Nmap Development mailing list archives

Network Security Toolkit (NST) v2.11.0 Released.


From: "Ronald W. Henderson" <rwhalb () nycap rr com>
Date: Mon, 5 Oct 2009 08:30:22 -0400

The latest version (2.11.0) of NST (http://www.networksecuritytoolkit.org)
has been released.  For those folks that are not familiar with NST it was
designed to provide easy access to best-of-breed Open Source Network
Security Applications and should run on most x86/x86_64 platforms.

The main intent of developing this toolkit was to provide the network
security administrator with a comprehensive set of Open Source Network
Security Tools. The majority of tools published in the article: Top 100
Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web
User Interface (WUI) is provided for system administration, navigation,
automation and configuration of many network and security applications found
within the NST distribution. In the virtual world, NST can be used as a
network security analysis, validation and monitoring tool on enterprise
virtual servers hosting virtual machines.

NMAP has be integrated into the NST WUI. One can dynamically extend NMAP
with predefined command line options including NSE scripts. Users can
add/modify their own specific scan options into the NST WUI. NST tries to
make it easy to use NMAP via the web browser. We have added additional XSL
style sheets to render different results from NMAP XML output. Of course the
pretty NMAP XSL rendering is included along with launching of both Zenmap
and RadialNet. NMAP scan results can be viewed with the NST File viewer
which allows for PDF rendering.

NST makes a great companion tool for learning NMAP where side-by-side you
can have in one browser window your NMAP scan and in another browser window
Wireshark protocol capture/decode of the scan.
  
---Ron Henderson
Co-Author of NST

<<attachment: winmail.dat>>


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org

Current thread: