How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS Introduction Linux is known for having a great number of mature, useful command line utilities available out of the box in most distributions. Skilled system administrators can do much of their work using the built-in tools without having to install additional software. In this guide, we will discuss how to use the netcat utility. Often referred to as a Swiss army knife of networking tools, this versatile command can assist you in monitoring, testing, and sending data across network connections. We will be exploring this on an Ubuntu 12.04 VPS, but netcat should be available on almost any modern Linux distribution. General Syntax By default, netcat operates by initiating a TCP connection to a remote host. The most basic syntax is: netcat [options] host port This will attempt to initiate a TCP to the defined host on the port number specified. If you would like to send a UDP packet instead of initiating a TCP connection, you can use the -u option: netcat -u host port netcat host startport-endport
Hash Suite - a Windows program to audit security of password hashes The GNU Netcat -- Official homepage Force Windows 7 to Clear Virtual Memory Pagefile at Shutdown Among the advances offered to it users, Windows 7’s handling of virtual memory is the most efficient to date. However, as the RAM in a computer increases, so must the size of the pagefile to accommodate the larger capacity of computer memory. There are several advantages to starting each Windows 7 session with a cleared pagefile. Learn about virtual memory and how to force Windows 7 to clear your virtual memory pagefile whenever the operating system shuts down. What is Virtual Memory? The amount of memory you can put into your computer is finite. The amount of hard drive space set aside for virtual memory ranges from zero to about 1 to 2 times the memory you have installed in your computer. Why Clear Virtual Memory? When you shutdown Windows 7, the data in your computer’s RAM is lost because PC memory is volatile. Virtual memory is quite secure within Windows 7 because only the operating system has the authority to read and write to the virtual memory pagefile.
John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. To verify authenticity and integrity of your John the Ripper downloads, please use our PGP public key. There's a wiki section with John the Ripper user community resources.
Netcat Features[edit] The original netcat's features include:[2] Outbound or inbound connections, TCP or UDP, to or from any portsFull DNS forward/reverse checking, with appropriate warningsAbility to use any local source portAbility to use any locally configured network source addressBuilt-in port-scanning capabilities, with randomizationBuilt-in loose source-routing capabilityCan read command line arguments from standard inputSlow-send mode, one line every N secondsHex dump of transmitted and received dataOptional ability to let another program service establish connectionsOptional telnet-options responder Rewrites like GNU's and OpenBSD's support additional features. Examples[edit] Opening a raw connection to port 25[edit] nc mail.server.net 25 Performing an HTTP request[edit] printf "GET /index.html HTTP/1.0\r\nHost: info.cern.ch\r\n\r\n" | nc info.cern.ch 80 The full response (including HTTP headers) will be dumped to standard output. nc -vzu 192.168.0.1 80-90 nc -l -u -p 4171 nc -u servname 4172
Sandbox (computer security) In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers, untrusted users and untrusted websites.[1] The sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted. In this sense, sandboxes are a specific example of virtualization. Sandboxing technology is frequently used to test unverified programs which may contain a virus or other malignant code, without allowing the software to harm the host device.[2] Examples of sandboxes include: Security In-Depth for Linux Software: Preventing and Mitigating Security Bugs (PDF)
Download the Free Nmap Security Scanner Nmap and Zenmap (the graphical front end) are available in several versions and formats. Recent source releases and binary packages are described below. Older version (and sometimes newer test releases) are available from the dist directory (and really old ones are in dist-old). For the more security-paranoid (smart) users, GPG detached signatures and SHA-1 hashes for each release are available in the sigs directory (verification instructions). Before downloading, be sure to read the relevant sections for your platform from the Nmap Install Guide. Nmap users are encouraged to subscribe to the Nmap-hackers mailing list. You can also get updates from our Facebook and Twitter pages. Nmap is distributed with source code under the terms of the GNU General Public License, with certain clarifications and exceptions noted in the copyright page. This is the traditional compile-it-yourself format. bzip2 -cd nmap-7.60.tar.bz2 | tar xvf - cd nmap-7.60 . Latest stable release installer: nmap-7.60.dmg