Netsparker Web Application Security Scanner

ToolsWatch is using Netsparker Web Application Security Scanner to identify vulnerabilities.


Rooted Warfare warfare_toolswatch

Published on May 5th, 2014 | by MaxiSoler

4

Rooted Warfare 2014 Spain Wrap-up Part 1

ToolsWatch was present at Rooted CON, the most important security conference in Spain to organize the Rooted Warfare, similar to the Black Hat Arsenal edition, allowing auditors, penetration testers and security experts present and show their tools to the community and interact with attendees.

PIC_0007

This time Rooted CON was held the 6, 7 and 8 March, being 7 and 8 with Rooted Warfare. To me (maxisoler) was amazing stay with the Spanish community, colleagues and friends, while others only knew through Twitter or blogs as Security By Default.

During these days were presented 12 amazing tools!

We will starting to publish videos and more pictures about it. :)

Schedule

Friday March 7

  • Dradis Framework: Dradis is an open-source framework to enable you to work efficiently by gathering information from different tools and presenting it in a variety of formats.
  • Favii: Favii is a multi-user platform for the acquisition, representation and knowledge management following the KISS principle. A Knowledge Management with Semantic Web technologies, integrates Favii mandatory policies, role-based (RBAC / MAC) for access and handling of the safety knowledge, and a powerful search engine.rootedcon2014_01
  • FruityWifi: FruityWifi is an open source tool for auditing wireless networks. It let you quickly and easily deploy advanced attacks using the web interface or by sending messages. Initially the application was created for use with a Raspberry -Pi , but can be installed on any Debian based system. FruityWifi include modules for added flexibility. These modules can be installed to add new functionality. Some of the modules available are urlsnarf, dnsspoof, Kismet, MDK3, ngrep, nmap, and sslstrip squid3 (with functionality to inject code), Captive Portal , and more.
  • Sinfonier: “Sinfonier: Storm Builder for Security Intelligence” is a web service created by Telefonica Digital which streamlines integration of open source data to deduct intelligence metadata. Telefonica Digital’s Sinfonier provides a human cloud of analysts with a secure and open environment, to graphically build high-level Apache Storm topologies, and execute and share them for a definable period of time.
  • GoLismero: GoLismero is an open source framework designed to perform security audits . Its main features are the ability to call external tools (such as nmap, OpenVAS, sqlmap, XSSer, Wfuzz, dnsrecon, Shodan, Punkspider, TheHarvester, Spiderfoot, sslscan…) regardless of the results, unify, mix and detect vulnerablidades repeated (found by different tools). In addition, it also has numerous tests.
  • HttpAuthCrack: HttpAuthCrack is a tool developed in Python to test credentials on sites and devices using HTTP Basic authentication type. To indicate the sites and devices to test, you can pass a list of IP addresses in a file, or you can use the result of a search Shodan having a “shodan dork” as an argument.rootedcon2014_02
  • ParameterFuzz: ParameterFuzz Web is an audit tool, intended for testing by a dictionary, the existence of parameters in the pages, where the HTML code of the same does not contain all of them. After the collection of parameters, it can exploit vulnerabilities of various types to easily identify security flaws.
  • Robots Rider: Robots Rider is a command line tool that unifies multiple external tools, in order to identify an interesting attack surface to start a pentest on a domain or a public list of URLs. It uses ‘theHarvester’ to get the full list of domains related to the domain that we want to attack.

 

rootedcon2014_03

Saturday March 8

  • peepdf: peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. With peepdf it’s possible to see all the objects in the document showing the suspicious elements, supports all the most used filters and encodings, it can parse different versions of a file, object streams and encrypted files.
    rootedcon2014_04
  • KOSAp: Koasp an installation package for Mac OS X systems to compile and install all those programs that are necessary for security audits and ethical hacking. They are organised into categories and there’s no need to recompile any software. This way, we can have a large number of Kali tools installed at the same time.
  • OSUETA: OSUETA stands for OpenSSH User Enumeration Timing Attack and is a small script written in Python to exploit a bug present in versions 5 . * and 6. * of OpenSSH . In these versions during the authentication process , you may obtain a list of users in the system discriminated by the time it takes the system to evaluate an arbitrarily long password.
  • ZAP: ZAP Proxy is a free and open source tool in continuous improvement. A very interesting aspect of ZAP is the API, that allows you to manipulate the tool with our own scripts.

 

Pictures from Rooted CON

More Infomation: Rooted Warfare

 

rootedcon2014_05
Jaime Sanchez
, Organizer at @RootedWarfare;
Maximiliano Soler (me), ToolsWatch Team;
Omar Benbouazza, Organizer at @RootedCON

Download Post in PDF Save Post as PDF

Tags: , ,


About the Author

ToolsWatcher. Collaborator of the Black Hat Arsenal Event.



4 Responses to Rooted Warfare 2014 Spain Wrap-up Part 1

  1. Jay says:

    Any chance for some links attached to those tools ? I tried googling for KOSAp or Koasp (which one is the actual name?) with no luck

  2. MaxiSoler says:

    We will post about them in the upcoming weeks. Just waiting for some official releases.
    Thanks,
    Max.

  3. tony says:

    + 1 for the link of “KOSAp”, thanks in advance

  4. Tony says:

    I am sorry to “bump” again, …any news for “KOSAp” ???

    Regards,

    Tony

Leave a Reply

Your email address will not be published. Required fields are marked *


*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Back to Top ↑