<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent posts to news</title><link>https://sourceforge.net/p/nst/news/</link><description>Recent posts to news</description><atom:link href="https://sourceforge.net/p/nst/news/feed.rss" rel="self"/><language>en</language><lastBuildDate>Sun, 01 Jun 2025 13:43:34 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/nst/news/feed.rss" rel="self" type="application/rss+xml"/><item><title>NST Version 42-14476 Released</title><link>https://sourceforge.net/p/nst/news/2025/06/nst-version-42-14476-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest &lt;a class="" href="https://www.networksecuritytoolkit.org" rel="nofollow"&gt;NST&lt;/a&gt; release: "NST 42 SVN:14476". This release is based on Fedora 42 using Linux Kernel: "kernel-6.14.8-300.fc40.x86_64". This release brings the NST distribution on par with &lt;a class="" href="https://fedoramagazine.org/announcing-fedora-linux-42/" rel="nofollow"&gt;Fedora 42&lt;/a&gt;.&lt;br/&gt;
This is mostly a maintenance release with improved NST WUI functionality. Below is a summary of some of the feature improvements included in this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The NST WUI Network Packet Capture pages have integrated &lt;a class="" href="https://www.ntop.org/products/deep-packet-inspection/ndpi/" rel="nofollow"&gt;ntop nDPI (Deep Packet Inspection)&lt;/a&gt; tools for post capture analysis. The image below: &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/images/nst42_nDPI_q_text_as_data.png" rel="nofollow"&gt;ntopng nDPI graphic and a q text as data query&lt;/a&gt; demonstrate example nDPI capabilities. The &lt;a class="" href="https://www.rgraph.net/" rel="nofollow"&gt;RGraph Charting Library&lt;/a&gt; is used to generate the nDPI graphic using output from the &lt;a class="" href="https://www.ntop.org/ndpi/how-to-use-ndpi-from-cli-to-analyse-network-traffic/" rel="nofollow"&gt;ndpiReader&lt;/a&gt; testing tool. The command line nDPI analysis displays packet protocols using the &lt;a class="" href="https://harelba.github.io/q/" rel="nofollow"&gt;q - Text as Data&lt;/a&gt; tool in an &lt;a class="" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php/HowTo_Use_The_NST_Shell_Command_Console" rel="nofollow"&gt;NST Shell Console&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a class="" href="https://www.ntop.org/products/traffic-analysis/ntop/" rel="nofollow"&gt;ntopng&lt;/a&gt; has be refactored and now is run as a &lt;a class="" href="https://www.docker.com/" rel="nofollow"&gt;docker&lt;/a&gt; container.&lt;/li&gt;
&lt;li&gt;Added a new NST WUI page for network speed testing: &lt;a class="" href="https://github.com/librespeed/speedtest" rel="nofollow"&gt;LibreSpeed&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Added a new NST WUI page for &lt;a class="" href="https://nodered.org/" rel="nofollow"&gt;Node-RED&lt;/a&gt; as a docker container. This design tool is for the creation of event-driven applications by wiring together hardware devices, APIs and online services in new and interesting ways.&lt;/li&gt;
&lt;li&gt;A new Environmental Science menu has been added featuring access to earth weather, space weather and earthquake seismology. An enhanced NST WUI page for viewing up to 4 simultaneous &lt;a class="" href="https://www.lightningmaps.org/blitzortung/america/index.php?bo_page=statistics&amp;amp;bo_show=station&amp;amp;bo_sid=1693&amp;amp;bo_page=statistics&amp;amp;bo_show=station&amp;amp;bo_sid=1693" rel="nofollow"&gt;Blitzortung Lightning Signals&lt;/a&gt; has also been developed.&lt;/li&gt;
&lt;li&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the &lt;a class="" href="http://www.networksecuritytoolkit.org/nst/log/manifest-42-14476.html" rel="nofollow"&gt;manifest&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Sun, 01 Jun 2025 13:43:34 -0000</pubDate><guid>https://sourceforge.netbdafa0e0ec320b2a04fffea3bfe18da6c0985154</guid></item><item><title>NST Version 40-13973 Released</title><link>https://sourceforge.net/p/nst/news/2024/05/nst-version-40-13973-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 40 SVN:13973". This release is based on Fedora 40 using Linux Kernel: "kernel-6.8.9-300.fc40.x86_64". This release brings the NST distribution on par with &lt;a class="" href="https://fedoraproject.org/en/" rel="nofollow"&gt;Fedora 40&lt;/a&gt;.&lt;br/&gt;
This is mostly a maintenance release with improved NST WUI functionality. Below is a summary of the feature improvements included in this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Access to the &lt;a class="" href="https://intel471.com/attack-surface-documentation" rel="nofollow"&gt;Spiderfoot&lt;/a&gt; reconnaissance tool that automatically queries over 100 public data sources (OSINT) to gather intelligence on IPv4 Addresses, Domain Names, E-mail Addresses, Names and more can be run as a &lt;a class="" href="https://www.docker.com/" rel="nofollow"&gt;docker&lt;/a&gt; container. The graphic: &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/images/nst40-spiderfoot-scan.png" rel="nofollow"&gt;Spiderfoot - NST 38 System Scan&lt;/a&gt; was a summary result to determine open exposed ports using this tool.&lt;/li&gt;
&lt;li&gt;Access to the &lt;a class="" href="https://metasploit.com/" rel="nofollow"&gt;Metasploit Framework&lt;/a&gt; (MSF) for developing and executing exploit code against a remote target machine can be run as a docker container.&lt;/li&gt;
&lt;li&gt;Added the &lt;a class="" href="https://www.portainer.io/" rel="nofollow"&gt;Portainer&lt;/a&gt; application, for docker container management, as a docker container.&lt;/li&gt;
&lt;li&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the &lt;a class="" href="http://www.networksecuritytoolkit.org/nst/log/manifest-40-13973.html" rel="nofollow"&gt;manifest&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Sun, 12 May 2024 17:14:16 -0000</pubDate><guid>https://sourceforge.net0a42da045f4a53f3705e7834c31af2c798a4e52f</guid></item><item><title>NST Version 38-13644 Released</title><link>https://sourceforge.net/p/nst/news/2023/07/nst-version-38-13644-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 38 SVN:13644". This release is based on Fedora 38 using Linux Kernel: "kernel-6.3.12-200.fc38.x86_64". This release brings the NST distribution on par with &lt;a class="" href="https://fedoraproject.org/" rel="nofollow"&gt;Fedora 38&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This is mostly a maintenance release with improved NST WUI functionality. Below is a summary of the feature improvements included in this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Access to the Open Vulnerability Assessment Scanner (&lt;a class="" href="https://www.openvas.org/" rel="nofollow"&gt;OpenVAS&lt;/a&gt;) and Greenbone Vulnerability Management (&lt;a class="" href="https://www.greenbone.net/" rel="nofollow"&gt;Greenbone&lt;/a&gt; GVM) has been refactored to run as a &lt;a class="" href="https://www.docker.com/" rel="nofollow"&gt;docker&lt;/a&gt; container providing the full-featured vulnerability scanner. The latest &lt;a class="" href="https://greenbone.github.io/docs/latest/index.html" rel="nofollow"&gt;Greenbone Community Edition&lt;/a&gt; container is used.&lt;/li&gt;
&lt;li&gt;An acceleration overlay and control was added to the geolocation of Dash Cam videos. See the graphic: &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/images/nst38-accel-geolocation.png" rel="nofollow"&gt;NST Map Data Layer - Dash Cam Track With Acceleration Overlay&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The NST WUI &lt;a class="" href="https://github.com/royhills/arp-scan" rel="nofollow"&gt;ARP Scan&lt;/a&gt; has been enhanced to support the configured Name Service (NS) switch hosts resolver. An article on NST WUI ARP Scan usage can be found &lt;a class="" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php/HowTo_Use_The_NST_WUI_arp-scan_Page_To_Quickly_Locate_Hosts" rel="nofollow"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the &lt;a class="" href="http://www.networksecuritytoolkit.org/nst/log/manifest-38-13644.html" rel="nofollow"&gt;manifest&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Sun, 23 Jul 2023 14:31:49 -0000</pubDate><guid>https://sourceforge.net25af605aa75bb2ef5ef1c26c151278cbb55be544</guid></item><item><title>NST Version 36-13232 Released</title><link>https://sourceforge.net/p/nst/news/2022/07/nst-version-36-13232-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 36 SVN:13232". This release is based on Fedora 36 using Linux Kernel: "kernel-5.18.10-200.fc36.x86_64". This release brings the NST distribution on par with &lt;a class="" href="https://fedoraproject.org/" rel="nofollow"&gt;Fedora 36&lt;/a&gt;.&lt;br/&gt;
This is mostly a maintenance release with improved NST WUI functionality. Below is a summary of the feature improvements included in this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Access to the Open Vulnerability Assessment Scanner (&lt;a class="" href="https://www.openvas.org/" rel="nofollow"&gt;OpenVAS&lt;/a&gt;) and Greenbone Vulnerability Management (&lt;a class="" href="https://www.greenbone.net/" rel="nofollow"&gt;Greenbone&lt;/a&gt; GVM) has been refactored to run as a &lt;a class="" href="https://podman.io/" rel="nofollow"&gt;podman&lt;/a&gt; container providing the full-featured vulnerability scanner. See the graphic below: &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/index.html#nst36release1_id" rel="nofollow"&gt;NST WUI page for the OpenVAS / GVM scanner&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Added a Round Trip Time (RTT) column to the NST WUI &lt;a class="" href="https://github.com/royhills/arp-scan" rel="nofollow"&gt;ARP Scan &lt;/a&gt; application. In addition, most options are now supported and better documentation has been provided. An article on NST WUI ARP Scan usage can be found &lt;a class="" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php/HowTo_Use_The_NST_WUI_arp-scan_Page_To_Quickly_Locate_Hosts" rel="nofollow"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Now supporting underscore scoped DNS Node Leaf Attribute Names in the NST WUI dig application (e.g., _spf.google.com).&lt;/li&gt;
&lt;li&gt;Added a NIC selection control to the embedded IPv4, IPv6 and Host Name widget.&lt;/li&gt;
&lt;li&gt;The legacy NST WUI sidebar navigation menu has been retired.&lt;/li&gt;
&lt;li&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the &lt;a class="" href="http://www.networksecuritytoolkit.org/nst/log/manifest-36-13232.html" rel="nofollow"&gt;manifest&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Mon, 11 Jul 2022 15:48:49 -0000</pubDate><guid>https://sourceforge.net1b93121c1fab751e364fb18352e2ea14aee6c716</guid></item><item><title>NST Version 34-12783 Interim Released</title><link>https://sourceforge.net/p/nst/news/2021/08/nst-version-34-12783-interim-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 34 SVN:12783". This release is based on &lt;a class="" href="https://fedoraproject.org/" rel="nofollow"&gt;Fedora 34&lt;/a&gt; using Linux Kernel: "kernel-5.13.07-200.fc34.x86_64".&lt;br/&gt;
This is an interim release that supports better handling of UEFI NST system installation and booting.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Sun, 08 Aug 2021 12:43:45 -0000</pubDate><guid>https://sourceforge.net1fc2688210ee76478304486267749ab33a121f13</guid></item><item><title>NST Version 34-12743 Released</title><link>https://sourceforge.net/p/nst/news/2021/06/nst-version-34-12743-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 34 SVN:12743". This release is based on Fedora 34 using Linux Kernel: "kernel-5.12.10-300.fc34.x86_64". This release brings the NST distribution on par with &lt;a class="" href="https://fedoraproject.org/" rel="nofollow"&gt;Fedora 34&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This is mostly a maintenance release with improved &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; functionality. Below is a summary of new tools and feature improvements included in this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a class="" href="https://pwhois.org/lft/" rel="nofollow"&gt;lft (Layer-4 (Four) Traceroute)&lt;/a&gt; utility has been integrated into the  &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;The  &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt;  &lt;a class="" href="https://www.ntop.org/products/traffic-analysis/ntop/" rel="nofollow"&gt;Ntopng&lt;/a&gt; implementation now supports the &lt;a class="" href="https://www.ntop.org/guides/ntopng/api/rest/index.html" rel="nofollow"&gt;Ntopng REST API&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The results from using the fast directory scanner: &lt;a class="" href="https://github.com/nccgroup/dirble/wiki/Help-Text" rel="nofollow"&gt;dirble&lt;/a&gt; can now be displayed in tabular format on its cooresponding  &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt;  page.&lt;/li&gt;
&lt;li&gt;Added a new &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; script: &lt;a class="" href="http://nst.sourceforge.net/nst/docs/scripts/etherapedump.html" rel="nofollow"&gt;etherapedump&lt;/a&gt; that dumps network resources from an &lt;a class="" href="https://etherape.sourceforge.io/" rel="nofollow"&gt;Etherape&lt;/a&gt; XML export.&lt;/li&gt;
&lt;li&gt;Automatic &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; page refresh to the &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; Start Page if the &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; system is rebooted from the &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Now indicating the network interface promiscuous state: enabled on its corresponding NIC Adapter Widget with a short purple dashed line (See the example: &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/index.html#nst34release1_id" rel="nofollow"&gt;NIC Adaptor Widget for Wired Ethernet Interface: lan0&lt;/a&gt;).&lt;/li&gt;
&lt;li&gt;Added predefined DHCP and SMB discovery scan options to the &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; Nmap page.&lt;/li&gt;
&lt;li&gt;Added a new DNS resolver utility: &lt;a class="" href="https://github.com/blechschmidt/massdns" rel="nofollow"&gt;massdns&lt;/a&gt; to the &lt;a class="" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Use_The_NST_Network_Tools_Widgets#Host_Name_Tools" rel="nofollow"&gt;NST Host Name Tools Widget&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The older style left-hand navigation menu has been removed from the &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; home page.&lt;/li&gt;
&lt;li&gt;A copy to the system clipboard action has been added to most &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; resultant table output areas.&lt;/li&gt;
&lt;li&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the &lt;a class="" href="http://www.networksecuritytoolkit.org/nst/log/manifest-34-12743.html" rel="nofollow"&gt;manifest&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Thu, 17 Jun 2021 12:08:05 -0000</pubDate><guid>https://sourceforge.net6ef338e4e190e4a01765c269527b2f8c9c2d4635</guid></item><item><title>NST Version 32-11992 Released</title><link>https://sourceforge.net/p/nst/news/2020/06/nst-version-32-11992-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 32 SVN:11992". This release is based on Fedora 32 using Linux Kernel: "5.6.15-300.fc32.x86_64". This release brings the NST distribution on par with Fedora 32.&lt;/p&gt;
&lt;p&gt;Here are some of the highlights for this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;A new &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; page for displaying &lt;a class="" href="https://www.wireshark.org/" rel="nofollow"&gt;Wireshark&lt;/a&gt; &lt;a class="" href="https://www.wireshark.org/docs/man-pages/tshark.html" rel="nofollow"&gt;tshark&lt;/a&gt; Statistics Conversations has been developed. This page focuses on displaying network conversations between two specific endpoints in tabular format and results can be further analyzed with the &lt;a class="" href="http://wiki.networksecuritytoolkit.org/nstwiki/index.php/HowTo_Use_The_NST_Network_Tools_Widgets" rel="nofollow"&gt;NST Network Tools Widgets&lt;/a&gt;. One can choose a Conversation Type and Display filter to isolate traffic of interest. The table output also contains the ability to create stream display filters for packet capture decode analysis. Many other actions and features can be found on this page.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Added a new &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; page for the next generation the &lt;a class="" href="https://www.kismetwireless.net/" rel="nofollow"&gt;Kismet Wireless Surveillance&lt;/a&gt; application. This new version features a massively rewritten code base, a new web UI, support for non-WiFi capture types, and much more.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;a class="" href="http://wiki.networksecuritytoolkit.org/nstwiki/index.php/NST_Network_Interface_Bandwidth_Monitor_2" rel="nofollow"&gt;NST Network Interface Bandwidth Monitor&lt;/a&gt; has been updated to version: 3. It now supports a new nodejs-based web socket interface to achieve higher query data rates. A new load archived monitor widget has also been integrated.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Added a new &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt;  page for fast directory scanning using &lt;a class="" href="https://github.com/nccgroup/dirble/wiki/Help-Text" rel="nofollow"&gt;dirble&lt;/a&gt;. A word list derived from &lt;a class="" href="https://digi.ninja/projects/cewl.php" rel="nofollow"&gt;CeWL&lt;/a&gt; has been integrated with the dirble page.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;a class="" href="http://wiki.networksecuritytoolkit.org/nstwiki/index.php/HowTo_Use_The_Scapy:_Multi-Traceroute_-_MTR" rel="nofollow"&gt;NST Multi-Traceroute&lt;/a&gt;: &lt;a class="" href="https://github.com/rwhalb/mtraceroute" rel="nofollow"&gt;mtraceroute&lt;/a&gt; application now integrates into the &lt;a class="" href="https://scapy.net/" rel="nofollow"&gt;scapy&lt;/a&gt; project. Minor enhancements / fixes has been made to the application.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Updated the &lt;a class="" href="https://github.com/laramies/theHarvester" rel="nofollow"&gt;theHarvester&lt;/a&gt; &lt;a class="" href="http://www.google.com/search?q=wiki+OSINT+Open%20Source%20Intelligence" rel="nofollow"&gt;OSINT&lt;/a&gt; application with supporting &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; page. This is an effective tool to be used in the early stages of a penetration test.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Added the &lt;a class="" href="https://www.cipherdyne.org/" rel="nofollow"&gt;fwknop&lt;/a&gt; application to the &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; distribution. fwknop stands for the FireWall KNock OPerator and implements an authorization scheme called Single Packet Authorization (&lt;a class="" href="http://www.google.com/search?q=wiki+SPA+Single%20Packet%20Authorization" rel="nofollow"&gt;SPA&lt;/a&gt;).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Added a new &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; page for the &lt;a class="" href="https://www.meshcommander.com/meshcommander" rel="nofollow"&gt;MeshCommander - Intel® AMT Remote Management&lt;/a&gt; application. This is an entirely web based remote management tool for &lt;a class="" href="https://en.wikipedia.org/wiki/Intel_vPro" rel="nofollow"&gt;vPro&lt;/a&gt; supported computers.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;a class="" href="https://github.com/flightaware/dump1090" rel="nofollow"&gt;Dump1090 - Aircraft Surveillance&lt;/a&gt; application has been integrated into the &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt;. One can view location information of all aircrafts broadcasting on their &lt;a class="" href="http://www.google.com/search?q=wiki+ADS-B+Automatic%20Dependent%20Surveillance%20-%20Broadcast" rel="nofollow"&gt;ADS-B&lt;/a&gt; Mode S transponder that has been detected by an attached &lt;a class="" href="http://www.google.com/search?q=wiki+RTL-SDR+Realtek%20Software%20Defined%20Radio%20Controller" rel="nofollow"&gt;USB RTL-SDR&lt;/a&gt; dongle.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A new &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt; page for image cropping has been integrated using the &lt;a class="" href="https://fengyuanchen.github.io/cropperjs/" rel="nofollow"&gt;Cropper.js&lt;/a&gt; javascript image cropper tool. This tool features a resizable grid layer on a given image allowing to visually resize and crop the image. It also allows one to move, zoom, rotate and scale images.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A copy to the system clipboard action has been sprinkled throughout the &lt;a class="" href="http://www.google.com/search?q=wiki+NST%20WUI+Network%20Security%20Toolkit%20Web%20User%20Interface" rel="nofollow"&gt;NST WUI&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/manifest-32-11992.html" rel="nofollow"&gt;manifest&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Sun, 07 Jun 2020 12:34:32 -0000</pubDate><guid>https://sourceforge.net83627a10158197bb2fb741173536b46d2a9d6ee4</guid></item><item><title>NST Version 30-11210 Released</title><link>https://sourceforge.net/p/nst/news/2019/07/nst-version-30-11210-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 30 SVN:11210". This release is based on Fedora 30 using Linux Kernel: "5.1.17-300.fc30.x86_64". This release brings the NST distribution on par with Fedora 30.&lt;/p&gt;
&lt;p&gt;Here are some of the highlights for this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; &lt;a class="" href="http://www.google.com/search?q=wiki+WUI+Web%20User%20Interface" rel="nofollow"&gt;WUI&lt;/a&gt; now supports geolocation of photos or videos that have embedded geotagged information. This provides the security professional with potential location and speed discovery when conducting a forensic analysis. The combination of using the &lt;a class="" href="https://sno.phy.queensu.ca/~phil/exiftool/" rel="nofollow"&gt;ExifTool&lt;/a&gt; utility for metadata extraction with the &lt;a class="" href="http://wiki.networksecuritytoolkit.org/nstwiki/index.php/NST_Mapping_Tools" rel="nofollow"&gt;NST Mapping Tools&lt;/a&gt; provides this geolocation capability.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; &lt;a class="" href="http://www.google.com/search?q=wiki+WUI+Web%20User%20Interface" rel="nofollow"&gt;WUI&lt;/a&gt;  Directory Browser page has been enhanced to facilitate the entry point for photo and video geolocation. At first, if many images appear to overlap at the same location on the Google Map, a &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/#nst30release1_id" rel="nofollow"&gt;thumbnail representation&lt;/a&gt; will be presented. One can then zoom in to provide better image location separation to reveal individual &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/index.html#nst30release2_id" rel="nofollow"&gt;photo&lt;/a&gt; or video detail. If a video image can be geolocated (e.g., One generated by a &lt;a class="" href="https://buy.garmin.com/en-US/US/p/567282" rel="nofollow"&gt;Garmin Dash Cam 55&lt;/a&gt;), one can view and control the video with a new &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/index.html#nst30release3_id" rel="nofollow"&gt;NST Map Data Layer Editor&lt;/a&gt; tool. This tool has many features including video frame segment location identification, speed colorization, measurement tools and video jump to control.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;a class="" href="http://wiki.networksecuritytoolkit.org/nstwiki/index.php/HowTo_Setup_A_Server_With_Multiple_Network_Interface_Adapters_Using:_%22nstnetcfg%22" rel="nofollow"&gt;nstnetcfg&lt;/a&gt; utility has been completely refactored to work with the &lt;a class="" href="https://en.wikipedia.org/wiki/NetworkManager" rel="nofollow"&gt;Network Manager&lt;/a&gt; service. Support for adding IPv4 / IPv6 secondary addressing has been included.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Added a new &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; &lt;a class="" href="http://www.google.com/search?q=wiki+WUI+Web%20User%20Interface" rel="nofollow"&gt;WUI&lt;/a&gt; page to find all domains hosted on a web server. This makes use of the &lt;a class="" href="https://www.yougetsignal.com/tools/web-sites-on-web-server/" rel="nofollow"&gt;Reverse IP Domain Check&lt;/a&gt; tool provided at the &lt;a class="" href="https://www.yougetsignal.com/" rel="nofollow"&gt;you get signal&lt;/a&gt; website.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Added a new &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; &lt;a class="" href="http://www.google.com/search?q=wiki+WUI+Web%20User%20Interface" rel="nofollow"&gt;WUI&lt;/a&gt; page for the presentation of the &lt;a class="" href="https://sno.phy.queensu.ca/~phil/exiftool/htmldump.html" rel="nofollow"&gt;ExifTool HtmlDump&lt;/a&gt; utility for exploring embedded &lt;a class="" href="https://en.wikipedia.org/wiki/Exif" rel="nofollow"&gt;Exchangeable Image File (Exif)&lt;/a&gt; format data found within an image.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Now building a &lt;a class="" href="https://dev.maxmind.com/geoip/geoip2/geolite2/" rel="nofollow"&gt;GeoLite2&lt;/a&gt; Country CSV (WhoIs) dataset for global host geolocation simulation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Many &lt;a class="" href="http://www.google.com/search?q=wiki+NST+Network%20Security%20Toolkit" rel="nofollow"&gt;NST&lt;/a&gt; &lt;a class="" href="http://www.google.com/search?q=wiki+WUI+Web%20User%20Interface" rel="nofollow"&gt;WUI&lt;/a&gt; bug fixes were completed and enhancements were added including and new NST Shell Administration console menu.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the &lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/manifest-30-11210.html" rel="nofollow"&gt;manifest&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="https://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Tue, 16 Jul 2019 16:21:28 -0000</pubDate><guid>https://sourceforge.netf805d2b11aaf4c1882ed4b476683034882260871</guid></item><item><title>NST Version 28-10439 Summer 2018 Interim Released</title><link>https://sourceforge.net/p/nst/news/2018/08/nst-version-28-10439-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 28 SVN:10439". This is a summer 2018 interim release which includes many bug fixes and is based on Fedora 28 using Linux Kernel: "4.17.17-200.fc28.x86_64". This release brings the NST distribution on par with the Fedora 28 latest updates.&lt;/p&gt;
&lt;p&gt;Here are some of the highlights and new tools added for this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A new NST WUI page was created to support the &lt;a class="" href="https://www.yougetsignal.com/" rel="nofollow"&gt;YouGetSignal&lt;/a&gt; reverse IPv4 Address domain lookup service. This service can be used to find all domains hosted on a web server.&lt;/li&gt;
&lt;li&gt;The &lt;a class="" href="https://testssl.sh" rel="nofollow"&gt;testssl.sh&lt;/a&gt; command line tool was added as an RPM package and integrated in to the NST distribution. This tool checks a server's service on any port for the support of TLS / SSL ciphers, certificates, protocols as well as recent cryptographic flaws and more.&lt;/li&gt;
&lt;li&gt;Many NST WUI bug fixes were completed and enhancements were added to the NST Shell Administration console menu and the IPv4 / IPv6 / Host Name Tool widgets.&lt;/li&gt;
&lt;li&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the manifest.&lt;/li&gt;
&lt;li&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="http://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Fri, 24 Aug 2018 23:34:18 -0000</pubDate><guid>https://sourceforge.netebac8a4c07e2343eaa899fa0a4be3373f64bc17c</guid></item><item><title>NST Version 28-10234 Released</title><link>https://sourceforge.net/p/nst/news/2018/07/nst-version-28-10234-released/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;We are pleased to announce the latest NST release: "NST 28 SVN:10234". This release is based on Fedora 28 using Linux Kernel: "4.17.3-200.fc28.x86_64". This release brings the NST distribution on par with Fedora 28.&lt;/p&gt;
&lt;p&gt;Here are some of the highlights for this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a class="" href="https://bammv.github.io/sguil/index.html" rel="nofollow"&gt;Sguil&lt;/a&gt;: The Analyst Console for Network Security Monitoring has been integrated into NST for access and display of realtime IDS events and raw packet captures. A new NST WUI page for &lt;a class="" href="http://www.networksecuritytoolkit.org/nst/index.html#nst28release1_id" rel="nofollow"&gt;Snort IDS Management&lt;/a&gt; is shown below with Sguil access. The new web-based &lt;a class="" href="http://www.networksecuritytoolkit.org/nst/index.html#nst28release2_id" rel="nofollow"&gt;Sguil RealTime Console&lt;/a&gt; is also depicted below using &lt;a class="" href="https://www.proofpoint.com/us/threat-insight/et-pro-ruleset" rel="nofollow"&gt;Proofpoint ET (Emerging Threats) Pro Rulesets&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A new Bluetooth Scan page was added to the NST WUI to help find nearby discoverable Bluetooth and BLE devices. You can use the Bluetooth Scan page under the Network|Wireless and Security|Active Scanners menus.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The high-speed network authentication cracking tool: &lt;a class="" href="https://nmap.org/ncrack/" rel="nofollow"&gt;Ncrack&lt;/a&gt; is used to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords is now part of the NST distribution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a class="" href="https://digi.ninja/projects/cewl.php" rel="nofollow"&gt;CeWL&lt;/a&gt;: A custom word list generator that spiders a given url to a specified depth, optionally following external links, and returns a list of words hich can then be used for password crackers such as &lt;a class="" href="http://www.openwall.com/john/" rel="nofollow"&gt;John the Ripper&lt;/a&gt; was added.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;a class="" href="https://sno.phy.queensu.ca/~phil/exiftool/" rel="nofollow"&gt;ExifTool&lt;/a&gt; Perl-based library and applications for reading and writing meta information in a wide variety of files, including the maker note information of many digital cameras by various manufacturers is such as Canon, Casio, DJI, FLIR, FujiFilm, GE, GoPro, HP, JVC/Victor, Kodak, Leaf, Minolta/Konica-Minolta, Nikon, Nintendo, Olympus/Epson, Panasonic/Leica, Pentax/Asahi, Phase One, Reconyx, Ricoh, Samsung, Sanyo, Sigma/Foveon and Sony is now included into NST.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;a class="" href="http://www.forensicswiki.org/wiki/Bulk_extractor" rel="nofollow"&gt;Bulk Extractor&lt;/a&gt; forensics tool that scans a disk image, a file, or a directory of files and extracts useful information without parsing the file system or file system structures was added to NST.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;New NST Mapping Tools shape conversion features are now available. These conversions allow for polyline, polygon, circle and rectangle drawing overlays to be converted from one shape to another. This allows for the creation of many different geometric shapes on Google Maps.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Many NST WUI bug fixes were completed and enhancements were added including and new NST Shell Administration console menu.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;As always, the networking and security applications included have been updated to their latest version which can be found in the &lt;a class="" href="http://www.networksecuritytoolkit.org/nst/log/manifest-28-10234.html" rel="nofollow"&gt;manifest&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;For more details related to the code changes for this release, refer to the "&lt;a class="" href="http://www.networksecuritytoolkit.org/nst/log/changelog.html" rel="nofollow"&gt;Change Log&lt;/a&gt;" page or review the change log for an individual RPM package.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ronald W. Henderson</dc:creator><pubDate>Mon, 02 Jul 2018 11:21:56 -0000</pubDate><guid>https://sourceforge.netbd41fd2a3cedc0ba7d8f90c7cef74c3e17d49e55</guid></item></channel></rss>