{"id":49248,"date":"2022-02-07T00:00:00","date_gmt":"2022-02-06T23:00:00","guid":{"rendered":"https:\/\/jotelulu.com\/blog\/5-tools-for-checking-your-network-security\/"},"modified":"2022-02-07T00:00:00","modified_gmt":"2022-02-06T23:00:00","slug":"5-tools-for-checking-your-network-security","status":"publish","type":"post","link":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/","title":{"rendered":"5 Tools for Checking Your Network Security"},"content":{"rendered":"<p>Today, we&rsquo;ll learn about some of the <strong>best network security tools&nbsp;<\/strong>that can help you to keep your infrastructure safe from attacks. Tools like&nbsp;<strong>TCPDump, WinDump, Nmap, Wireshark, Aircrack-ng<\/strong> and&nbsp;<strong>Kali Linux<\/strong> can all help you to carry out intrusion tests and make checking your network security easier.<\/p>\n<p>In the last few years, the <strong>number of cyberattacks has increased<\/strong>, particularly during the pandemic, when more and more people started working from home and businesses began to depend more on their IT systems to stay operational.<\/p>\n<p>However, despite this increased dependency and the increased exposure of SMEs to attacks, it is still safe to say that businesses have not increased their investment in the right infrastructure or expertise to protect themselves.&nbsp;<\/p>\n<p><img decoding=\"async\" data-recalc-dims=\"1\" src=\"https:\/\/i0.wp.com\/jotelulu.com\/en-gb\/wp-content\/uploads\/sites\/3\/2022\/10\/1_GrC3A1fica_Evolucion_Ataques_Pandemia.jpg?w=800&amp;ssl=1\" alt=\"Image. Graph showing the trend in DDoS attacks during the COVID-19 pandemic according to Microsoft.\"><\/p>\n<p>Image. Graph showing the trend in DDoS attacks during the COVID-19 pandemic according to Microsoft.<\/p>\n<p>This lack of investment is often due to the fact that most businesses are small or medium-sized&nbsp;enterprises (SMEs) that simply don&rsquo;t have a huge amount of capital to dedicate to such&nbsp;improvements and thus see themselves that much more exposed to these growing online threats.&nbsp;<\/p>\n<p>At Jotelulu, we are fully aware of this and are <strong>fully committed to helping our customers and partners<\/strong>. Therefore, we thought it would be useful to share with you a list of the best tools available for checking the security of your IT infrastructure.<\/p>\n<p>And better yet, all of these tools are free and simple to use.<\/p>\n<p>In reality, this article could actually be much longer, but we don&rsquo;t want to overdo things. Today, we&rsquo;ll take a look at the most interesting tools and provide you with links where you can find more information and learn about how they work.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Free Tools for Checking Your Network Security:<\/strong><\/h2>\n<p>Before we get started, we just want to take a moment to say that most of these are tools&nbsp;that tend to be used by the &lsquo;bad guys&rsquo;. Whilst this is unfortunate that there are people like this out there, it does at least mean that you will get a clear idea of where your security weaknesses are and what you need to improve.<\/p>\n<p>The tools that we will look at in this article are:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>TCPDump and&nbsp;WinDump.<\/strong><\/li>\n<li><strong>Nmap.<\/strong><\/li>\n<li><strong>Wireshark.<\/strong><\/li>\n<li><strong>Aircrack-ng.<\/strong><\/li>\n<li><strong>Kali Linux.<\/strong><\/li>\n<\/ol>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-recalc-dims=\"1\" title=\"\" src=\"https:\/\/i0.wp.com\/jotelulu.com\/en-gb\/wp-content\/uploads\/sites\/3\/2022\/10\/1_TCPDump20Logo.png?w=800&amp;ssl=1\" alt=\"\"><\/figure>\n<h3 class=\"wp-block-heading\"><strong>1. TCPDump y WinDump:<\/strong><\/h3>\n<p><strong><a href=\"https:\/\/www.tcpdump.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">TCPDump<\/a><\/strong>&nbsp;is a <strong>free program&nbsp;<\/strong>designed to <strong>analyse network traffic<\/strong>. It runs under a <strong>command-line interface&nbsp;<\/strong>and it is very powerful, allowing you to <strong>capture and display all traffic&nbsp;<\/strong>that passes through your network, <strong>showing packets&nbsp;<\/strong>sent and received.&nbsp;<\/p>\n<p>It works on the majority of UNIX-based operating systems, including, of course, GNU\/Linux. For&nbsp;Windows, there is an adapted version called&nbsp;<a href=\"https:\/\/www.winpcap.org\/windump\/default.htm\" target=\"_blank\" rel=\"noreferrer noopener\">WinDump<\/a>&nbsp;that requires WinPCAP to be installed first.<\/p>\n<p>The problem with these tools is that they use a <strong>command-line interface which can make them a little complicated&nbsp;<\/strong>to use if you are only an average user. So, if you&rsquo;re not an advanced IT user, we might recommend other tools instead. TCPDump is best left to more experienced&nbsp;technicians or&nbsp;for use on devices without a graphic interface, such as GNU\/Linux or&nbsp;Windows Server Core.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-recalc-dims=\"1\" title=\"\" src=\"https:\/\/i0.wp.com\/jotelulu.com\/en-gb\/wp-content\/uploads\/sites\/3\/2022\/10\/1207-Nmap20Logo.png?w=800&amp;ssl=1\" alt=\"\"><\/figure>\n<h3 class=\"wp-block-heading\"><strong>2. Nmap:<\/strong><\/h3>\n<p><strong><a href=\"https:\/\/nmap.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nmap<\/a><\/strong>&nbsp;is a multi-platform <strong>free tool&nbsp;<\/strong>that <strong>allows you to perform scans and audits of your network<\/strong>. It is quite a simple tool that works by <strong>sending a series of predefined packets <\/strong>to a range of IP addresses to <strong>check for open ports&nbsp;<\/strong>and then analyse each response to describe the services allocated to each one.<\/p>\n<p>Amongst its other <strong>functionalities,&nbsp;<\/strong>it also reports whether <strong>an IP address is available<\/strong>, which <strong>operating system&nbsp;<\/strong>is being used, which <strong>ports are open&nbsp;<\/strong>and what <strong>services&nbsp;<\/strong>it provides. This tool is very useful for <strong>checking which attack surfaces are exposed&nbsp;<\/strong>on a device.<\/p>\n<p>It is worth remembering that knowing a device&rsquo;s operating system and listening ports is useful when <strong>searching for vulnerabilities&nbsp;<\/strong>to exploit them later. This is why this tool is often used by cybercriminals when preparing an attack.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-recalc-dims=\"1\" title=\"\" src=\"https:\/\/i0.wp.com\/jotelulu.com\/en-gb\/wp-content\/uploads\/sites\/3\/2022\/10\/1206-Wireshark20logo.png?w=800&amp;ssl=1\" alt=\"\"><\/figure>\n<h3 class=\"wp-block-heading\"><strong>3. Wireshark:<\/strong><\/h3>\n<p><strong><a href=\"https:\/\/www.wireshark.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wireshark<\/a><\/strong> (previously&nbsp;Ethereal) is one of the most well-known and popular network security tools available. It is <strong>a packet analyser&nbsp;<\/strong>that will be known to anyone who has received training on Cisco Systems because it is used to learn how communications work and <strong>how TCP and UDP packets are put together<\/strong>.<\/p>\n<p>This tool <strong>allows you to see network traffic&nbsp;<\/strong>in the same way as TCPDump but without the complexity of using a command-line interface. Wireshark&nbsp;has a graphic user interface instead.<\/p>\n<p>When inspecting network traffic, you can encapsulate it and see the internal structure in great detail, helping you to detect a wide range of communications problems.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-recalc-dims=\"1\" title=\"\" src=\"https:\/\/i0.wp.com\/jotelulu.com\/en-gb\/wp-content\/uploads\/sites\/3\/2022\/10\/1205-Aircrack-ng20Logo.png?w=800&amp;ssl=1\" alt=\"\"><\/figure>\n<h3 class=\"wp-block-heading\"><strong>4. Aircrack-ng:<\/strong><\/h3>\n<p>In any list of network security tools, we obviously have to include <strong>wireless networks<\/strong>, and so it&rsquo;s time to look at <strong><a href=\"https:\/\/www.aircrack-ng.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Aircrack-ng<\/a><\/strong>.<\/p>\n<p>Aircrack-ng is a <strong>suite of wireless security tools&nbsp;<\/strong>that works on both Windows and GNU\/Linux systems. It allows you to <strong>analyse packets&nbsp;<\/strong>on wireless networks, extracting WEP, WPA and WPA2 passwords, amongst other things, making it a vital tool for strengthening your infrastructure and passwords.<\/p>\n<p>The tool works by collecting&nbsp;wireless packets and then using the most common cracking algorithms to extract passwords and keys. Furthermore, it includes tools used to inject packets in order to simulate an attack or a network overload.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-recalc-dims=\"1\" title=\"\" src=\"https:\/\/i0.wp.com\/jotelulu.com\/en-gb\/wp-content\/uploads\/sites\/3\/2022\/10\/1209-Kali20Linux20Logo.png?w=800&amp;ssl=1\" alt=\"\"><\/figure>\n<h3 class=\"wp-block-heading\"><strong>5. Kali Linux:<\/strong><\/h3>\n<p><strong><a href=\"https:\/\/www.kali.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kali Linux<\/a><\/strong>&nbsp;is a <strong>GNU\/Linux distribution&nbsp;<\/strong>design for <strong>penetration testing&nbsp;<\/strong>on networks and systems. It is not technically a tool, per s&eacute;, but a collection of tools. In fact, some of the tools we have already mentioned are included in Kali Linux. This GNU\/Linux distribution can be <strong>run from an executable, from a CD, from a USB stick or be installed on the system.&nbsp;<\/strong>It contains multiple tools designed for testing systems and networks. Despite being a GNU\/Linux distribution, it includes a graphic interface, as do the majority of the tools it contains, making it easier to use.<\/p>\n<p>Some of the tools included in Kali Linux are <strong>port scanners, password testers, web information collectors, vulnerability analysers, SQL injectors, etc.<\/strong><\/p>\n<p>Some of our readers might have noticed the absence of other tools like Nessus or Snort. Sadly, although these were previously free, they are no longer, so we have decided not to include them in this list. There are also some infrastructure monitoring tools that we have left out, such as Nagios, since this is not the focus of this article. But it&rsquo;s probably something that we will return to in the future.<\/p>\n<p>Aside from these useful network security tools, if you haven&rsquo;t already read the article entitled &ldquo;<a href=\"https:\/\/jotelulu.com\/blog\/5-herramientas-gratuitas-mas-utiles-para-administradores-de-sistemas-windows\" target=\"_blank\" rel=\"noreferrer noopener\">The 5 Most Useful Free Tools for Windows Systems Administrators&nbsp;(I)<\/a>&rdquo;, we recommend you take a look, particularly because it talks about tools like PsTools and TCPView that are really useful programs.<\/p>\n<p>We hope that you find all this information useful and that it helps you to improve your network security. We will return to this topic again in future articles, so stay tuned!<\/p>\n<p>Have a nice day!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, we&rsquo;ll learn about some of the best network security tools&nbsp;that can help you to keep your infrastructure safe from attacks. Tools like&nbsp;TCPDump, WinDump, Nmap, Wireshark, Aircrack-ng and&nbsp;Kali Linux can all help you to carry out intrusion tests and make checking your network security easier. In the last few years, the number of cyberattacks has [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1350,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[112,58],"tags":[],"class_list":["post-49248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comunicaciones-y-seguridad","category-recursos-sysadmin-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 Tools for Checking Your Network Security - Jotelulu<\/title>\n<meta name=\"description\" content=\"Today, we will learn about some of the best network tools that can help you checking your network security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Tools for Checking Your Network Security - Jotelulu\" \/>\n<meta property=\"og:description\" content=\"Today, we will learn about some of the best network tools that can help you checking your network security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Jotelulu\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-06T23:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jotelulu.com\/wp-content\/uploads\/2022\/05\/FrontalSeguridad-2_50-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juan Ignacio Oller Aznar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juan Ignacio Oller Aznar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/\"},\"author\":{\"name\":\"Juan Ignacio Oller Aznar\",\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/#\\\/schema\\\/person\\\/2ae97818cae086c48f108cd74234aca9\"},\"headline\":\"5 Tools for Checking Your Network Security\",\"datePublished\":\"2022-02-06T23:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/\"},\"wordCount\":1213,\"image\":{\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jotelulu.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/FrontalSeguridad-2_50-3.jpg\",\"articleSection\":[\"Comunicaciones y seguridad\",\"Recursos Sysadmin\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/\",\"url\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/\",\"name\":\"5 Tools for Checking Your Network Security - Jotelulu\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jotelulu.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/FrontalSeguridad-2_50-3.jpg\",\"datePublished\":\"2022-02-06T23:00:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/#\\\/schema\\\/person\\\/2ae97818cae086c48f108cd74234aca9\"},\"description\":\"Today, we will learn about some of the best network tools that can help you checking your network security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jotelulu.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/FrontalSeguridad-2_50-3.jpg\",\"contentUrl\":\"https:\\\/\\\/jotelulu.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/FrontalSeguridad-2_50-3.jpg\",\"width\":1280,\"height\":854},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/blog\\\/5-tools-for-checking-your-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Tools for Checking Your Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/#website\",\"url\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/\",\"name\":\"Jotelulu\",\"description\":\"Cloud Paradise for Tech Companies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/#\\\/schema\\\/person\\\/2ae97818cae086c48f108cd74234aca9\",\"name\":\"Juan Ignacio Oller Aznar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87efd80399b2c40a1d78dd5cee4e788d3f6c29d33e3b67bcfbc6abbf91d0fdcf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87efd80399b2c40a1d78dd5cee4e788d3f6c29d33e3b67bcfbc6abbf91d0fdcf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87efd80399b2c40a1d78dd5cee4e788d3f6c29d33e3b67bcfbc6abbf91d0fdcf?s=96&d=mm&r=g\",\"caption\":\"Juan Ignacio Oller Aznar\"},\"url\":\"https:\\\/\\\/jotelulu.com\\\/en-gb\\\/author\\\/juanignaciooller\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Tools for Checking Your Network Security - Jotelulu","description":"Today, we will learn about some of the best network tools that can help you checking your network security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/","og_locale":"en_GB","og_type":"article","og_title":"5 Tools for Checking Your Network Security - Jotelulu","og_description":"Today, we will learn about some of the best network tools that can help you checking your network security.","og_url":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/","og_site_name":"Jotelulu","article_published_time":"2022-02-06T23:00:00+00:00","og_image":[{"width":1280,"height":854,"url":"https:\/\/jotelulu.com\/wp-content\/uploads\/2022\/05\/FrontalSeguridad-2_50-3.jpg","type":"image\/jpeg"}],"author":"Juan Ignacio Oller Aznar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Juan Ignacio Oller Aznar","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/#article","isPartOf":{"@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/"},"author":{"name":"Juan Ignacio Oller Aznar","@id":"https:\/\/jotelulu.com\/en-gb\/#\/schema\/person\/2ae97818cae086c48f108cd74234aca9"},"headline":"5 Tools for Checking Your Network Security","datePublished":"2022-02-06T23:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/"},"wordCount":1213,"image":{"@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/jotelulu.com\/wp-content\/uploads\/2022\/05\/FrontalSeguridad-2_50-3.jpg","articleSection":["Comunicaciones y seguridad","Recursos Sysadmin"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/","url":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/","name":"5 Tools for Checking Your Network Security - Jotelulu","isPartOf":{"@id":"https:\/\/jotelulu.com\/en-gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/#primaryimage"},"image":{"@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/jotelulu.com\/wp-content\/uploads\/2022\/05\/FrontalSeguridad-2_50-3.jpg","datePublished":"2022-02-06T23:00:00+00:00","author":{"@id":"https:\/\/jotelulu.com\/en-gb\/#\/schema\/person\/2ae97818cae086c48f108cd74234aca9"},"description":"Today, we will learn about some of the best network tools that can help you checking your network security.","breadcrumb":{"@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/#primaryimage","url":"https:\/\/jotelulu.com\/wp-content\/uploads\/2022\/05\/FrontalSeguridad-2_50-3.jpg","contentUrl":"https:\/\/jotelulu.com\/wp-content\/uploads\/2022\/05\/FrontalSeguridad-2_50-3.jpg","width":1280,"height":854},{"@type":"BreadcrumbList","@id":"https:\/\/jotelulu.com\/en-gb\/blog\/5-tools-for-checking-your-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/jotelulu.com\/en-gb\/"},{"@type":"ListItem","position":2,"name":"5 Tools for Checking Your Network Security"}]},{"@type":"WebSite","@id":"https:\/\/jotelulu.com\/en-gb\/#website","url":"https:\/\/jotelulu.com\/en-gb\/","name":"Jotelulu","description":"Cloud Paradise for Tech Companies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jotelulu.com\/en-gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/jotelulu.com\/en-gb\/#\/schema\/person\/2ae97818cae086c48f108cd74234aca9","name":"Juan Ignacio Oller Aznar","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/87efd80399b2c40a1d78dd5cee4e788d3f6c29d33e3b67bcfbc6abbf91d0fdcf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/87efd80399b2c40a1d78dd5cee4e788d3f6c29d33e3b67bcfbc6abbf91d0fdcf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/87efd80399b2c40a1d78dd5cee4e788d3f6c29d33e3b67bcfbc6abbf91d0fdcf?s=96&d=mm&r=g","caption":"Juan Ignacio Oller Aznar"},"url":"https:\/\/jotelulu.com\/en-gb\/author\/juanignaciooller\/"}]}},"_links":{"self":[{"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/posts\/49248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/comments?post=49248"}],"version-history":[{"count":0,"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/posts\/49248\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/media\/1350"}],"wp:attachment":[{"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/media?parent=49248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/categories?post=49248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jotelulu.com\/en-gb\/wp-json\/wp\/v2\/tags?post=49248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}