Security-Database Blog

Scapy 1.1.1 on the wild

Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.

Read More

MileSCAN version 1.0 : Rewrite of Paros Proxy

As you maybe noticed, Paros Proxy has not been updated since August 2006. In fact, Paros project has a big brother called MileSCAN.

Read More

Sara updated to 7.3.3

The Security Auditor’s Research Assistant (SARA) is a third generation network security analysis tool that is:

Read More

Saint Scanner updated to 6.4.3

SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:

  • Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
  • Anticipate and prevent common system vulnerabilities.
  • Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA
Read More

BlueDiving The Bluetooth pentesting suite version 0.7 get released

A Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack and has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and a L2CAP packetgenerator.

Read More

Sara Scanner 7.3.2 released

The Security Auditor’s Research Assistant (SARA) is a third generation network security analysis tool that is:

Read More

eEyes’s Blink goes free....for who ??

Blink Personal is the first Internet security solution to expose system and application flaws that currently go undetected and unpatched, even when using Microsoft Windows Update. Blink Personal is also the first Internet security solution to build all of these protection layers into a small, single agent footprint that breaks the ‘bloatware’ model of client security that exists in the market

Read More

Snort version 2.6.1.4 released

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba’s smbclient.

Read More

Saint Scanner updated to 6.4.2

SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:

  • Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
  • Anticipate and prevent common system vulnerabilities.
  • Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA
Read More

Sapyto SAP R/3 Pentest Tool

SAPYTO is a SAP Penetration Testing Framework. It enables security professionals to perform security assessments of different components of SAP R/3 deployments. Presented at Blackhat Europe 2007, it was shipped with many plugins to analyze the security of the RFC interface implementation of SAP systems. The plugin-based architecture enables users to develop their own plugins, extending functionality and allowing the framework to detect new vulnerabilities.

Read More

Cain and Abel version 4.8 released

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocol

Read More
... | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 |...