Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits / LKMs or by another hidden technique.
// Unhide (ps)
Detecting hidden processes. Implements three techniques Compare /proc vs /bin/ps output Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning) Full PIDs space ocupation (PIDs bruteforcing)
// Unhide-TCP
Identify TCP/UDP ports that are listening but not listed in /bin/netstat doing brute forcing of all TCP/UDP ports (...)
Home > Security Tools
Security Tools
-
Unhide Processes Forensics v20100201 released
1 February 2010, by Tools Tracker Team -
Security-Database Vulnerability Dashboard v2.0 beta released
1 February 2010, by Tools Tracker TeamSecurity-Database provides a continuous IT vulnerability XML feed based on open security standards for classification, scoring, enumeration and exploitation. It also provides a well maintained repository for latest security and auditing tools and utilities. Security-database promotes Open Standards by supplying vulnerability alerts based on the following : CVE identifier number Brief description of the security vulnerability or exposure. Any pertinent references (i.e., vulnerability reports (...)
-
log2timeline v0.41 released - Logs Forensics
1 February 2010, by Tools Tracker Teamlog2timeline is a framework for artifact timeline creation and analysis. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a body file that can be used to create a timeline, using tools such as mactime from TSK, for forensic investigators.
GUI has been written in Perl-GTK2 for creating the timeline. Since the GUI is written in GtK2 it will not work on every OS. It (...) -
ISO/IEC 31010:2009 published
31 January 2010, by Tools Tracker TeamIEC 31010:2009 is a dual logo IEC/ISO, single prefix IEC, supporting standard for ISO 31000 and provides guidance on selection and application of systematic techniques for risk assessment. This standard is not intended for certification, regulatory or contractual use.
NOTE: This standard does not deal specifically with safety. It is a generic risk management standard and any references to safety are purely of an informative nature. Guidance on the introduction of safety aspects into IEC (...) -
ISO/IEC 27004:2009 published
31 January 2010, by Tools Tracker TeamISO/IEC 27004:2009 provides guidance on the development and use of measures and measurement in order to assess the effectiveness of an implemented information security management system (ISMS) and controls or groups of controls, as specified in ISO/IEC 27001.
See it online -
OWASP Code Crawler updated to v2.5.1
31 January 2010, by Tools Tracker TeamA tool aimed at assisting code review practitioners. It is a static code review tool which searches for key topics within .NET and J2EE/JAVA code. The aim of the tool is to accompany the OWASP Code review Guide and to implement a total code review solution for "everyone". Bug Fixed : Unhandled exception while opening a visual studio solution
-
Samhain updated to v2.6.2
31 January 2010, by Tools Tracker TeamThe samhain open source host-based intrusion detection system (HIDS) provides file integrity checking and logfile monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes.
It has been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also be used as standalone application on a single host.
Samhain is a multiplatform application (...) -
Netsparker - "Automate That" Release v1.1.5.0057
28 January 2010, by Tools Tracker TeamNetsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology they are built on, just like an actual attacker.
It can identify web application vulnerabilities like SQL Injection, Cross-site Scripting (XSS), Remote Code Execution and many more. It has exploitation built on it, for example you can get a reverse shell out of an identified SQL Injection or extract data via running custom SQL queries.
Netsparker has been (...) -
Two methodologies for physical penetration testing using social engineering
28 January 2010, by Tools Tracker TeamDuring a penetration test on the physical security of an organization, if social engineering is used, the penetration tester directly interacts with the employees.
These interactions are usually based on deception and if not done properly can upset the employees, violate their privacy or damage their trust towards the organization, leading to law suits and loss of productivity of the organization.
This paper proposes two methodologies for performing a physical
penetration test where the (...) -
WireShark v1.2.6 released
28 January 2010, by Tools Tracker TeamWireshark is the world’s most popular network protocol analyzer. It has a rich and powerful feature set and runs on most computing platforms including Windows, OS X, Linux, and UNIX. Network professionals, security experts, developers, and educators around the world use it regularly. It is freely available as open source, and is released under the GNU General Public License version 2
Wireshark 1.2.6 (stable) has been released. Installers for Windows, Mac OS X 10.5.5 and above (Intel and (...)