Network Security Toolkit 36 ​​has already been released and these are its news

After a year of development the launch of the new version of Network Security Toolkit 36 was announced, which has been updated its base to Fedora 36 along with the Linux kernel 5.18, in addition to including a series of improvements and especially updates and bug fixes.

For those who are unfamiliar with Network Security Toolkit, they should know that this is a distribution designed to analyze network security and monitor its operation. This Linux distribution includes a large selection of applications related to network securityFor example: Wireshark, NTop, Nessus, Snort, NMap, Kismet, TcpTrack, Etherape, nsttracroute, Ettercap, a network interface broadband monitor, an ARP Network Segment scanner, a session driver for VNC, a Terminal server based on WPA PSK and serial port minicom monitoring management.

For web developers, there is also a console in javascript that contains object library with functions that help the development of dynamic web pages. Many tasks that can be carried out within the HSM they are available through a user interface called the HSR GUI.

To manage the security verification process and call automation of various utilities, a special web interface has been prepared, which also integrates a web interface for the Wireshark network analyzer, in addition to the graphical environment of the distribution is based on FluxBox.

Main new features of Network Security Toolkit 36

In this new version that is presented, we will be able to find that the database of packages is synchronized with the version of Fedora 36, ​​along with which the Linux kernel 5.18 is involved and that they have been updated to the latest versions provided as part of the application.

As for the part of the changes that stand out from this new version, it stands out, for example, the redesigned access to OpenVAS vulnerability scanners (Open Vulnerability Assessment Scanner) and Greenbone GVM (Greenbone Vulnerability Management), which now run in a separate podman-based container.

Another of the changes that stands out in the new version is that a column with data on RTT (Round Trip Time) was added to the web interface for ARP scanning and the number of operations available was expanded, in addition to the fact that Provided better documentation.

Also noteworthy is now support for underscore-scoped DNS node leaf attribute names in the NST WUI dig application (eg, _spf.google.com).

On the other hand, it is also highlighted that a NIC selection control was added to the integrated widget of IPv4, IPv6 and hostname.

It is also mentioned that the legacy NST WUI sidebar navigation menu has been retired and as always the included networking and security applications have been updated to their latest version which can be found in the manifest.

Finally, if you want to know more about it, you can check the details In the following link.

Download Network Security Toolkit 36

For those who are interested in being able to test this distribution, they can obtain the iso image of the system which is only available in the x86_64 architecture and which has a size of 4.1 GB, from the following link.

You can save the image on a pendrive with the help of unetbootin which you can obtain from its official website or if you use a Linux distribution, you should know that most of them have the package in their repositories

To install from Debian and derivatives:

sudo apt-get install unetbootin

For Red Hat, CentOS, Fedora, or derivatives:

sudo yum install unetbootin

Finally in the case of Arch Linux:

sudo pacman -S install unetbootin

In addition, you should also know that there is a special repository for Fedora that allows you to install all the developments created within the NST project on an already installed system.


A comment, leave yours

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Mario said

    there is no link