Tiger Unix Security Auditing Tool V.3.2.2 available
TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection.
OWASP WebGoat Version 5.0 released
WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application.
Oracle 11g cracker OrakelCrackert 1.00 released
OrakelCrackert is an Oracle 11g database password hash cracker using a
weakness in the Oracle password storage strategy. With Oracle 11g, case
sensitive SHA1 based hashing is introduced
Tcpdump 3.9.8 and LIBPCAP 0.9.8 released
Tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached
Snort 2.8.0 released
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba’s smbclient.
Saint Vulnerability Scanner V6.6.1 released
SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved.
Rootkit Hunter V1.3.0 in the wild
Rootkit scanner is scanning tool to ensure you for about 99.9%* you’re clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like:
ATK (Attack Tool Kit) re-activated and version 4.1 available
ATK stands for Attack Tool Kit. It was first developed to provide a very small and handy tool for Windows to realize fast checks for dedicated vulnerabilities. In the meanwhile it is a combination of security scanner (e.g. Nessus) and exploiting framework (e.g. MetaSploit)
SpiceWorks updated to version 1.7
Designed, tested and used by 120,000 IT pros in 185 countries. Spiceworks has the everyday IT features:
- Inventory and report on your company’s hardware and software assets automatically.
- Monitor and troubleshoot the hardware and software on your network.
- Run an IT Help Desk for your company that’s easy to use.
Saint Scanner Version 6.6 released
SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:
- Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
- Anticipate and prevent common system vulnerabilities.
- Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPP
Sara scanner updated to 7.4.2
The Security Auditor’s Research Assistant (SARA) is a third generation network security analysis tool that is:
Operates under Unix, Linux, MAC OS/X or Windows (through coLinux) OS’.
- Integrates the National Vulnerability Database (NVD).
- Can adapt to many firewalled environments.
- Support remote self scan and API facilities.
- Used for CIS benchmark initiatives
- Plug-in facility for third party apps
- CVE standards support (20040901)
- Enterprise search module
- Standalone or daemon mode
- Free-use open SATAN oriented license
- Updated twice a month (we try)
- User extension support
- Based on the SATAN model