Network Security Toolkit (NST)

The Security Toolkit (NST) is a bootable ISO image (Live DVD / USB Flash Drive) based on Fedora 28, providing easy access to leading Open Source Network Security applications and should run on most x86_64 systems.

The main purpose of developing this tools was to provide the security professional and network administrator with a comprehensive set of network security tools. Most of the tools published in the article: Top 125 Security Tools from INSECURE.ORG are available in the toolkit.

An advanced web user interface (WUI) is provided for system / network management, navigation, automation, network monitoring, host geographic location, network and configuration of many network and security applications found in the NST distribution.

In the virtual world, NST can be used as a security analysis, validation, and monitoring tool on virtual enterprise servers that host virtual machines.

Specifications

  • Multi-Tap Network Packet Capture
  • Web-Based Network Security Tools Management
  • Host/IPv4 Geolocation
  • Network / System Monitoring
  • Network Intrusion Detection
  • Network Interface Bandwidth Monitor
  • Web-based Snort IDS Integration
  • Active Connections Monitor
  • Network Segment ARP Scanner
  • Network Packet Capture CloudShark Upload Support
  • Multi-Port Terminal Server
  • VNC / RDP Desktop Session Management

You can download the program from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).