Network Security Toolkit 34 Comes Based on Fedora 34, Linux 5.12, Support Enhancements, and More

After a year of development the launch of the new version of Network Security Toolkit 34 was announced, which has been updated its base to Fedora 34 along with the Linux kernel 5.12, in addition to including a series of improvements and especially updates and bug fixes.

For those who are unfamiliar with Network Security Toolkit, they should know that this is a distribution designed to analyze network security and monitor its operation. This Linux distribution includes a large selection of applications related to network securityFor example: Wireshark, NTop, Nessus, Snort, NMap, Kismet, TcpTrack, Etherape, nsttracroute, Ettercap, a network interface broadband monitor, an ARP Network Segment scanner, a session driver for VNC, a Terminal server based on WPA PSK and serial port minicom monitoring management.

For web developers, there is also a console in javascript that contains object library with functions that help the development of dynamic web pages. Many tasks that can be carried out within the HSM they are available through a user interface called the HSR GUI.

To manage the security verification process and call automation of various utilities, a special web interface has been prepared, which also integrates a web interface for the Wireshark network analyzer, in addition to the graphical environment of the distribution is based on FluxBox.

Main new features of Network Security Toolkit 34

As mentioned at the beginning in this new version the base of the system has been moved to Fedora 34, along with the kernel is Linux 5.12 which has been updated to the latest versions supplied as part of the application.

As for the specific changes in the parcel, we can find the new integrated web-based NST WUI utility lft (Alternative traceroute and whois utilities, which support different modes of tracing routes, including those based on TCP SYN / FIN and display information about autonomous systems.)

Also it is highlighted that the etherapedump NST script is included to extract network resources from Etherape XML files, in addition to providing visualization of the transfer status of network interfaces to "promiscuous" mode, allowing analysis of transit network frames that are not directed to the current system .

In the NST WUI section to work with Nmap, scan options were added to determine DHCP and SMB services and in the massdns utility to send DNS queries in batch mode it has been added to the NST Host Name Tools widget.

Of the other changes that stand out:

  • NST WUI adds support for Ntopng REST API.
  • NST WUI offers the ability to display the results of a quick directory scan in a tabular format.
  • Removed the old navigation menu from the main page of NST WUI, which was displayed in the left column.
  • In NST WUI, buttons to copy to clipboard have been added to pages with tabular reports

If you want to know more about it, you can check the details In the following link.

Download Network Security Toolkit 34

For those who are interested in being able to test this distribution, they can obtain the iso image of the system which is only available in the x86_64 architecture and which has a size of 4.8 GB, from the following link.

You can save the image on a pendrive with the help of unetbootin which you can obtain from its official website or if you use a Linux distribution, you should know that most of them have the package in their repositories

To install from Debian and derivatives:

sudo apt-get install unetbootin

For Red Hat, CentOS, Fedora, or derivatives:

sudo yum install unetbootin

Finally in the case of Arch Linux:

sudo pacman -S install unetbootin

In addition, you should also know that there is a special repository for Fedora that allows you to install all the developments created within the NST project on an already installed system.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.