Network Security Toolkit (NST)

The Security Toolkit (NST) is a bootable ISO image (Live DVD / USB Flash Drive) based on Fedora 28, providing easy in top-of-the-line Open Source Network Security applications and should run on most x86_64 systems.

The main purpose of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of tools of networks. Most of the tools published in the article: Top 125 Security Tools from INSECURE.ORG are available in the toolkit.

An advanced web user interface (WUI) is provided for system / network management, navigation, automation, network monitoring, host geolocation, network analysis, and configuration of many network and security applications located in the NST distribution.

In the virtual world, NST can be used as a security analysis, validation, and monitoring tool on virtual enterprise servers that host virtual machines.

Specifications

  • Multi-Tap Network Packet Capture
  • Web-Based Network Security Tools Management
  • Host / IPv4 Address Geolocation
  • network/ Monitoring
  • Network Intrusion Detection
  • Network Interface Bandwidth Monitor
  • Web-based Snort IDS Integration
  • Active Connections Monitor
  • Network Segment ARP Scanner
  • Network Packet Capture CloudShark Upload
  • Multi-Port Terminal Server
  • VNC / RDP Desktop Session Management

You can download the program from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).