Santoku Beta – The New Mobile Forensics, Malware Analysis and App Security Testing Distro http://www.toolswatch.org/2012/08/exclusive-santoku-the-new-mobile-forensics-malware-analysis-and-app-security-testing/
Santoku Beta – The New Mobile Forensics, Malware Analysis and App Security Testing Distro http://www.toolswatch.org/2012/08/exclusive-santoku-the-new-mobile-forensics-malware-analysis-and-app-security-testing/
IP-Adress.com Proxy List | Whois Proxy List | IP-Adress.com http://www.stumbleupon.com/to/s/2G2GGi
Ultrasurf – Free Proxy-Based Internet Privacy and Security Tools http://www.stumbleupon.com/to/s/1aEBbS
An online password cracking service for penetration testers and network auditors who need to check the security of WPA protected wireless networks, crack password hashes, or break document encryption. Whether it’s a WPA2 network, NTLM hashes, Unix hashes, or an encrypted PDF file, one thing’s f… http://www.toolswatch.org/2012/08/cracking-passwords-hashes-goes-in-the-cloud-with-cloudcracker
Learning Goals: Practice WinDbg for Inspecting Kernel Data Structure • Use Packet Sniffer to Monitor Malware Network Activities • Understand Frequently Used Network Activities by Malware • Expose Hidden/Unreachable Control Flow of Malware Applicable to: Operating Syst… http://fumalwareanalysis.blogspot.kr/2012/08/malware-analysis-tutorial-32.html
Source: Talking Identity, 7th August 2012 An excellent example of how a seemingly unimportant Twitter hack can lead to more serious issues and fraud… http://www.thefraudtube.com/news-2/2012/08/15/anatomy-of-a-hack/
WATOBO is intended to enable security professionals to perform highly efficient (semi-automated ) web application security audits. We are convinced that the semi-automated approach is the best way to perform an accurate audit and to identify most of the vulnerabilities. Features http://www.toolswatch.org/2012/08/watobo-v0-9-10-released/
An online password cracking service for penetration testers and network auditors who need to check the security of WPA protected wireless networks, crack password hashes, or break document encryption. Whether it’s a WPA2 network, NTLM hashes, Unix hashes, or an encrypted PDF file, one thing’s f… http://www.toolswatch.org/2012/08/cracking-passwords-hashes-goes-in-the-cloud-with-cloudcracker/
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner… http://www.toolswatch.org/2012/08/networkminer-the-packet-analyzer-v1-4-released/ Sent via Flipboard
10.08.12 – A team of EPFL scientists has developed an algorithm that can identify the source of an epidemic or information circulating within a network, a method that could also be used to help with criminal investigations. Investigators are well aware of how difficult it is to t… http://actu.epfl.ch/news/rooting-out-rumors-epidemics-and-crime-with-math/