Security+: My Favorite Free Tools

  1. Security+ Certification
  2. Security+: Definitions and Catchwords
  3. Security+ Domain 1.0: Threats, Attacks and Vulnerabilities
  4. Security+ Domain 2.0: Technologies and Tools, Chapter 6
  5. Security+ Domain 2.0: Technologies and Tools, Chapter 7
  6. Security+ Domain 2.0: Technologies and Tools, Chapter 8
  7. Security+ Domain 2.0: Technologies and Tools, Chapter 9
  8. Security+ Domain 2.0: Technologies and Tools, Chapter 10
  9. Security+ Domain 3.0: Architecture and Design: Chapter 11
  10. Security+ Domain 3.0: Secure Systems Design and Deployment: Chapter 12
  11. Security+ Domain 3.0: Secure Systems Design and Deployment: Chapter 12 cont’d
  12. Security+ Domain 3.0: Architecture and Design: Chapter 13: Embedded Systems
  13. Security+ Domain 3.0: Architecture and Design: Chapter 14: Application Development
  14. Security+ Domain 3.0: Architecture and Design: Chapter 15: Cloud and Virtualization
  15. Security+ Domain 3.0: Architecture and Design: Chapter 16: Resiliency and Automation
  16. Security+ Domain 3.0: Architecture and Design: Chapter 17: Physical Security
  17. Security+ Domain 4.0: Identity and Access Management: Chapter 18
  18. Security+ Domain 4.0: Identity and Access Management: Chapter 19
  19. Security+ Domain 4.0: Identity and Access Management: Chapter 20
  20. Security+ Domain 5.0: Risk Management: Chapter 21
  21. Security+ Domain 5.0: Risk Management: Chapter 22
  22. Security+ : Sample Questions
  23. Security+ Domain 5.0: Risk Management: Chapter 23
  24. bastion.inf
  25. Security+ Domain 5.0: Risk Management: Chapter 24
  26. Security+ Domain 5.0: Risk Management: Chapter 25
  27. Security+ Domain 5.0: Risk Management: Chapter 26
  28. Security+ Domain 5.0: Risk Management: Chapter 27
  29. Security+ Domain 5.0: Risk Management: Chapter 28
  30. Security+ Domain 5.0: Risk Management: Chapter 29
  31. Security+: My Favorite Free Tools

 

My Favorite Free Security Tools
Command-Line Tools
Command
Description
Example
Explanation
Linux
dig
Queries DNS servers for host name/IP address mappings. dig
dig <hostname>
Queries hosts listed in /etc/resolve.conf or the host named.
ping
Requests a response from a host. Keeps going until Ctrl-C. ping google.com Asks the computer handling requests for google.com for a response.
telnet
Insecure unencripted terminal client program telnet host.foolish.com Attempts to open telnet communications with host.foolish.com. This service should be disabled.
traceroute
Requests a detailed path from your PC to the destination. traceroute google.com Produces a report of the path your request takes, including IP addresses and response times.
whois
Queries DNS information about the owner and host of a domain. whois XXX
dd
A disk duplication utility useful in forensics dd /dev/hda0 /dev/hdb0
nmap
The classic network mapper. Consider carefully who you map. nmap arrestme.com
Windows
arp
Reports the current Address Resolution Protocol cache arp -a Shows all current IP to MAC mappings.
netstat
Reports established ports and connections being monitored netstat -ano Returns a 5-column report of IP addresses and port numbers.
nslookup
Queries DNS servers for host name/IP address mappings.
ping
Requests a response from a host. Cycles 4 times. ping google.com Asks the computer handling requests for google.com for a response.
telnet
Insecure unencripted terminal client program telnet host.foolish.com Attempts to open telnet communications with host.foolish.com. This service should be disabled.
tracert
Requests a detailed path from your PC to the destination. tracert google.com Produces a report of the path your request takes, including IP addresses and response times.
GUI Tools
Application
Description
Functions
Platform
Related
Remote security scanner for Linux, BSD, Solaris, and other Unix. Over 1200 remote security checks, and also uses plug-ins. Multi-format reports are available. And it even suggests solutions! Security Check Unix:
Linux
BSD
Solaris
Others
A network protocol analyzer for Unix and Windows. Capture packets from a network or read a capture file on disk. View summary and detail information for each packet. Filter the info display and view a reconstructed stream of a TCP session. Unix
Windows
A command-line version called tethereal (included)

Netcat (Unix)

Netcat (Windows)

“Netcat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable ‘back-end’ tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.” –www.securityfocus.com Network Exploration Unix, Windows
Or follow the… … vulnerability scanner page on Darknet at… http://www.darknet.org.uk/tag/vulnerability-scanner/