Category: How To

Security Scanners

https://www.hardenize.com https://www.gravityscan.com https://www.ssllabs.com/ssltest/ https://wpscans.com https://pentest-tools.com/home http://www.ipfingerprints.com/portscan.php https://www.subnetonline.com/pages/ipv6-network-tools/online-ipv6-port-scanner.php https://portmap.com/ Other scanners based on headers or dnssec only on other pages in this site
Read More

Image Optimizers

Finding the right methods to compress images for websites can be tricky.  Here are some of the best sites that can compress your images and allow you to
Read More

How to Find Files

Linux: Find any file in /var/tmp that ends with the extension .py [crayon-673ef76884f6f636594195/]     Windows: Find any file in the current directory and beyond that ends with
Read More

Decrypting SSL TLS Traffic in Wireshark

http://packetpushers.net/using-wireshark-to-decode-ssltls-packets/ Configuring Wireshark to decrypt SSL/TLS traffic.     https://jimshaver.net/2015/02/11/decrypting-tls-browser-traffic-with-wireshark-the-easy-way/ The client/server machine that generates the TLS traffic doesn’t have to have Wireshark installed on it, so you
Read More

Ciphers

It’s really hard to find good easy to understand information about how to configure your web applications with the best protocols and cipher suites.  The following resources are
Read More

Wireshark Filter Examples

ip.addr == 172.16.1.1 This filters for any packet with 172.16.1.1, as either the source or destination. ip.addr==172.16.1.1 && ip.addr==172.16.1.2 This creates a conversation filter between the two defined
Read More