Figure B Example of Sam Spade user interface. Figure C Graph using the fast traceroute function. Figure D Crawl Web tool. Figure E Port scanner. Figure F Selecting security tools in the Advanced tab. Editor's Picks. The best programming languages to learn in Check for Log4j vulnerabilities with this simple-to-use script. TasksBoard is the kanban interface for Google Tasks you've been waiting for. Paging Zefram Cochrane: Humans have figured out how to make a warp bubble.
Show Comments. Hide Comments. Although most of Sam Spade's features will run immediately upon installation, the more interesting and useful features require some minimal configuration. The configuration dialog box Figure 2 is accessible from the Edit, Options pulldown menu. Key features to configure are your default name server, e-mail address, and Web site on the Basics tab; the network news server on the News tab; and e-mail information for abuse e-mails on the Mail tab.
Users can also configure a time server Miscellaneous tab , log file locations Logfiles tab , and scripting file locations Scripting tab. Although most of Sam Spade's features will run immediately upon installation, some functions require configuration, including your default name server, e-mail address, Web site, network news server, time server, and log file locations. All of the functions become available when the user enters a host name, domain name, or e-mail address in the address window, seen at the upper left of the main console screen.
One of the advantages of this bundle of tools in one package is that once you enter a name or address, you can merely click on different tools to quickly obtain information.
The bulk of Sam Spade's utilities allow the user to look up information about a remote host or domain, generally for the purpose of initial reconnaissance or forensic analysis:. Several of the Sam Spade utilities are targeted at e-mail, allowing an end user or security administrator to determine the validity of e-mail header information as well as to fight back against spam. The program also provides an extensive tutorial on tracking and combating spam. These tools include:. Several Sam Spade tools allow a user to more closely examine the services available from another host, with particular attention to obtaining information about Web servers:.
I wanted to write about Sam Spade because it is one of the most common security tools that I use. It is versatile and it quickly provides a lot of the basic information that I need at the beginning of any analysis that I am going to do.
Sam Spade, however, is but one tool in my toolkit.
0コメント