Network Security Toolkit

Network Security Toolkit
Network Security Toolkit
NST Logo
NST WUI: Multi-Tap Network Packet Capture
NST WUI: Multi-Tap Network Packet Capture
Developer(s) Ronald W. Henderson
Paul Blankenbaker
Initial release 2003, 7–8 years ago
Stable release 2.15.0-2515 / August 9, 2011; 3 months ago (2011-08-09)
Development status Active
Written in HTML, JavaScript, AJAX, JSON, Bash, PHP, Java, Perl, Python, XML, XSL, SVG, C, C++, Expect, Unix Utilities
Operating system Linux (Fedora based)
Available in English
License Various
Website NST Home Page

The Network Security Toolkit (NST) is a Linux-based Live CD that provides a set of open source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks. The distribution can be used as a network security analysis, validation and monitoring tool on servers hosting virtual machines. The majority of tools published in the article Top 100 security tools by Insecure.org are available in the toolkit. NST has package management capabilities similar to Fedora and maintains its own repository (32 bit / 64 bit) of additional packages.

Contents

Features

Many tasks that can be performed within NST are available through a web interface called NST WUI. Among the tools that can be used through this interface are nmap with the vizualization tool ZenMap, ntop, a Network Interface Bandwidth Monitor, a session manager for VNC, a minicom-based terminal server, serial port monitoring, and WPA PSK management.

Other features include visualization of ntop, wireshark, traceroute, netflow and kismet data by geolocating the host addresses, IPv4 Address conversation, traceroute data and wireless access points and displaying them via Google Earth or a Mercator World Map bit image, a browser-based packet capture and protocol analysis system capable of monitoring up to four network interfaces using Wireshark, as well as a Snort-based intrusion detection system with a "collector" backend that stores incidents in a MySQL database. For web developers, there is also a JavaScript console with a built-in object library with functions that aid the development of dynamic web pages.


Host Geolocations

The following example ntop host geolocation images were generated by NST.

ntop World Map Hosts
ntop Hosts Rendered On Google Earth

Network Monitors

The following image depicts the interactive dynamic SVG/AJAX enabled Network Interface Bandwidth Monitor which is integrated into the NST WUI. Also shown is a Ruler Measurment tool overlay to perform time and bandwidth rate analysis.

Network Interface Bandwidth Monitor - Interface: eth0

See also

External links

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… …   Wikipedia

  • Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) …   Wikipedia

  • Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Security Scan — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Security Test — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Network forensics — Forensic science Physiological sciences …   Wikipedia

  • IT Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Merit Network — Founder(s) Michigan State University, University of Michigan, and Wayne State University Type Non profit member governed Founded 1966 Location …   Wikipedia

  • OWASP Mantra Security Framework — OWASP Mantra Security Framework …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”