iKAT was designed to aid security consultants with the task of auditing the security of internet Kiosk software and deployed Kiosk terminals.
iKAT is designed to provide access to the underlying operating system of a Kiosk terminal by invoking native OS functionality.
This web based security plateforms is divided into 7 categories each with a bunch of utilities and tools.
Fact : I crashed my Firefox 3.0.3 with this test Ikat Tools
Tool submitted by Kevin Orrey from (...)
Home > Security Tools
Security Tools
-
iKat V1.0 Pentest Kiosk terminals
28 September 2008, by Tools Tracker Team -
Cain & Abel v4.9.22 released
24 September 2008, by Tools Tracker TeamCain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocol All Dumper’s DLL Injection functions have been rewritten to directly use (...)
-
Helix 2.0 released
24 September 2008, by Tools Tracker TeamHelix is a customized distribution of Ubuntu Linux. Helix is more than
just a bootable live CD. You can still boot into a customized Linux
environment that includes customized linux kernels, excellent hardware
detection and many applications dedicated to Incident Response and
Forensics.
Helix has been modified very carefully to NOT touch the host computer
in any way and it is forensically sound. Helix wil not auto mount swap
space, or auto mount any attached devices. Helix also (...) -
Cain & Abel v4.9.21 released
16 September 2008, by Tools Tracker TeamCain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocol
Changes : All Dumper’s DLL Injection functions have been rewritten to (...) -
WireShark 1.1.0 Development Release
15 September 2008, by Tools Tracker TeamWireshark® is the world’s most popular network protocol analyzer. It has a rich and powerful feature set and runs on most computing platforms including Windows, OS X, Linux, and UNIX. Network professionals, security experts, developers, and educators around the world use it regularly. It is freely available as open source, and is released under the GNU General Public License version 2
Wireshark 1.1.0 has been released. Installers for Windows, Mac OS X Intel 10.5, and source code is now (...) -
ISR-evilgrade v1.0.0 : The Fake update manipulator
13 September 2008, by Tools Tracker TeamEvilgrade is a modular framework that allow us to take advantage of poor upgrade implementations by injecting fake updates. It works with modules, each module implements the structure needed to emulate a false update of specific applications/systems. Evilgrade needs the manipulation of the victim dns traffic.
Attack vectors:
Internal scenary: Internal DNS access ARP spoofing DNS Cache Poisoning DHCP spoofing
External scenary: Internal DNS access DNS Cache Poisoning
What are the (...) -
AutoScan for Windows and Linux 1.32 released
13 September 2008, by Tools Tracker TeamAutoScan-Network is a network discovering and managing application. No configuration is required to scan your network. The main goal is to print the list of connected equipments in your network.
Features: Multithreaded Scan Automatic network discovery Low surcharge on the network Simultaneous subnetworks scans without human intervention Realtime detection of any connected equipment Supervision of any equipment (router, server, firewall...) Supervision of any network service (smtp, http, (...) -
New SysInternals Utility : CoreInfo v1.0 released
12 September 2008, by Tools Tracker TeamCoreinfo is a new command-line utility that shows you the mapping between logical processors and the physical processor, NUMA node, and socket on which they reside, as well as the cache’s assigned to each logical processor.
-
Tiger Unix Security tool updated to 3.2.3
12 September 2008, by Tools Tracker TeamTIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection.
A new version of Tiger (3.2.3) has been released. This version is mainly a bug fix release that incorporates all the fixes introduced in Debian since the 3.2.2 release.
Changes for this new release SECURITY FIX: Fix a temporary race (...) -
Nmap & Zenmap v4.75 released
8 September 2008, by Tools Tracker TeamNmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other (...)