June 18, 2018

50 Essential Open Source Security Tools - page 4

Anti-Everything, Encryption, Secure Delete, Forensics

  • November 11, 2008
  • By Cynthia Harvey


36. KeePass

This lightweight password safe remembers all your passwords, so don't have to. For security, it encrypts your passwords using AES and Twofish, two of the most powerful encryption algorithms available. Operating System: Windows.

37. Ophcrack

You shouldn't need a password cracker on a regular basis, but when an employee leaves without informing you of his or her password, it's handy to have one in your toolkit. This one works pretty well and can run directly from a CD. Operating System: Windows, Mac, Linux, Unix.

38. WiKID Community Edition

WiKID provides Java-based two-factor authentication. Note that you'll need a PDA or USB device you can use as a token in order to make it work. Operating System: OS Independent.

39. Password Safe

An alternative to KeePass, Password Safe gives you the option of creating multiple encrypted password databases (for home and work, for example). It can also generate strong passwords for you. Operating System: Windows.

Remote Access/VPN

40. OpenSSH

Developed by the OpenBSD project, OpenSSH offers a set of SSH, SCP, and SFTP tools for secure remote access and file transfer. It encrypts all traffic, including passwords, to make hijacking nearly impossible. Operating System: Linux, Unix, BSD.

41. PuTTY

This basic telnet/SSH client offers remote access for most Windows and Unix systems. Note that it does not support Vista. Operating System: Windows, Unix.

42. OpenVPN

Despite its lightweight configuration, OpenVPN offers a robust, full-featured SSL VPN that works equally well for both small businesses and enterprises. Key features include load balancing, failover, and flexible access control, including support for two-factor authentication. Operating System: Windows, Mac, Linux, BSD, Solaris.

43. UltraVNC

With the SingleClick addon, UltraVNC is ideal for helpdesk situations. Key features include secure file transfer and chat capabilities. Operating System: Windows.

System Monitoring

44. Afick

Short for "Another File Integrity Checker," Afick is very similar to Tripwire, which is now a commercial product. It alerts you to changes on your system that may have been caused by intrusions. Operating System: OS Independent.

Vulnerability Assessment

45. Nessus

The "world leader in active scanners," Nessus quickly scans your entire network locating vulnerable data and resources and detecting when security policies have been breached. The latest versions of Nessus are free to download, but are no longer open source. However, you can still download the older open source version and the source code from the site. Operating System: Windows, Mac, Linux, BSD, Solaris.

46. Metasploit

One of the best ways to test the security of your network is to use the same tools hackers are likely to be using. As the standard attack and penetration toolkit, Metasploit gives you the opportunity to find vulnerabilities before the black hats do. Operating System: Windows, Unix.

47. Nikto

Nikto scans Web servers for thousands of dangerous files and server-specific problems. Optional automatic updates are available. Operating System: Windows, Mac, Linux, Unix, BSD.

48. Paros

This Java-based scanner intercepts all http and https data transmitted between server and client to help evaluate the security of Web applications. It includes a spider, proxy-chaining, intelligent scanning for XSS and SQL injections, and more. Operating System: OS Independent.

49. ProShield

Designed primarily for Debian and Ubuntu, ProShield scans your system to make sure your software is up-to-date and that you haven't picked up any malware. It also reminds you to backup your system, checks your available disk space, and performs other routine maintenance checks. Operating System: Linux.

Web Filtering

50. iSAK

Short for "Internet Secure Access Kit," iSAK blocks access to objectionable Web sites based on user-defined rules and provides a variety of reports so that you can see what sites your users have been visiting. You can block entire categories of sites (e.g., adult content, gaming, etc.) or block access by domain, URL, or a number of other criteria. Operating System: Linux, Unix, BSD.

Article courtesy of Datamation

Most Popular LinuxPlanet Stories

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.