Boo

We stand for love.

© 2024 Boo Enterprises, Inc.

#technology
#computerscience
#cybersecurity
#technologie
#dram
#ai
#tech
#gamedev
#ram
#internet
#hacking
#robotics
#datascience
#bugs
#gamedevelopment
#informatique
#machinelearning
#data
#vtt
#robots
#inteligenciartificial
#online
#informatic
#dataanalyst
#computacion
#web
#hardware
#hacker
#dataanalytics
#masterandslave
#technologies
#automation
#ddr
#devops
#techenthusiast
#raspberrypi
#offline
#poe
#cyberforensics
#links
#retrocomputing
#characterai
#networkengineer
#windows
#anonymous
#stablediffusion
#8bit
#bioinformatics
#networkadministrator
#computing
#database
#neuralnetworks
#informatika
#pentesting
#analytics
#systems
#nanotechnology
#telecommunication
#gamedevelopments
#frequencies
#technologyplatfrom
#error
#databases
#mobiledevelopment
#server
#computernetwork
#engenhariadesoftware
#darkweb
#cybernetics
#hightech
#physicalmedia
#generativeai
#amd
#seguridadinformatica
#ios
#analisisdata
#rom
#ciênciadacomputação
#macro
#circuitboards
#cypherpunk
#deepweb
#overclocking
#bigdata
#glitches
#abstraction
#microcontroller
#sd
#systema
#bugbounty
#morsecode
#motioncapture
#wifi
#cryptology
#greentechnology
#automação
#postgresql
#operatingsystems
#gamesystems
#lowtech
#platforms
#amdryzen
#neuralnetworking
#16bit
#buildinggames
#bits
#analisiadata
#cyberdecks
#zxspectrum
#bancodedados
#3dscanning
#automatización
#roboter
#gpu
#technicalerror
#kingston
#trojan
#minipc
#homesecurity
#physicalsecurity
#lowfrequency
#binary
#atx
#digitalmedia
#ipv6
#permacomputing
#syntax
#deeptext
#cyberspacesafety
#hiddensystem
#modem
#defcon
#cpu
#gigabyte
#ingenieríasocial
#ryzen
#ransomware
#jaringan
#binarycode
#digitallibraries
#meltedclock
#humanetech
#widya
#enligne
#udp
#ceh
#système
#deadtechnology
#humanoid
#specialkey
#aimodels
#onlinesafety
#itcoding
#crittologia
#networkissues
#imagedetection
#modélisation
#microinformatica
#fumitoueda
#uczeniemaszynowe
#disquette

Universes

#technology#computerscience#cybersecurity#technologie#dram#ai#tech#gamedev#ram#internet#hacking#robotics#datascience#bugs#gamedevelopment#informatique#machinelearning#data#vtt#robots#inteligenciartificial#online#informatic#dataanalyst#computacion#web#hardware#hacker#dataanalytics#masterandslave#technologies#automation#ddr#devops#techenthusiast#raspberrypi#offline#poe#cyberforensics#links#retrocomputing#characterai#networkengineer#windows#anonymous#stablediffusion#8bit#bioinformatics#networkadministrator#computing#database#neuralnetworks#informatika#pentesting#analytics#systems#nanotechnology#telecommunication#gamedevelopments#frequencies#technologyplatfrom#error#databases#mobiledevelopment#server#computernetwork#engenhariadesoftware#darkweb#cybernetics#hightech#physicalmedia#generativeai#amd#seguridadinformatica#ios#analisisdata#rom#ciênciadacomputação#macro#circuitboards#cypherpunk#deepweb#overclocking#bigdata#glitches#abstraction#microcontroller#sd#systema#bugbounty#morsecode#motioncapture#wifi#cryptology#greentechnology#automação#postgresql#operatingsystems#gamesystems#lowtech#platforms#amdryzen#neuralnetworking#16bit#buildinggames#bits#analisiadata#cyberdecks#zxspectrum#bancodedados#3dscanning#automatización#roboter#gpu#technicalerror#kingston#trojan#minipc#homesecurity#physicalsecurity#lowfrequency#binary#atx#digitalmedia#ipv6#permacomputing#syntax#deeptext#cyberspacesafety#hiddensystem#modem#defcon#cpu#gigabyte#ingenieríasocial#ryzen#ransomware#jaringan#binarycode#digitallibraries#meltedclock#humanetech#widya#enligne#udp#ceh#système#deadtechnology#humanoid#specialkey#aimodels#onlinesafety#itcoding#crittologia#networkissues#imagedetection#modélisation#microinformatica#fumitoueda#uczeniemaszynowe#disquette
Tempest

Tempest

1y

INFJ

Gemini

3
4

Cybersecurity tools

Looking to see how these tools are used for offense and defense. While I am familiar with most of these how to explain how they are used both by hackers and defensively eludes me Kali linux-obviously has some amazing tools for pentesting as well as malicious programs Metasplot- I dont remember much i think we used it to hack Burp suit-never touched this one Snort Pfense firewall Surucata Bro- detect network intrusions in real time. Record metadata on all ip/terminate SSL connections/forge certificates Nmap-check vulnerabilites-port scanning-network mapping -bypass firewalls/ids Links preferred so I could read through it and learn also. Google goes so far on my own (edited)

9

5

Comment

Cybersecurity Community

The cybersecurity community, chat, and discussion.

JOIN NOW

644 SOULS

best
new
Jay

Jay

5mo

ENFP

Capricorn

8
7

Good list! Just remember most of these tool need good word lists to function correctly. BURP is for intercepting, manipulating, and transmitting web traffic. Snort, Suricata, and Bro do the same thing. BRO has more features. Snort is old. Suricata is the new Snort. Nmap can also be used for password attacks. Most of the offensive tools are used by defenders to proactively cover the techniques that they identify in their threat model. (edited)

0

0

Reply

Meet New People

10,000,000+ DOWNLOADS

JOIN NOW