable bandwidth when needed. The company boasts that the TZ 215 is the only UTM firewall that is available on the market that provides a native SSL VPN remote access client for all iOS, Android, Windows, Mac OS, and Linux operating systems.
Specifications |
---|
* Interface: 7 GbE, 1 Console Interface, 2 USB
* Throughput: 110 Mbps
* VPN: PPPoE
|
2 | Fortinet FortiWifi 40C |
This is very ideal for small businesses and retail stores, offering many of the security functions that the larger firewall devices have, but is condensed into a smaller package at a lower price than some of the bigger devices cost. It is enterprise grade security at entry level pricing.
Specifications |
---|
* Interface: 2 x 10/100/1000 WAN port, 5 x 10/100/1000 switch port
* Throughput: 60 Mbps
* VPN: IPSec
|
3 | Juniper SSG 140 Firewall Device |
The SSG firewall device by Juniper is considered to be a fairly middle of the road appliance. It delivers phenomenal performance for small to medium sized businesses, offering security to stop both internal and external attacks on the network. The other standout aspect about this device is the number of I/O expansion slots for such a small device. It is built to be modular so it easily expands to provide all the security needed for a growing business with relative ease.
Specifications |
---|
* Interface: USB with 4 Physical Interface Module or PIM Expansion Slots
* Throughput: 350 Mbps
* VPN: IPSec
|
4 | WatchGuard XTM 25-W Firewall Device |
The WatchGuard XTM series 2 firewall appliances delivers a high level of performance driven security. Two features that stick out about the WatchGuard XTM are that it has both full HTTPS inspection and VoIP support to go along with its other security features. It has built in wireless security capabilities utilizing the latest dual-band 802.11n technology. It offers an affordable solution for small businesses.
Specifications |
---|
* Interface: 5 x 10/100/1000, 1 Serial, 1 USB
* Throughput: 240 Mbps
* VPN: IPSec
|
5 | Netgear ProSecure UTM10 Firewall Device |
This firewall device is another one that offers Unified Threat Management or UTM to provide comprehensive security coverage. It features a proprietary technology from Netgear called Stream Scanning Technology. It utilizes Netgear's own extensive database of antivirus and anti-malware code to thwart attacks faster. This allows for up to five times the scanning speed as data packets are transferred. It uses cloud technology to set up filters that speeds up performance even more.
Specifications |
---|
* Interface: 4 x 10/100/1000 and 1 USB
* Throughput: 133 Mbps
* VPN: IPSec
|
6 | Cisco ASA 5510 |
This particular Cisco firewall device features what they classify as an adaptive security appliance. It is one of the more powerful firewall devices from Cisco, featuring some of the best security and VPN services that Cisco has to offer. The firewall stops attacks immediately and keeps them from spreading to the rest of the network. It gives maximum flexibility and protection using a flexible VPN connectivity. It is one of the least costly to deploy within its class of firewall devices.
Specifications |
---|
* Interface: 4 x 10/100/1000 and 2 USB
* Throughput: 170 Mbps
* VPN: IPSec
|
7 | Barracuda Web Filter Firewall 210 Firewall Device |
This is one of the lower-end of the Web Filter Firewallsfrom Barracuda. There are seven different models in this lineup. The 210 features content filtering, application control, advanced policy creation, network threat protection, spyware removal, and a whole lot more. It offers a lot of customizable security solutions and is very affordable, making it perfect for any small to medium sized business. The best feature about the Web Filter Firewalls is that it is stackable, meaning that it is very easy to expand when needed.
Specifications |
---|
* Interface: 1 x 10/100 and 2 USB
* Throughput: 10 Mbps
* VPN: SSL VPN
|
8 | Juniper ISG 1000 |
This is ideal for enterprise and service provider networks. The Integrated Security Gateways or ISG offers more than just the firewall with VPN, IDS, and Web filtering features. It has an optional IPS and virtual systems support. The ISG 1000 is the smaller version of the ISG 2000, but certainly packs quite a punch. It is robust enough to handle 10,000 policies and 500,000 sessions. This is a very powerful appliance that takes care of most needs.
Specifications |
---|
* Interface:
* Throughput: 2 Gbps
* VPN: 1G 3DES/AES
|
9 | Cisco ASA 5555-X Firewall Device |
Most advanced firewall device that Cisco has made to date. It is more than just the firewall, featuring integrated and market-leading security services for the networks of small to medium sized businesses and even on the enterprise level as well. It is flexible and has modular scalability, meaning that the appliances can be stacked together in a network to provide security as the company grows. The deployment is very cost effective with the ASA series.
Specifications |
---|
* Interface: 6 x 10/100/1000, 6-port GE SFP SX, LH, LX
* Throughput: 4 Gbps
* VPN: 3DES/AES
|
Finding Firewall Devices
To find the right firewall device , start by determining the needed throughput and the desired VPN technology. Both of these specifications vary quite drastically from one model to another. The throughput is basically the amount of data that the firewall device can handle at one time. The larger the network traffic, the larger the throughput needs to be. The VPN is just the software and architecture that controls the security measures on the firewall device. AES stands for Advanced Encryption Security and is considered one of the most secure ways of protection.The other component to consider searching for is scalability. Not all firewall devices are capable of being able to become part of a larger network. If expansion might be needed in the future, then perform a search for a modular firewall device. These are the ones that are mounted on a server rack and they are easily networked together to create an even larger firewall to protect the network as the business expands.
Conclusion
A person can spend as much or as little as they want when it comes to firewall devices. The important consideration to remember is that buying the cheapest one is not always the best choice. Look for a firewall device that is solidly built to withstand the rigors of high-speed internet traffic. Flexibility, power, and speed are the key components to consider for a secure firewall.How to Upgrade to Windows Server 2008 from Windows Server 2003
How to Upgrade to Windows Server 2008 from Windows Server 2003
By Selva Sparking
If you haven’t upgraded from Server 2003 to Server 2008 — here’s the how-to you’ve been waiting for. Today I’m going to show you how to prepare for a server upgrade and how to perform it. I’ll also tell you why you need to upgrade your server to 2008; let’s start with that.
Why Upgrade to Windows Server 2008
One of the main reasons why you would want to upgrade all of your Servers on your network from Server 2003 to Server 2008 is the 2008 Functional Level. Well, that’s great but what does that really mean? Once you upgrade all your Servers and get the 2008 Functional Level you will get few nifty bonuses:
- The first bonus for upgrading to Server 2008 is Distributed File System Replication. What it means in English is that exchange of information between your Domain Controllers is a lot smoother.
- Second bonus is Advanced Encryption Standard support for the Kerberos protocol – logins are a lot more secure.
- The third bonus is Last Interactive Logon Information. This is a Group Policy Object that will display information about previous logons while you are trying to login yourself. So basically, you are going to be able to see who has logged on to the machine before you.
- And finally, the Fine-Grained Password Policies, where you can specify different password and account lockout policies for different sets of users. I believe this little bonus is quite big for most of the administrators.
The Server 2008 Upgrade Process
The upgrade process is not difficult at all and it doesn’t take a very long time. There are a couple of steps that you need to do before running the CD to update your server — here they are:
1. Before you start upgrading, make sure that your server’s hardware is up to specifications for Server 2008 (these are the recommendations, for minimum requirements):
- At least 512MB of RAM – preferably a lot more
- At least a 2GHz processor
- At least 40GB of Available Hard Disk space
- DVD-ROM Drive
- At least Super VGA (800×600) monitor
- Keyboard, mouse, NIC Card, etc.
2. If you are upgrading a 2003 Domain Controller, you will need to copy a couple of scripts from Server 2008 disc to your Server’s hard disk and then run adprep/FORESTPREP and adprep/DOMAINPREP.
3. Now we are ready to upgrade so we can put the CD in the CD/DVD-ROM and install as normal.
A note to those who may have Server 2000 and want to upgrade to Server 2008:
You cannot, I repeat, cannot upgrade from Server 2000 directly to Server 2008. You need to upgrade it first to Server 2003 and then go through these steps and upgrade to Server 2008. Also, make sure your Domain Functional Level is Windows Server 2003. This is really important as you won’t be able to run the upgrade if Domain Functional Level isn’t at Least Server 2003.
Warning: What You Need to Know Before Upgrading to Server 2008
There are a few things you should be aware of before starting the upgrade process:
- 2003 Servers should be patched to at least SP1
- Small Business Server 2003 and 2003 R2 upgrades are not supported
- You can’t upgrade to Server Core
- Exchange Server 2007 will not take an in-place upgrade. This is very important, because if you try it will break things. What you need to do is a Mailbox Migration to do this kind of upgrade with Exchange 2007
Preparing Your Server for Upgrade
1. Login to your Domain Controller on the server you are upgrading. First we are going to prepare the Domain Controller Database for upgrade.
2. Go ahead and insert the Server 2008 CD in your CD/DVD-ROM drive.
3. Open My Computer and right-click on CD/DVD-ROM. Then selectExplore.
4. Double-click on Sources.
5. Right-click on the adprep folder and select Copy.
6. Now go over to your server’s hard drive and paste the folder on your C:\ drive. In this example, we are going to paste it in the root of C.
7. Next, select Command Prompt on your start menu.
If you do not see Command Prompt, select Run, type in cmd and hit theEnter key.
8. When in Command Prompt, type in cd\ and hit Enter.
9. To verify that the adprep folder is on your hard drive, type in dir and hitEnter.
10. Next, type in cd adprep and hit Enter. This will put you in the adprep folder.
11. Once you are in that folder we are ready to run the two commands. The first command you should type is adprep /forestprep, then hit Enter.
12. Make sure you do not have any Windows Server 2000 machines on your network.
If you do not, type in C and hit Enter.
13. Once the process is done you are going to receive a quick confirmation as shown below.
14. Next we are going to type in the second command which is adprep /domainprep and hit Enter.
15. Domainprep will now run and once it is done you will receive a confirmation.
16. You can now close the Command Prompt.
Now we are finally ready for the upgrade.
Quick note for administrators with multiple Domain Controllers that need to upgrade to Server 2008:
The steps above need to be performed only once on your network. Once you run forestprep and domainprep on your network, all your Domain Controllers are now ready for the upgrade. All you need to do is wait for the Active Directory database to replicate to all your DCs and you are ready to go.
Upgrading from Server 2003 to Server 2008
1. Make sure your Server 2008 CD is in the CD/DVD-ROM drive. On your machine, go to Windows Explorer and select CD/DVD-ROM. In this example it is the D:\ drive.
2. Double-click on the setup.exe file from inside your Server 2003 machine.
3. When the Install Window opens click the Install Now button.
4. In this window you will have an option to check for the latest updates from Microsoft. If you choose so, please select the first option.
In this example we are going to skip them for now, so we will select the second option.
5. It’s now time to select the Server 2008 version that you want to install.
In this example we are installing the Enterprise (Full Installation) version. Once you make your selection, click Next.
6. Go ahead and check the box to accept the license terms agreement and when ready click next.
7. The upgrade option should now be available for you. When ready selectUpgrade Option to continue.
8. You will receive one last warning letting you know to make sure all your applications and 3rd party software can run on windows 2008 as well as of potential issues that you might have.
Make sure to read it and pay close attention to any issues that are listed on the bottom. Once you are ready, click Next.
9. Your Server is now being upgraded.
One last thing to keep in mind is that the upgrade process may take a lot longer than the installation as it has to upgrade the Active Directory and other services that are already on your Server.
Now, wasn’t this easy?