Seguraça

Article: Web Application Exploiter (WAppEx) v1.0 in the wild

WAppEx is an integrated platform for performing penetration testing and exploiting of web applications on Windows or Linux. It can automatically check for all type of security vulnerabilities in the given target and then let you to run various payloads to exploit and take advantages of the… http://www.toolswatch.org/2012/08/web-application-exploiter-wappex-v1-0/

BeEF The Browser Exploitation Framework v0.4.3.7 released

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security post… http://www.toolswatch.org/2012/08/beef-the-browser-exploitation-framework-v0-4-3-7-released/

BBQSQL v1.0.0 – The Blind SQL Injection Made Easy

Blind SQL injection can be a pain to exploit. When the available tools work they work well, but when they don’t you have to write something custom. This is time-consuming and tedious. BBQSQL can help you address those issues. BBQSQL is a blind SQL injection framework written in Python. It is ex… http://www.toolswatch.org/2012/08/bbqsql-v1-0-0-the-blind-sql-injection-made-easy/

The Bro Network Security Monitor v2.1 Public Beta available

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Key Features Adaptable Bro’s domain-specific scripting language enables site-specific monitoring policies. Efficient Bro targets high-performance networks and is used operationally at … http://www.toolswatch.org/2012/08/the-bro-network-security-monitor-v2-1-public-beta-available/

Matriux “Ec-Centric” v2.49 beta c0c0n 2012 Released

The Matriux is a phenomenon that was waiting to happen. It is a fully featured security distribution consisting of a bunch of powerful, open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administ… http://www.toolswatch.org/2012/08/matriux-ec-centric-v2-49-beta-c0c0n-2012-released/

Article: 10 Vulnerable Web Applications You Can Play With | Penetration Testing Laboratory | Online Training Courses – Learn Penetration Testing in Practice

Hey there web pentesting enthusiasts! For today’s post, I decided to share my very own lists of common vulnerable web applications that are built by man and tested by nature for web penetration testing and hacking: DVWA (Dam Vulnerable Web Application) – this vulnerable PHP/MySQL web app… http://pentestlab.org/10-vulnerable-web-applications-you-can-play-with/

Article: Blackhat Arsenal 2012 Releases: Oyedata v0.1 for OData Protocol Assessments

OData is a new data access protocol that is being adopted by many major software manufacturers such as Microsoft, IBM, and SAP but hasn’t been publically explored in terms of security. OData aims to provide a consistent access mechanism for data access from a variety of sources including but not … http://www.toolswatch.org/2012/08/blackhat-arsenal-2012-releases-oyedata-v0-1-for-odata-protocol-assessments/

Musings on Information Security: What you need to know about the vulnerabilities in MSCHAPv2

A post within the "straight to the meat" category : There was a talk at Defcon 20 entitled "Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2", by Moxie and David Hulton – the talk announced the implementation of a tool that reduced the security of MS-CHAPv2 to the strength of a single … http://blog.zoller.lu/2012/08/what-you-need-to-know-about.html

Transcript of Video – Flame is a move to Automated Cyber Espionage

We read in the papers the investigations around malware such as Stuxnet, Flame, Duqu and Mahdi. They are in the news daily with detailed code examples and methods of movement within the target information systems and devices. Anti-virus companies manage security firms and cyber security consultan… http://blogs.csoonline.com/security-industry/2295/transcript-video-flame-move-automated-cyber-espionage

Dr. Fu’s Security Blog: Malware Analysis Tutorial 31: Exposing Hidden Control Flow

Learning Goals: Practice WinDbg for Inspecting Kernel Data Structure • Use Packet Sniffer to Monitor Malware Network Activities • Understand Frequently Used Network Activities by Malware • Expose Hidden/Unreachable Control Flow of Malware Applicable to: Operating Syst… http://fumalwareanalysis.blogspot.kr/2012/08/malware-analysis-tutorial-31-exposing.html