Network Security Toolkit (NST)

The Network Toolkit (NST) is a bootable ISO image (Live DVD / USB Flash Drive) based on Fedora 28, providing easy access to leading Open Source Network Security applications and should run on most x86_64 systems.

The main purpose of developing this toolkit was to provide the security professional and network administrator with a complete set of network security tools. Most of the tools published in the article: Top 125 Security tools from INSECURE.ORG are available in the tool kit.

An advanced Web User Interface (WUI) is provided for system / network management, navigation, automation, δικτύου, γεωγραφική τοποθεσία κεντρικού υπολογιστή, ανάλυση δικτύου και διαμόρφωση πολλών εφαρμογών δικτύου και ασφάλειας που βρίσκονται στη διανομή NST.

In the virtual world, NST can be used as a security analysis, validation, and monitoring tool on virtual enterprise servers that host virtual machines.

Specifications

  • Multi-Tap Network Packet Capture
  • Web-Based Network Security Tools Management
  • Host / IPv4 Address Geolocation
  • Network / System Monitoring
  • Network Intrusion Detection
  • Network Interface Bandwidth Monitor
  • Web-based Snort IDS Integration
  • Active Connections Monitor
  • Network Segment ARP Scanner
  • Network Packet Capture CloudShark Upload Support
  • Multi-Port Terminal Server
  • VNC / RDP Desktop Session Management

You can download the program from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).