Security-Database Blog

Paterva’s web based data mining changed name to Maltego.

Finally the promising data mining and fingerprinting software (maybe the best pentesters data mining tool ever) recovered from an excruciating end. As people that are using our tracking auditors tools service sent us a bunch of emails asking us why Evolution suddenly went off line.

Read More

OphCrack LiveCD updated to 1.2.2

Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well as on Linux

Read More

OpenSSH 4.7/4.7p1 released

OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.

Read More

SandCat version 3.1 available

Sandcat allows web administrators to perform aggressive and comprehensive scans of an organization’s web server to isolate vulnerabilities and identify security holes. The Sandcat scanner requires basic inputs such as host names, start URLs and port numbers to scan a complete web site and test all the web applications for security vulnerabilities

Read More

Acunetix web vulnerability scanner updated to 5.1 Build 70829

Acunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits your web applications by checking for exploitable hacking vulnerabilities. Automated scans may be supplemented and cross-checked with the variety of manual tools to allow for comprehensive web site and web application penetration testing.

Read More

Corsair Flash Padlock USB Flash Drive Review

For its first hardware review, Security-database focuses on a new secured USB Flash drive which confirms an increasing threat concern about users’ carried piece of data . Does Corsair achieve its goal? Is it really useful ? What are limitations , pros and cons ?

Read More

FireCAT (Firefox Catalog of Auditing exTensions) version 1.2 released

FireCAT is a Firefox Framework Map collection of the most useful security oriented extensions.

Read More

SpiceWorks 1.6 for inventory and monitoring network devices

Designed, tested and used by 120,000 IT pros in 185 countries. Spiceworks has the everyday IT features:

  • Inventory and report on your company’s hardware and software assets automatically.
  • Monitor and troubleshoot the hardware and software on your network.
  • Run an IT Help Desk for your company that’s easy to use.
Read More

Snort 2.8 Beta is out

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba’s smbclient.

Read More

OWASP DirBuster 0.98 available in CVS only

DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers.

Read More

Nmap Version 4.22SOC6 available

Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source (license).

Read More
... | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 |...