Menu

+9 for Network security tool kit

NST
jinverar
2013-02-04
2013-02-16
  • jinverar

    jinverar - 2013-02-04

    Hello

    I'm not sure how often you guys hear what a great security toolkit your dist is. I have been using NST for one year. The learning curve was very steep for me. Before I started I was a moderate linux user. It was my first time using NST with Snort and I managed to work my way through everything. All the tools I have used so far have worked and helped keep my network safe. I use the NST snort with Barnyard and Base daily and have started commenting out rules and adding rules. I have figured out how to use NTOP with the Google add on. NTOP is set up beautiful. I love using the maps feature and watching network connections. this tool is very visual and appealing. When I see a connection from outside the country I investigate and fix the issue. The support in this forum has been fantastic. This is another great tool in the security toolkit. I am a GCIH and metasploit framework expert. NST compliments UAC + antivirus with network threat protection. Snort picks up all the shell code and nmap scans. NST could also be considered a bit of a hack back / hack the hacker solutions and having it alongside Backtrack or Pentoo brings a security professional 10 times further into the future than a regular security guru. This tool actually really does separate the people who think their networks are secure and the professionals who like to know their networks are secure. The network forensics types would love the NST. Now that I have a firm grasp on small parts of NST I may be able to push the envelope with metasploit in the future. I plan to test with HTTPS meterpreter connections and other covert tunnels. For now I just wanted to pass on thank you for reading all my questions and bitches and thank you for creating this tool. It seriously looks like a great deal of work is involved on this and if I can nominate you for an award I would. Thanks for reading and have a great week.

    J:>

     
    • Paul Blankenbaker

      Thanks for the feedback.

      We are glad to hear that you are finding NST to be useful and appreciate
      that you took the time to tell us how you are using it. We do spend a
      considerable amount of time working on the project and don't often receive
      feedback from users. Your note was much appreciated.

      Have a great day,
      Paul

      On Sun, Feb 3, 2013 at 9:16 PM, jinverar jinverar@users.sf.net wrote:

      Hello

      I'm not sure how often you guys hear what a great security toolkit your
      dist is. I have been using NST for one year. The learning curve was very
      steep for me. Before I started I was a moderate linux user. It was my first
      time using NST with Snort and I managed to work my way through everything.
      All the tools I have used so far have worked and helped keep my network
      safe. I use the NST snort with Barnyard and Base daily and have started
      commenting out rules and adding rules. I have figured out how to use NTOP
      with the Google add on. NTOP is set up beautiful. I love using the maps
      feature and watching network connections. this tool is very visual and
      appealing. When I see a connection from outside the country I investigate
      and fix the issue. The support in this forum has been fantastic. This is
      another great tool in the security toolkit. I am a GCIH and metasploit
      framework expert. NST compliments UAC + antivirus with network threat
      protection. Snort picks up all the shell code and nmap scans. NST could
      also be considered a bit of a hack back / hack the hacker solutions and
      having it alongside Backtrack or Pentoo brings a security professional 10
      times further into the future than a regular security guru. This tool
      actually really does separate the people who think their networks are
      secure and the professionals who like to know their networks are secure.
      The network forensics types would love the NST. Now that I have a firm
      grasp on small parts of NST I may be able to push the envelope with
      metasploit in the future. I plan to test with HTTPS meterpreter connections
      and other covert tunnels. For now I just wanted to pass on thank you for
      reading all my questions and bitches and thank you for creating this tool.
      It seriously looks like a great deal of work is involved on this and if I
      can nominate you for an award I would. Thanks for reading and have a great
      week.
      J:>

      +9 for Network security tool kithttps://sourceforge.net/p/nst/discussion/361524/thread/ebbf604b/?limit=25#e3c1

      Sent from sourceforge.net because you indicated interest in
      https://sourceforge.net/p/nst/discussion/361524/

      To unsubscribe from further messages, please visit
      https://sourceforge.net/auth/prefs/

      --
      Paul Blankenbaker
      paul.blankenbaker@redali.com
      317-644-0529

       
    • vagab0nd

      vagab0nd - 2013-02-16

      I strongly endorse J's comments about the value of NST. Using NST has saved a lot of time, and helped open some doors on some subjects (geolocate).

      Big thumbs up.
      V

       
  • Cara Johnson

    Cara Johnson - 2019-12-09
    Post awaiting moderation.
  • Cara Johnson

    Cara Johnson - 2019-12-09
    Post awaiting moderation.

Log in to post a comment.