Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Ettercap serves as a powerful suite designed for executing man-in-the-middle attacks, equipped with capabilities like live connection sniffing, real-time content filtering, and various other intriguing functionalities. It allows for both active and passive analysis of numerous protocols while offering extensive features for evaluating networks and hosts. The source code for Ettercap is hosted on GitHub, utilizing a GIT repository for version control. To ensure you are aligned with the same code base as other contributors, follow the outlined steps meticulously. Once you have switched to the rc branch, you can start examining the ongoing development of the source code. Additionally, take a moment to explore our GitHub Wiki page, which offers a wealth of tips on utilizing Git and GitHub effectively to enhance your contributions. We welcome anyone interested in joining this project, as we strive to continually improve and maintain the quality of this premier MiTM tool. Collaboration and community input are vital to our mission of making Ettercap the best it can be.

Description

Ridgeback effectively thwarts attacks and neutralizes intruders before they can carry out their malicious activities. When a potential attacker tries to probe your network for vulnerabilities, Ridgeback intervenes to manipulate their actions, restrict their advantages, and impose penalties for their efforts. By actively engaging and thwarting these threats, Ridgeback can freeze or eject them from your network instantaneously. As a result, attackers are unable to identify critical network resources such as IP addresses and ports. Any weaknesses they might exploit for network discovery are swiftly sealed off, rendering them ineffective. Furthermore, their communications both within and outside the network are interrupted, and their unauthorized movements are promptly immobilized. Uniquely, Ridgeback aligns its operational strategies with the cyber defense principles outlined by the United States Cyberspace Solarium Commission. By doing so, it ensures that the costs associated with attacking a network protected by Ridgeback are prohibitively high, making such efforts impractical and significantly lowering the overall expenses of maintaining defense. Ultimately, Ridgeback transforms cybersecurity into a proactive and strategic defense mechanism rather than a reactive one.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Travis CI

Integrations

Travis CI

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Ettercap

Country

United States

Website

www.ettercap-project.org

Vendor Details

Company Name

Ridgeback Network Defense

Founded

2014

Country

United States

Website

ridgebacknet.com

Product Features

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

OnDMARC Reviews

OnDMARC

Red Sift

Alternatives

Secure My Files Reviews

Secure My Files

SecuSimple
Quantum Armor Reviews

Quantum Armor

Silent Breach
MailWasher Pro Reviews

MailWasher Pro

Firetrust
Infiltrator Reviews

Infiltrator

Infiltration Systems
Themis Reviews

Themis

Cossack Labs