<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/security/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Tue, 26 Nov 2019 12:16:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>security Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>4 Fundamental Open Source Security Tools</title>
		<link>http://kostacipo.stream/4-fundamental-open-source-security-tools/</link>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 12:15:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1378</guid>

					<description><![CDATA[<p>&#160; In the world of cyber security, there are thousands of open source security tools with both defensive and offensive security capabilities that many professionals prefer to assess systems. The following are 4 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/4-fundamental-open-source-security-tools/">4 Fundamental Open Source Security Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>In the world of cyber security, there are thousands of open source security tools with both defensive and offensive security capabilities that many professionals prefer to assess systems. The following are 4 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the essential rating due to the fact that they are effective, well supported and easy to start getting value from.</p>
<p><b>Nmap:</b></p>
<p>Nmap (&#8220;Network Mapper&#8221;) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. It uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.</p>
<div class="separator"><a href="https://4.bp.blogspot.com/-_c7y4ztidt4/WDQ6bhcDU_I/AAAAAAAAAhA/vWYl9-yaZ8Y3GUL0TFiD2uA5CxMdeFUmQCLcB/s1600/nmap.png"><img fetchpriority="high" decoding="async" src="https://4.bp.blogspot.com/-_c7y4ztidt4/WDQ6bhcDU_I/AAAAAAAAAhA/vWYl9-yaZ8Y3GUL0TFiD2uA5CxMdeFUmQCLcB/s320/nmap.png" width="320" height="248" border="0"></a></div>
<p><b><br />
Metasploit Framework:</b></p>
<p>Metasploit framework is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon sprouted commercial variants.</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-8C7MZlXz-oo/WDQ6hi7gu2I/AAAAAAAAAhE/JOAwLJtQQXINn2OQoLlQb46EunKwVtroACLcB/s1600/metasploit_ie_xp_pfv_metafile.png"><img decoding="async" src="https://1.bp.blogspot.com/-8C7MZlXz-oo/WDQ6hi7gu2I/AAAAAAAAAhE/JOAwLJtQQXINn2OQoLlQb46EunKwVtroACLcB/s400/metasploit_ie_xp_pfv_metafile.png" width="400" height="308" border="0"></a></div>
<p><b><br />
Wireshark:</b></p>
<p>Wireshark is a fantastic open source, multi-platform network protocol analyzer that allows examining the data from a live network or from a capture file on disk. It enables us to capture data and take a deep look into packet details. It also supports hundreds of protocols and media types. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.</p>
<div class="separator"><a href="https://2.bp.blogspot.com/-bJ_o0lGNUhU/WDQ6mRilEWI/AAAAAAAAAhI/oXAIbAF8kDcZbtPhzhRt-h2M9Sg--nMZgCLcB/s1600/wireshark.png"><img decoding="async" src="https://2.bp.blogspot.com/-bJ_o0lGNUhU/WDQ6mRilEWI/AAAAAAAAAhI/oXAIbAF8kDcZbtPhzhRt-h2M9Sg--nMZgCLcB/s400/wireshark.png" width="400" height="107" border="0"></a></div>
<p><b><br />
Nikto:</b></p>
<p>Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. Nikto is great for firing at a web server to find known vulnerable scripts, configuration mistakes and related security problems.</p>
<div class="separator"><a href="https://4.bp.blogspot.com/-3k45N4lHPL4/WDQ6u2epvEI/AAAAAAAAAhM/k2Yj3AJ80WIGq20JHTLfWSvD2sgMxsabwCLcB/s1600/9657814_orig.png"><img loading="lazy" decoding="async" src="https://4.bp.blogspot.com/-3k45N4lHPL4/WDQ6u2epvEI/AAAAAAAAAhM/k2Yj3AJ80WIGq20JHTLfWSvD2sgMxsabwCLcB/s400/9657814_orig.png" width="400" height="225" border="0"></a></div>
<p>These security tools are well known and are updated by the providers to allow effective use. However, there are many other security tools as well which are being used by many professional as per their requirements.</p>
<p>The post <a href="http://kostacipo.stream/4-fundamental-open-source-security-tools/">4 Fundamental Open Source Security Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
