Shon Harris is offering FREE Certified Ethical Hacking (CEH) videos for online viewing. According to Harris, all the videos together are over 25 hours long.
The videos are listed below and can be viewed at www.logicalsecurity.com/resources/resources_videos.html.
So what’s the catch? Make sure you read this entire post before you leap!
Like this:
Like Loading...
Filed under Audit, Free, How to..., Security
Tagged as botnet, CEH, dos, firewall, free, hacking, honeypot, ids, pentest, rootkit, scanning, shon harris, sniffer, teach yoursef, tools, trojan, Unix, video, Windows
Top 100 Network Security Tools is the third article in a series on audit and security tools. The first article, How to Stay out of Jail, stresses that you need a GOOJ card before you use any security tools or techniques. The second article, What Needs to be on a GOOJ Card, outlines how to create a GOOJ card.
Key point: Never use security or cracker tools on networks or devices from your employer or that you do not own unless you have permission in writing.
In this article, I describe a few security tools that I believe every auditor or security analyst should be familiar with, or at the very least, be aware of.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Security, Top 10
Tagged as 20, abel, cain, cso, fierce domain scan, Fyodor, GOOJ card, Gordon Lyon, kismet, netstumbler, nmap, password, samurai, sectools.org, sniffer, stay out of jail, superscan, threadfix, Top 100 Network Security Tools, wireshark
If you probe networks, systems, and applications, you need a GOOJ card to protect yourself and your job.
In How to Stay Out of Jail, I recommended that anyone who scans, probes, or pokes networks, systems, or devices should always carry a get-out-of-jail (GOOJ) card. I also provided some reasons why such a card is critical.
Continue reading →
Like this:
Like Loading...
Filed under Audit, How to..., Security, Technology
Tagged as administrative access, application, audit committee, configuration, cracking, dumpster diving, encryption, exploits, forced entry, GOOJ, impersonation, investigations, logging, monitoring, network, probe, scanner, Security, sniffer, social engineering, system, tools, vulnerabilities, weaknesses