Browsing the "Tools" Category

OpenDLP v0.2.3 released

December 21st, 2010 | by NJ Ouchn

OpenDLP is a free and open source, agent-based, centrally-managed, massively distributable data loss prevention tool released under the GPL. Given appropriate Windows domain credentials, OpenDLP can simultaneously identify sensitive data at rest on hundreds or thousands of Microsoft Windows systems from a centralized web application. OpenDLP has two components: a web application and an agent

LittleBlackBox v0.1.1: Breaking SSL on Embedded Devices

December 21st, 2010 | by NJ Ouchn

A lot of embedded devices provide HTTPS support so that administrators can administer the devices securely over untrusted networks. Some devices, such as SSL VPNs, center their entire functionality around SSL encryption. OK, well SSL isn

Focus on Bluetooth Penetration Testing Framework

December 21st, 2010 | by NJ Ouchn

Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994,[1] it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Today Bluetooth is managed by the Bluetooth Special Interest Group

exploitdb nmap script available

December 21st, 2010 | by NJ Ouchn

Here is a little script wrote by “L10n“. It searches the exploitdb archive for possible exploits. It is very verbose [&hellip

Common Weakness Scoring System (CWSS) v0.1 released

December 20th, 2010 | by NJ Ouchn

So for each weakness in the architecture, design, code or implementation that might be introduced into an application, which in some cases can contribute to a vulnerability within that software, we need to be able toreason and communicate about the relative importance of different weaknesses. For example, a buffer overflow vulnerability might arise from aweakness in which the programmer doesnot properly validate the length of an input buffer. This weakness only contributes to a vulnerability if the input buffer can be influenced by amalicious party, and the malicious buffer is copied toa smaller buffer

Spiceworks Update 5.0.60600 Now Available

December 20th, 2010 | by NJ Ouchn

Spiceworks is the complete network management & monitoring, helpdesk, PC inventory & software reporting solution to manage Everything IT in small and medium businesses

The Samurai Web Testing Framework v0.9.5 released

December 20th, 2010 | by NJ Ouchn

The Samurai Web Testing Framework is a LiveCD focused on web application testing. We have collected the top testing tools and pre-installed them to build the perfect environment for testing applications

Acunetix WVS Version 7 build 20101216 released

December 20th, 2010 | by NJ Ouchn

Acunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits your web applications by checking for exploitable hacking vulnerabilities. Automated scans may be supplemented and cross-checked with the variety of manual tools to allow for comprehensive web site and web application penetration testing

websecurify v0.8 Alpha 4 available

December 20th, 2010 | by NJ Ouchn

Websecurify is a powerful web application security testing environment designed from the ground up to provide the best combination of automatic and manual vulnerability testing technologies

Back to Top ↑