GET YOUR VULNERABILITY AND THREAT DATABASE SUBSCRIPTION
EKOLABS 2016


A complete guide to securing a website

December 18th, 2010 | by NJ Ouchn

To secure a website or a web application, one has to first understand the target application, how it works and the scope behind it. Ideally, the penetration tester should have some basic knowledge of programming and scripting languages, and also web security.


PacketFence v2.0.0 released

December 17th, 2010 | by NJ Ouchn

PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system


JavaSnoop v1.0 Final available

December 17th, 2010 | by NJ Ouchn

A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer


NIST releases Special Publication 800-137

December 17th, 2010 | by NJ Ouchn

NIST announces the release of Draft Special Publication 800-137 (initial public draft), Information Security Continuous Monitoring for Federal Information Systems and Organizations


CSA Cloud Controls Matrix V1.1 is Released

December 17th, 2010 | by NJ Ouchn

The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider


Cisco IOS Penetration Testing with Metasploit

December 17th, 2010 | by NJ Ouchn

Source: Blog Rapid7 The Metasploit Framework and the commercial Metasploit products have always provided features for assessing the security of network devices. With the latest release, we took this a step further and focused on accelerating the penetration testing process for Cisco IOS devices


ProcDump v3.01 released

December 17th, 2010 | by NJ Ouchn

ProcDump is a command-line utility whose primary purpose is monitoring an application for CPU spikes and generating crash dumps during a spike that an administrator or developer can use to determine the cause of the spike



Back to Top ↑