PDF documents require
Adobe Acrobat Reader,
available free at:

 

 

Security Files

KeePass

Password Keeper

Password Safe

Muddle file encryption

 

 

 

 

 

MD5 Command

MD5 GUI

Filesum

 

Brutus

Vigenere

NetCat for NT(*)

NetBus Pro (Shareware)(*)

nmapNT

nmap Win32

CIS Internet Scanner

DDos Ping

Vision Port/Process Mapper(*)

Attacker IP Listening

UDP Flood

TCP port blaster

 

IP Port ScannerV3(*)

IP Port ScannerV4(*)

IP/TCP/UDP Port Scanner

FScan

SNMP Scanner(*)

File Watch

PromiscDetect

Cain & Abel

PWDump3e

ToneLoc

Base64 Decoder

 

Risk Guide - PDF

W2K Disaster - DOC

SMTP Open-relay - PDF(*)

Securing DNS - PDF

 

Application Security - PDF

Application Security - PDF

 

Cisco PIX Examples PDF

Cisco PIX Syslog PDF

 

FireWall ARP Program

FireWall Information Program

FireWall Commands

FireWall Monitor Command

Web Server Attacks

 

Check Point to Cisco

 

 

 

 

 

 

 
 
home mail contact Us site map
 

Stores a list of accounts / passwords (AES / Twofish algorithm)

Stores a list of accounts / passwords (Blowfish algorithm)

Stores a list of accounts / passwords (Blowfish algorithm)

Muddle Blowfish File Encryption

 

Blowfish is a symmetric block cipher, 64-bit block, that takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms.

MD5 128-bit Hash - command line utility (RFC1321)

MD5 128-bit Hash - GUI Window

File Integrity Checker - 11 Hash / Checksum (command line)

 

Remote online password cracker tool using word lists

Vigenere Cipher - VB 3.0 (Polyalphabetic)

NetCat 1.11 for Win NT (TCP/UDP tool)

NetBus Pro 2.10 - Remote administration / spy tool

nmap Win32 GUI - TCP/UDP port scanner (req. Winpcap)

nmap Win32 - TCP/UDP port scanner (command line)

CIS - Cerberus Internet Scanner - Vulnerability Checking (NT)

Remote net scanner for Distributed Denial of service programs

Map TCP/UDP IP Ports to local applications processes

TCP/UDP IP Port Listening warning program

UDP Packet sender to specified IP and port number

TCP port blaster - command line tool

 

IP Port Scanner, Pinger and Hostname resolver

IP Port Scanner - TCP/UDP, Hostname resolver (WIN2K)

IP Port Scanner, Ping Sweeper, TCP, UDP

Port Scanner (TCP & UDP) - Command Line

Scans for open SNMP services within an IP range

Monitors a file for selection or changes in size

Displays a workstations active filters - Command Line

Password recovery tool - sniffing the network

Windows NT/2K remote password hash grabber

Tone locator - Dials numbers looking for tones

Base64 Decoder - Windows freeware

 

Risk Management Guide for IT Systems - NIST

Windows 2K Server - Disaster Recovery Guidelines

Telnet procedures to test SMTP Open-relay servers

Securing an Internet Name Server (NT / BIND) - PDF

 

Programming Security - Checklist

Programming Security - Guidelines

 

PIX/ASA 7.x w 3 internal network examples

PIX 7.x - Syslog examples

 

Check Point FireWall-1 ARP Tool (Windows 2000)

Check Point FireWall-1 CPinfo Tool (Collection utility)

Check Point FireWall-1 Commands

Check Point FireWall-1 Monitor (Trace) Command

Web application security attacks (Power Point) SPI

 

Cisco Security Conversion Tool (SCT) - Java runtime required

In Check Point Firewall, the NAT rules are unidirectional, which means the device needs to have two separate NAT rules for the forward and reverse flow for the NAT to happen. This is even true for static one-to-one NAT rules. In Cisco devices, NAT rules are bidirectional so Cisco SCT tool skips one of the Check Point unidirectional NAT rules.

Cisco enforces firewall rules on an interface-specific basis. However, Check Point enforces firewall rules globally, meaning without regard to the interfaces through which the data passes. This does not tend itself well to the Cisco architecture.

 

 

 

 

"It is an equal failing to TRUST everybody, and to TRUST nobody" - English Proverb

 

 

“Gentlemen do not read each other’s mail.”
Secretary of State Henry Stimson 1929-1933
(Closed  "Black Chamber" MI-8, 1929)
 

 


Base64 Encoder / Decoder


Base64 is a transfer encoding that uses the
characters A–Z, a–z, and 0–9 in that order for the first 62 digits. The symbols chosen for the last two digits vary considerably between different systems.
Commonly used with the
MIME, (Multipurpose Internet Mail Extensions) specification, as listed in RFC 2045. MIME does not specify a fixed length for base64-encoded lines, but it does specify a maximum length of 76 characters.

 

 
   

PCI DSS - Payment Card Industry (PCI) Data Security Standard (pdf)

 

 
Any material furnished by Nickerson Consulting Group, N-cg.net, is furnished on an "as is" basis. Nickerson Consulting Group makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Nickerson Consulting Group does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement.

 

© copyright 2009 created by www.ITCharts.com