Subscribe to Infosec Events
Infosec Events Feed Stay up to date with all of the latest security news by subscribing to our RSS Feed. Alternatively, you can have updates sent directly to your email address.

Week 17 in Review – 2010

Published: May 2nd, 2010 | Category: Hacking Contests, Security Conferences, Security Tools, Security Vulnerabilities, Security Workshops

Events Related:

Resources:

Tools:

  • FOCA v2.0.1 – informatica64.com
    FOCA 2 has a new algorithm which tries to discover as much info related to network infrastructure as possible.
  • Joedoc –  joedoc.org
    Joedoc is a novel automated runtime system for detecting exploits in applications running on end-user systems.
  • Bruter v1.0 – sourceforge.net/projects/worawita
    Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords.
  • Nessus Parsing Tools v1.3.1 – westcoasthackers.net
    A set of tools to parsing the results of a report.
  • WhatWeb v0.4.2 – morningstarsecurity.com
    Identifying content management systems (CMS), blogging platforms, stats/analytics packages, javascript libraries, servers and more.
  • PDFiD v0.0.11 – didierstevens.com
    I release a new PDFiD version to detect (and disarm) the /Launch action.
  • Bluebear: Exploring Privacy Threats in BitTorrent – www-sop.inria.fr
    The goal of this project is to explore the severity of the privacy threats faced by BitTorrent users.
  • OpenDLP v0.1 – code.google.com/p/opendlp/
    OpenDLP is a free and open source, agent-based, centrally-managed, massively distributable data loss prevention tool released under the GPL.
  • DAVTest: Quickly Test & Exploit WebDAV Servers – sunera.com
    When facing off against a WebDAV enabled server during a penetration test, there are two main things to find out: can you upload files, and if so, can you upload executable files?
  • Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 10 – irongeek.com
    What I’m attempting to do with Mutillidae is implement the OWASP Top 10 in PHP, and do it in such a way that it is easy to demonstrate common attacks to others.

Techniques:

Vulnerabilities:

Other News:

Be Sociable, Share!

    Tags: , , , ,

    RSS feed | Trackback URI

    1 Comment »

    Name (required)
    E-mail (required - never shown publicly)
    URI
    Your Comment (smaller size | larger size)
    You may use <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong> in your comment.

    Trackback responses to this post

    © Godai Group 2014
    Home - Calendar - Communities - Training - Archives - Contact