Security-Database Blog

Tiger Unix Security Auditing Tool V.3.2.2 available

TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection.

Read More

OWASP WebGoat Version 5.0 released

WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application.

Read More

Oracle 11g cracker OrakelCrackert 1.00 released

OrakelCrackert is an Oracle 11g database password hash cracker using a
weakness in the Oracle password storage strategy. With Oracle 11g, case
sensitive SHA1 based hashing is introduced

Read More

Tcpdump 3.9.8 and LIBPCAP 0.9.8 released

Tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached

Read More

Snort 2.8.0 released

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba’s smbclient.

Read More

Saint Vulnerability Scanner V6.6.1 released

SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved.

Read More

Rootkit Hunter V1.3.0 in the wild

Rootkit scanner is scanning tool to ensure you for about 99.9%* you’re clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like:

Read More

ATK (Attack Tool Kit) re-activated and version 4.1 available

ATK stands for Attack Tool Kit. It was first developed to provide a very small and handy tool for Windows to realize fast checks for dedicated vulnerabilities. In the meanwhile it is a combination of security scanner (e.g. Nessus) and exploiting framework (e.g. MetaSploit)

Read More

SpiceWorks updated to version 1.7

Designed, tested and used by 120,000 IT pros in 185 countries. Spiceworks has the everyday IT features:

  • Inventory and report on your company’s hardware and software assets automatically.
  • Monitor and troubleshoot the hardware and software on your network.
  • Run an IT Help Desk for your company that’s easy to use.
Read More

Saint Scanner Version 6.6 released

SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:

  • Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
  • Anticipate and prevent common system vulnerabilities.
  • Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPP
Read More

Sara scanner updated to 7.4.2

The Security Auditor’s Research Assistant (SARA) is a third generation network security analysis tool that is:

Operates under Unix, Linux, MAC OS/X or Windows (through coLinux) OS’.

  • Integrates the National Vulnerability Database (NVD).
  • Can adapt to many firewalled environments.
  • Support remote self scan and API facilities.
  • Used for CIS benchmark initiatives
  • Plug-in facility for third party apps
  • CVE standards support (20040901)
  • Enterprise search module
  • Standalone or daemon mode
  • Free-use open SATAN oriented license
  • Updated twice a month (we try)
  • User extension support
  • Based on the SATAN model
Read More
... | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 |...