Friday, October 28, 2011

Open Authendication Server - ClearBox

ClearBox Enterprise RADIUS TACACS+ Server:
                                                                           is a Windows application for the centralized control and management of remote access to the network through the use of RADIUS, standard protocol widely deployed by various network equipment for central user access and security administration.

                                                                         ClearBox Enterprise Server is capable to provide authentication and accounting services to medium and large wholesale providers, organizations and network operators with thousands and even millions of users.

ClearBox Enterprise Server deployment areas include (but are not limited to) the following:
  • Wi-Fi networks with RADIUS-enabled access points (in WPA-Enterprise mode) for wireless clients authentication;
  • Prepaid and postpaid voice-over-IP (VoIP) applications with RADIUS-enabled h323 and SIP gateways, gatekeepers, IP-PBX's such as Cisco, Quintum, Mera, Brekeke, OpenH323, OpenSER, Asterisk and many others;
  • Wholesale providers with wide access networks who forward RADIUS authentication and accounting data to end-point providers;
  • Internet service providers (ISP) who provide an access to dial-up/ADSL/PPPoE users;
  • Networks with RADIUS-enabled firewalls (Cisco PIX, Microsoft Internet Security and Acceleration Server (ISA), etc), VPN hardware/software servers, routers (Cisco, Mikrotik, etc). 
Download Link: Click Here

Thursday, October 27, 2011

Open Source SSL Implementaton Tools

              is the world's first open-source, browser-based SSL VPN solution. This unique remote access solution provides users and businesses alike with a means of securely accessing network resources from outside the network perimeter using only a standard web browser.

            It also provides users with WebDAV file access, intranet Web site proxying, Active Directory authentication, and Java application deployment using a standard Web browser.

            In contrast to a conventional IPsec-based solution, no client side code needs to be installed on your end user’s systems. SSL VPNs rely on Java &#153 based technology and hence require only a standard web browser to operate. Standard network protocols can be tunnelled through the SSL connection, meaning that email and intranet web/file resources are easily and securely accessible from outside the corporate network.

Download Link :  Click Here

OpenSSL :
         OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.

            Openssl command-line binary that ships with the OpenSSL libraries can perform a wide range of cryptographic operations. It can come in handy in scripts or for accomplishing one-time command-line tasks.

             Documentation for using the openssl application is somewhat scattered, however, so this article aims to provide some practical examples of its use. I assume that you’ve already got a functional OpenSSL installation and that the openssl binary is in your shell’s PATH.

Download Link for Unix/Linux : Click Here

Download Link for Windows   : Click Here

Tuesday, October 11, 2011

Web Security Testing Tools

Google Skipfish web scanner for Windows:

        The compiling was a breeze after i spent 4 hours toiling with the clean reinstall of cygwin. Nevertheless, i created an archive with all the cygwin libraries included.

Tested to run properly on Win7 and WinXP Pro

Download Link : Click Here

w3af :
        is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.

Download Link : Click Here

Simple Log File Analyzer (Python script)

                         Analyzes webserver log files and detects possible hack attempts. Version 1.0

Download Link : Click Here

Simple LAN Scanner (Python script)

                         Scans your local network and tries to give you the MAC and IP address of a running system.

Download Link : Click Here

Physical Security - Datacenter BluePrint

Physical Security ( Information Security  ) 

                            A significant amount of security incidents are found to be performed utilizing some vulnerability of the physical security.

So, here is a set of rules to create a blueprint of physical security of a IT department and data center for a company.
  1. The system room must not have windows. Ideally, it should be in the center of the building.

  2. All equipment that is not used must be stored in dedicated storage space, away from production environment

  3. All high security spaces should be monitored by CCTV cameras.
  4. Access control zones must be implemented, to create a security barrier as well as provide a log of access activities. These are created by doors opened by electronic key cards or multiple-factor authentication.
  5. All windows should be fully tempered, and equipped with a glass break sensor connected to a central alarm system
  6. All spaces that don't have 24/7 access should have motion sensors connected to the central alarm system.
  7. The design of the environment should enable technical service personnel to operate with minimal risk of unauthenticated access to data
  8. All alarm events and CCTV control should be under maximum security but should NOT be accessible by IT personnel
  9. Paper, optical and magnetic data carriers should be handled in a controlled environment, and properly destroyed prior to discarding
  10. High security environment should always implement multi-factor authentication.
The following image presents a concept for an IT department and System room environment that follows the presented set of rules:

The set-up of the environment is the following:
The reception area is the only way to access the entire floor, and everyone accessing this space is recorded on the CCTV camera. The access to the rest of the floor is restricted by an key card controlled door.
The Communication Room is also in the reception area, and it is accessible by a key card and PIN controlled door. It houses access panels where the communication providers (Telecoms, Internet, VPN etc.) terminate the purchased links. This is the last point where a representative of the telco providers can access to configure connectivity. The comm room has to be opened by an authorized System Administrator, so the telco provider's person is always escorted by an authorized person.
All the corridors in the space around the data-room are under CCTV surveillance
All offices have windows made of tempered glass that cannot be opened and are equipped with motion sensors which activate after 7 PM.
Support center which is manned 24/7, the toilet and the equipment storage room are the only rooms without motion sensor. These spaces can be used 24/7 so there is no point in placing motion sensors.
All documentation photocopying and destruction is performed in a dedicated room equipped with proper devices (shredder, degausser).
Dedicated storage space is used to store all unused equipment, which is accessed by a key card controlled door and is also monitored by CCTV.
The data-room is central to the floor, and has strengthened walls (Blue walls). The data-room is divided into two segments:
  • Pre-system space - this space is accessible via a dual key card door, which opens only when two persons use their key cards simultaneously. The Pre-system space contains the supporting infrastructure, which is placed outside of the system space to minimize risks of battery or coolant leaks, and to allow service personnel to access and service this infrastructure without having access to the actual servers.

  • System space - this space is accessible via the dead-man door, which is actually a very small corridor (only fits one person at a time) with two doors at the end. If one of the doors is open the other is automatically locked. In order to pass through the dead-man door, one must pass a multi-factor authentication: He/She needs to present his key card (something he/she has), type in the corresponding PIN (something he/she knows), and after entering the dead-man space, he is measured to verify the stored weight of the person, and a biometric verification is performed - retina or fingerprint (something he/she is).
The system space is under constant CCTV surveillance, and it also contains a separate small electronically locked space where the security controllers reside, to isolate these controllers from the SysAdmins.

open source Web Application Vulnerability Scanner

Web Application Security Assessment Tools:


         Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it's built on, just like an actual attacker.
         Netsparker can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on.

Download Link :  Click here

N-stalker :

N-Stalker Web Application Security Scanner - security assessment tool that 
incorporates N-Stealth HTTP Security Scanner. Allows to scan web applications
 against SQL XSS injection, buffer overflow, parameter tampering, cross-site script
 CWE Top 25, PCI, OWASP Top 10.


Download Link : Click Here 
         Web Application Vulnerability Scanner automatically checks your web 
applications for SQL Injection, XSS & other web vulnerabilities.   

Download Link : Click Here 

Wednesday, September 14, 2011

Web Application Security/Vulnerability Scanner

                      We have been using lot of tools for Finding Vulnerability in Web Application . while Pentesting today we will see how to use Open source Security Scanner , which works without much of the false positives,we will test this tool

List Of Commercial Tools : Web Application Security Scanner

List of Open Source Tools : Web Application Vulnerability Scanner

Tuesday, September 6, 2011

virtualization product - Open Source

                  is a family of powerful x86 virtualization products for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL).

                Presently, VirtualBox runs on Windows, Linux and Macintosh hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista), DOS/Windows 3.x, Linux (2.4 and 2.6), and OpenBSD.

                              VirtualBox for Linux/UNIX. Within VirtualBox Windows XP is running.

VirtualBox for Mac OS X. Within VirtualBox Windows 7 is running.

                          VirtualBox for Windows. Within VirtualBox Ubuntu 10.10 is running.

Oracle VirtualBox :

  • LsiLogic SAS controller emulation
  • RDP video acceleration
  • NAT engine configuration via API and VBoxManage
  • Enhanced OVF support with custom namespace to preserve settings that are not part of the base OVF standard

Download Link : Click Here

Monday, September 5, 2011

OVALdi - an open-source local vulnerability assessment scanner

OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of Definitions the interpreter collects system information, evaluates it, and generates detailed OVAL Results.

OVALdi is open-source and still under heavy development, so the results may not always be accurate:

  • The repository of OVAL definitions is not complete yet: Not all vulnerabilities will be detected.
  • Non-English versions of Windows do not seem to be supported as well as English versions: In practice you may encounter more false positives (reported vulnerabilities even when the patch is already installed).
  • Potential bugs

Download Link : Click Here

Best Open Source Information Security Tools

Open Source Security Assessment Tools

Best - Open Source Security Assessment , Vulnerability Auditing, & Penetration Testing Tools:

Stockade Virtual Appliance with Snort, BASE, Inprotect, CACTI, NTOP & Others


Open source vulnerability assessment tool
Snort Intrusion Detection (IDS) tool
Wireshark TCP/IP Sniffer- AKA Ethereal


Analyze applications that communicate using the HTTP and HTTPS protocols
Wikto Web server assessment tool
BackTrack Penetration Testing live Linux distribution
Netcat The network Swiss army knife
Metasploit Framework Comprehensive hacking framework
Sysinternals Collection of windows utilities
Paros proxy Web application proxy
Enum Enumerate Windows information
P0F v2 Passive OS identification tool
IPPersonality Masquerade IP Stack
SLAN Freeware VPN utility
IKE Crack IKE/IPSEC cracking utility
ASLEAP LEAP cracking tool
Karma Wireless client assessment tool- dangerous
WEPCrack WEP cracking tool
Wellenreiter Wireless scanning application


Great Google hacking tool
Several DDOS Tools Distributed Denial of Service(DDOS) tools
Achilles Web Proxy Tool
Firefox Web Developer Tool Manual web assessment
Scoopy Virtual Machine Identification tool
WebGoat Learning tool for web application pentests
FlawFinder Source code security analyzer
ITS4 Source code security analyzer

Source code security analyzer

PwDump3 Dumps Windows 2000 & NT passwords
Loki ICMP covert channel tool
Zodiac DNS testing tool
Hunt TCP hijacking tool
SniffIT Curses-Based sniffing tool
CactiEZ Network traffic analysis ISO
Inprotect Web-based Nessus administration tool
OSSIM Security Information Management (SIM)
Nemesis Command-Line network packet manipulation tool
NetDude TCPDump manipulation tool
TTY Watcher Terminal session hijacking
Stegdetect Detects stego-hidden data
Hydan Embeds data within x86 applications
S-Tools Embeds data within a BMP, GIF, & WAV Files
Nushu Passive covert channel tool
Ptunnel Transmit data across ICMP
Covert_TCP Transmit data over IP Header fields
THC-PBX Hacker PBX Hacking/Auditing Utility
THC-Scan Wardialer
Syslog-NG MySQL Syslog Service


Edit WinNT 4 & Win2000 log files
Rootkit Detective Rootkit identification tool
Rootkit Releaver Rootkit identification tool
RootKit Hunter Rootkit identification tool


Rootkit identification tool
LKM Linux Kernal Rootkit
TCPView Network traffic monitoring tool
NMAP Network mapping tool
Ollydbg Windows unpacker
UPX Windows packing application
Burneye Linux ELF encryption tool

SilkRpoe 2000

GUI-Based packer/wrapper
EliteWrap Backdoor wrapper tool

Remote-Control backdoor tool

MegaSecurity Site stores thousands of trojan horse backdoors

Backdoor for Windows

Back Orfice 2000 Windows network administration tool
Tini Backdoor listener similar to Netcat


Microsoft Baseline Security Analyzer
OpenVPN SSL VPN solution
Sguil An Analyst Console for network security/log Monitoring
Honeyd Create your own honeypot
Brutus Brute-force authentication cracker
cheops / cheops-ng Maps local or remote networks and identifies OS of machines
ClamAV A GPL anti-virus toolkit for UNIX
Fragroute/Fragrouter Intrusion detection evasion toolkit
Arpwatch Monitor ethernet/IP address pairings and can detect ARP Spoofing
Angry IP Scanner Windows port scanner
Firewalk Advanced traceroute
RainbowCrack Password Hash Cracker
EtherApe EtherApe is a graphical network monitor for Unix
WebInspect Web application scanner
Tripwire File integrity checker
Ntop Network traffic usage monitor
Sam Spade Windows network query tool
Scapy Interactive packet manipulation tool
Superscan A Windows-only port scanner
Airsnort 802.11 WEP Encryption Cracking Tool
Aircrack WEP/WPA cracking tool
NetStumbler Windows 802.11 Sniffer
Dsniff A suite of powerful network auditing and penetration-testing tools
John the Ripper Multi-platform password hash cracker
BASE The Basic Analysis and Security Engine- used to manage IDS data
Kismet Wireless sniffing tool

THC Hydra

Network authentication cracker
Nikto Web scanner
Tcpdump TCP/IP analysis tool


Windows password auditing and recovery application

Reverse WWW Shell

Shell access across port 80
THC-SecureDelete Ensure deleted files are unrecoverable
THC-AMAP Application mapping tool

Top 5 VPN Software


ProXPN is a free VPN software that creates a secure VPN connection between the internet and your PC under a highly secured environment. With secure browsing software ProXPN you can easily hide your online activity and identity. It also helps you to surf blocked websites by hiding the real IP address.

Create a ProXPN account, download, install and run the software, then you can connect the VPN service with your username and password.

Free accounts are rate-limited to 1000 kbps, and do not include PPTP VPN access.

Download Link : Click Here



This program is developed by a company that has various servers in the United States, and basically offers the connection to a VPN (Virtual Private Net) by means of which all the users connected will exit the VPN through their servers. This means that even if you are connected in your own country, your connection will indicate that your are in USA.

MicroVPN offers you various American IPs, protection by means of 168-bit L2TP/IPsec encryption, and various other protection elements that joined to the ease with which the software connects and how easy it is to configure, make MicroVPN one of the programs that changes our IP in the easiest way.

Download Link : Click here


Loki VPN Client:

Free VPN software of Loki Network Project, it is workable for Windows computer only, but offers unlimited data traffic with a 30-minute connection limit per time.

You just need to download and install the software, then run and connect it, no registration needed, but sometimes it maybe fail to connect the VPN server, and the speed is a little slow.

Download Link : Click Here



It is true that we have several free vpn services to bypass such restrictions, but Expat Shield is a new vpn service from AnchorFree, maker of the popular HotSpot Shield, that enables users to create VPN connection to servers located in the United Kingdom, and thereby access all services which are region locked to the UK, such as BBC iPlayer, ITV player, Channel 4, Spotify and others.
Expat Shield also enables user to remain anonymous, and offers protection from packet sniffers, such as Firesheep, by way of encrypted (HTTPS) connection.

Download Link : Click Here


Hotspot Shield:

Hotspot Shield offers a free VPN solution with unlimited bandwidth for Windows and Mac.

Just download and install the software, then you can run and connect the VPN service. There will be ads on the top of the webpages you visit.

Besides English, French and Chinese, Hotspot Shield also supports Arabic, Persian, Russian and Vietnamese.

shield logo

Hotspot Shield

Ensure you are private, secure, and anonymous online!

  • Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
  • Protect yourself from identity theft online.

Download Link : Click Here


Tuesday, August 30, 2011

Web Application Configuration Analyzer (WACA) - Microsoft

Web Application Configuration Analyzer (WACA) :-

server configuration for security best practices related to General Windows, IIS , ASP.NET and SQL Server settings.

Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of best practices is derived from the Microsoft Information Security & Risk Management Deployment Review Standards used internally at Microsoft to harden production and pre-production environments for line of business applications. The Deployment Review standards themselves were derived from content released by Microsoft Patterns & Practices, in particular: Improving Web Application Security: Threats and Countermeasures .

WACA - new features:-
  • Suppressions – you can now suppress any rule you feel is not appropriate for your scan.

  • Saving of suppression files – once you set up a suppression list you want to use you can save it off for future uses.
  • You can change the suppressions and regenerate the report without needing to re-run the scan.
  • Reporting – Updated the reporting section to include suppression information so you know what passed, failed, was not applicable and what was suppressed.
  • Multiple reports – you can view multiple scans of the same machine or view a single machine’s scan and compare it to other machines.
  • Export to the Microsoft RED format.
  • Scan multiple systems and SQL instances in one bulk scan.
  • Additional rules – we’ve added in additional SQL rules.
  • And of course bug fixes that were missed in the last release.

System requirements

Supported Operating Systems: Windows 7, Windows Server 2003, Windows Server 2003 R2 (32-Bit x86), Windows Server 2003 R2 x64 editions, Windows Server 2008

Supported Operating Systems for installation: Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008 R1/R2

Support Operating Systems for scanning: Windows Server 2003, Windows Server 2008 R1/R2

Sofware Requirements: .NET Framework v4.0, Microsoft Office Excel (Optional)

Download Link : Click Here

Microsoft - Attack Surface Analyzer

Attack Surface Analyzer :-
beta is a Microsoft verification tool now available for ISVs and IT professionals to highlight the changes in system state, runtime parameters and securable objects on the Windows operating system. This analysis helps developers, testers and IT professionals identify increases in the attack surface caused by installing applications on a machine.

The tool takes snapshots of an organization's system and compares ("diffing") these to identify changes. The tool does not analyze a system based on signatures or known vulnerabilities; instead, it looks for classes of security weaknesses as applications are installed on the Windows operating system
I'd encourage people to download the tool, and if you happen to be at Blackhat DC, swing by the Microsoft booth and take a look for yourself.

Download Link : Click Here

Monday, August 29, 2011

OpenDLP - Open source Data Loss Prevention


is a free and open source, agent-based, centrally-managed, massively distributable data loss prevention tool released under the GPL. Given appropriate Windows domain credentials, OpenDLP can simultaneously identify sensitive data at rest on hundreds or thousands of Microsoft Windows systems from a centralized web application. OpenDLP has two components: a web application and an agent.

The speed and simplicity of OpenDLP make it a great choice for Penetration Testers. Unfortunately, it also does the same for an attacker. In one case, SecureState was able to sift through 50 machines to pull out various HIPAA and PCI data in less than an hour. This may result in non-compliance in both areas. With the weaponization of OpenDLP, an attacker no longer has to spend days searching systems or limiting themselves to only large file shares. Attackers can be in and out before they are ever detected.

Data Loss Prevention suite with centralized web frontend to manage Windows agent filesystem scanners, agentless database scanners, and agentless Windows/UNIX filesystem scanners that identify sensitive data at rest.Web Application
  • Automatically deploy and start agents over Netbios/SMB
  • When done, automatically stop, uninstall, and delete agents over Netbios/SMB
  • Pause, resume, and forcefully uninstall agents in an entire scan or on individual systems
  • Concurrently and securely receive results from hundreds or thousands of deployed agents over two-way-trusted SSL connection
  • Create Perl-compatible regular expressions (PCREs) for finding sensitive data at rest
  • Create reusable profiles for scans that include whitelisting or blacklisting directories and file extensions
  • Review findings and identify false positives
  • Export results as XML
  • Written in Perl with MySQL backend


  • Runs on Windows 2000 and later systems
  • Written in C with no .NET Framework requirements
  • Runs as a Windows Service at low priority so users do not see or feel it
  • Resumes automatically upon system reboot with no user interaction
  • Securely transmit results to web application at user-defined intervals over two-way-trusted SSL connection
  • Uses PCREs to identify sensitive data inside files
  • Performs additional checks on potential credit card numbers to reduce false positives
  • Can read inside ZIP files, including Office 2007 and OpenOffice files
  • Limits itself to a percent of physical memory so there is no thrashing when processing large files

Agentless Database Scans

In addition to performing data discovery on Windows operating systems, OpenDLP also supports performing agentless data discovery against the following databases:

  • Microsoft SQL server
  • MySQL

Agentless File System and File Share Scans

With OpenDLP 0.4, one can perform the following scans:

  • Agentless Windows file system scan (over SMB)
  • Agentless Windows share scan (over SMB)
  • Agentless UNIX file system scan (over SSH using sshfs)


Agent-based Windows OS scan, summary results view:

Agent-based Windows OS scan, detailed results view:

Agentless Microsoft SQL Server scan, detailed results view:

Download Link : Click Here


SSH Tools for Windows , Mac OS

is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.

OpenSSH Server for Windows:

An installer for a minimal installation of the Cygwin environment suitable for running an OpenSSH server on the Windows platform.

Download Link : Click Here

SSH Client For Windows:
PuTTY is a free implementation of Telnet and SSH for Win32 platforms.

Download Putty : Click here

TTSSH is a free SSH client for Windows. It is implemented as an extension DLL for Teraterm Pro. Teraterm Pro is a superb free terminal emulator/telnet client for Windows, and its source is available. TTSSH adds SSH capabilities to Teraterm Pro without sacrificing any of Teraterm's existing functionality.

SSH Client For Mac O/S:
NiftyTelnet 1.1 SSH r3 is an enhanced version of Chris Newman's NiftyTelnet 1.1 application which adds support for encrypted terminal sessions using the SSH (Secure Shell) protocol.

Download NiftyTelnet : Click here

SSH2 client for MacOS before X, based on BetterTelnet, lsh and GUSI.

Download MacSSH: Click Here

Tips for Secure SSH Login

Secure Shell (SSH):
has been constructed with regards to security. Previously, customers often accessed Telnet in order to gain connection to their servers; however, this was the time, when servers were located right across the hall, not widely spread across the infinite internet.

Secure Shell provides an additional layer of encryption to the communication, ensuring that the users can connect with the dedicated server or the virtual private server (VPS) without having to feel wary of any threat from malicious activity, such as the capturing of their password.

Default Port No: 22/Tcp

Restrict Root login's:
In an ordinary situation, you have no motive to permit straight root logins to your server. Although the system administrator can be one of the roots once it has logged in (using su or sudo), it is far too dangerous to make your root account open to the entire Internet.

Jail users in chroot directories:
Servers, belonging to Linux and UNIX, provide the ability of restricting ordinary users from doing something dangerous, such as removing all the documents;, however, nothing can be done about viewing the files.

Install Brute Force Detection software:
Malicious hackers can make use of forcible methods in an attempt to gain knowledge of your password and carry out malevolent activity on your server.

Maintain secure password and periodic rotations:
Being the sysadmin, you have the ability to manage the requirements regarding the strength of the password along with making it compulsory for users to modify their password after a period of time.

Set the Timeout Interval:
An extremely helpful feature, a part of SSH configuration file, is that it allows you to determine a timeout interval, disallowing users from staying logged in, irrespective of whether they have forgotten to logout .

Friday, July 29, 2011

open source security assessment framework


is an open source framework to enable effective information sharing, specially during security assessments.

Dradis is a self-contained web application that provides a centralized repository of information to keep track

This application is suited to people in lengthy engagements, it’s very useful to have all the information in one place. It’s also good to have if your team changes (i.e. someone joins half the way through), it will be useful to bring them up to speed.

Download Link : Click Here


Wednesday, July 27, 2011

Open Source Live-CD for Computer Forensic

PlainSight :
is a versatile computer forensics environment that allows inexperienced forensic practitioners perform common tasks using powerful open source tools.

We have taken the best open source forensic/security tools, customised them, and combined them with an intuitive user interface to create an incredibly powerful forensic environment.

Download Link : Click Here


DEFT 6 :
is based on Lubuntu with Kernel 2.6.35 (Linux side) and DEFT Extra 3.0 (Windows side) with the best freeware Computer Forensic tools; it is a new concept of Computer Forensic live system, ewflib ready, that use WINE for run Windows Computer Forensics tools under Linux.

DEFT live-cd for incident-response & corporate/gov forensics and a DEFT-based persistent environment for acquisition-analysis within the inhouse forensic lab.

Download Link : Click here


Open Source Live-CD for Penetration testing

BackBox :
is a Linux distribution based on Ubuntu Lucid 10.04 LTS developed to perform penetration
tests and security assessments. Designed to be fast, easy to use and to provide a minimal yet complete desktop environment thanks to its own software repositories always been updated to the last stable version of the most known and used ethical hacking tools.

Hacking tools new or updated: Firefox 4, Hydra 6.2, Kismet 2011.03.2, Metasploit Framework 3.6.0, NMap 5.51, SET 1.3.5, SqlMap 0.9, sslstrip 0.8, w3af 1.0-rc5, weevely 0.3, WhatWeb 1.4.7,
Wireshark 1.4.5, Zaproxy 1.2, etc

Download Link : Click Here


Blackbuntu :
is distribution for penetration testing which was specially designed for security training students and practitioners of information security.
Blackbuntu is Ubuntu base distro for Penetration Testing with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10.

Download Link : Click here


Tuesday, July 26, 2011

Open Source network firewall

NetDefender :
is a Free Firewall with source code, which can be downloaded along with firewall executables. Netdefender works on windows 2000 and windows XP.

Requirements :

1. Netdefender can only run on an OS higher than windows 2000 (i.e. Win 2000, Win Xp I hope Vista would not break anything)
2. User must has admin rights (i.e. must be member of administrator group ) on the system.

Download Link : Click here

Shorewall :
is a gateway/firewall configuration tool for GNU/Linux.

Download Link : Click here


is a new generation proxy firewall suite and as such its core architecture is built around today's security demands: it uses application level proxies, it is modular and component based, it uses a script language to describe policy decisions, it makes it possible to monitor encrypted traffic, it let's you override client actions, it let's you protect your servers with its built in IDS capabilities... The list is endless. It gives you all the power you need to implement your local security policy.

Download Link : Click here

Ufw :

stands for Uncomplicated Firewall, and is program for managing a netfilter firewall. It provides a command line interface and aims to be uncomplicated and easy to use.

Download Link : Click here