Security and Privacy Guidelines for the Internet of Things

Bruce Schneier has published a good collection of links to IoT security and privacy guidlines on his blog:

https://www.schneier.com/blog/archives/2017/02/security_and_pr.html

Advertisements

Compare-Object

Powershell makes it really easy to compare text-files, just use the following oneliner to compare two files:

Compare-Object -ReferenceObject (Get-Content c:pathtofile1.txt) -DifferenceObjet (Get-Content c:pathtofile2.txt)

Reference: https://technet.microsoft.com/en-us/library/ee156812.aspx

Essential penetration testing tools

I found a good blogpost that lists the most essential tools for penetration testing:
http://www.paladinsec.com/penetration-testing-tools-equipment/
To summarise the post, the following tools are a good start:
– Laptop
– Vulnerability scanner (OpenVAS, Nexpose, Nessus)
– Word processor (Word, Writer)
– Internet access
– Liability insurance
– Virtualization (VirtualBox, VMware, Hyper-V)
– Kali Linux and a virtual Windows PC
– Network cables and a switch