Security-Database Best IT Security Tools for 2009

The year 2009 was very intense of emotions, sadness, sorrows, and conflicts. The world as we knew or at least our parents did is changing so fast and unfortunately not in the right way.

The very bad economic situation, the stinky religions conflicts, the riots and wars, the increase of radical extremists and the policy of fear that the governments feed us are urging this earth to an excruciating end.

But instead of talking about politicians and their immature and childish job they are doing as spreading fear, making the wrong choices (as usual), wasting taxpayers money and time, dumping people into poverty, we’d prefer focusing into enumerating the great software and tools we’ve seen this year.

So, we are happy that 2009 is finally over and we expect the best for 2010.

— Security-Database Team

Scoring criteria

We’ve conducted this new survey on the basis on some criteria (as we did two years before).
Since the last survey (2007), we decided to add these new criteria:

  • Community support
  • Documentation
  • Popularity (Twitter followers)
Criteria Comment
AudienceEach tool has its target audience.
Community SupportTool has a community version with support and the appropriate documentation.
DocumentationAll documentation are easy to read and to understand and at least written in English. Wiki, blogs and other collaborative support are a must.
FeaturesBuilt-in, plug-in, functionalities, capabilities, use of APIs, interoperability with other systems.
MaintenanceFrequency of bugs fixing, generating new releases, nightly builds, beta testing.
PopularityThe popularity of the tool among the community, Twitter followers and average of visits and download based on our statistics for the year 2009.
ReportingSupport of charts, dashboard, exporting to multiple formats
Standards, Metrics & Open StandardsThe ability of the tool to map findings with Compliance, standards and open standards or to score vulnerability /
risks with metrics.

Standard and metrics could be: CVE, CVSS, CWE, CPE, CCE, OVAL, SCAP, CAPEC, ISO 2700x, NIST, PCI DSS...
UpdatesFrequency of updates: adding new features, new plug-in,
updating vulnerability database, updating techniques…


Open Source & Free Utilities

Penetration Tests and Ethical Hacking

- Winner Excellent Recommended (Promising)
Information GatheringMaltegoBinging
Network Scanners and DiscoveryNmap v5Ex æquo:
  • Netifera
  • AutoScan
Angry IP Scanner
Vulnerability ScannersEx æquo:
  • Nessus
  • NeXpose
Application ScannersW3AFSamurai WTFNikto
Wireless HackingOSWAAirCrack suiteAiroScript-NG
Live CDsBackTrack 4KatanaMatriux
Exploitation FrameworksMetasploit v3DB Exploit Website

Security Assessment

- Winner Excellent Recommended (Promising)
Windows AuditingOVAL interpreterNessus Local Plug-insSysinternals tools
Unix AuditingLynisCIS ScoringOpenSCAP
Firewall & Filtering DevicesNoneNoneNone
Application AssessmentBurpSuiteWebSecurifyCAT The manual web application
Wireless AuditingOSWAEx æquo:
  • Kismet
  • Kismac
ForensicsCAINEEx æquo:
  • Mobius
  • Process Hacker
Netwitness Free Edition
Datamining / logs managementSplunk community releaseDradis
IT ManagementSpiceWorksPaglo IT
Code analysisRatsGrauditMS
Password analysisEx æquo:
  • Cain & Abel
  • OphCrack
John the ripper
VoIP & Telephony auditingVAST ViperWarVox
Database auditingDb Audit Free editionEx æquo:
  • Pangolin
  • SQL Map


Commercial software

- Winner Excellent Recommended (Promising)
Vulnerability ManagementEx æquo:
  • Tenable Nessus
  • ProFeed
Ex æquo:
  • WebSaint
  • NeXpose Entreprise
  • Application Security assessmentEx æquo:
    • Acunetix
    • N-stalker
    IBM AppSCANNetsparker
    Patch ManagementGFI Languard NSSLumension EndPoint
    Penetration Testing and ExploitationCore ImpactSaintExploit


    Links and references

    Name Link
    Angry IP Scanner
    Samurai WTF
    Exploit DB
    AirCrack-NG Suite
    Backtrack 4
    Oval Interpreter
    Sysinternals suite
    CIS Scoring tools
    CAT The manual Web Application Audit
    Mobius Forensics Toolkit
    Process Hacker
    Netwitness Free Edition
    Splunk Community
    Spiceworks Community
    Paglo IT
    OWASP Code Crawler
    Cain & Abel
    John the Ripper
    DB Audit Free Edition
    SQL Map
    VAST Viper


    2009 Security news in brief

    What’s happened

    - Link
    Returns of The L0pht Industry
    VoIPScanner the first VoIP scanner As A Service
    Rapid7 acquires Metasploit
    Nmap v5.0 released
    Metasploit 3.x the best exploitation framework
    The attack of conficker
    Sara project retired
    Nessus turns to web with version 4.2
    OWASP Guide v3.0 released
    CWE/SANS top dangerous programming errors

    The idiot move

    Nipper the dog is retired from Sourceforge.

    The smart move

    Keeping Metasploit open source and even adding support of Nexpose from Rapid7.

    Security Hoax

    The death of Str0ke from milw0rm.

    The worst and shameless Internet innovation

    And the winner is France for HADOPI LAW.

    Big brother project of the year

    And the winner is France for HADOPI LAW.


    The Use of Awards Logos

    Congratulations for all winners. We have designed Award logos to use as advertising material on your websites or marketing campaigns. To grab the appropriate logo (winner, excellent or promising), just left click and download.

    Copyright © 2009

    Attached Documents

    Attached Pictures

    Winner Excellent Promising