Events Related:


  • Slides from CSI 2010 Posted –
    For those of you that didn’t attend, I spoke about lessons learned, hints and tips we’ve utilized during a deployment of an enterprise code scanning program at a large financial services institution.
  • Creating a Cyber Defense Team –
    New threats and new measures to counter them call for a reorganization of IT security teams so that they can focus on defending the organization from targeted attacks.


  • w3af: 1.0-rc4 is ready for you to download! –
    For the first time in the project’s life, we have a roadmap
    [0] , a prioritized backlog [1] and a structured development process we follow to deliver new features and fixing bugs.
  • SSLTest: A SSL Security Testing Tool! –
    SSLTest is an open source Perl script that is based off another similar tool – Cryptonark.
  • ZigBee ACL –
    One bug with the fixed MAC address utility that occurs after approximately 20 association packets are sent is a ‘Semantical Error’.
  • toolsmith: Confessor & Mole for IR & security analysis –
    We find these tools incredibly useful and are very pleased to be able to release them for public consumption as freely available and open source.
  • NessusDB v1.0 Release –
    The report templates are very extendable and generate as PDF’s.
  • The Social-Engineer Toolkit v1.0 “Devolution” Release –
    This version adds several key components including new attack vectors, a web GUI interface, a way to automate SET behavior, and a slew of bug fixes.


  • Adobe XML Injection Metasploit Module –
    So against a patched host or someone that has disabled the service in ColdFusion you’ll see one of two things; either 404’s for the checks or 200 for /flex2gateway/ and 500 for the http or https check.
  • Attacking Cisco Router over TCL –
    When you first log to Cisco router you are in user EXEC mode (level 1) from this mode you can have just some information such as interfaces status, view routes in the routing table.
  • Statistics Don’t Lie… Or Do They? –
    What particularly stands out about the EFTPS exploit toolkit is their admin interface.


  • Heads up… 0-day in an exploit kit –
    It’s fairly well known (well, well-known if you’re a security geek) that CVE-2010-3962 is in the Wild, but over the last couple of days, we’ve begun detecting it in the Eleonore Exploit Kit.

Vendor/Software Patches:

  • Flash Update Plugs 18 Security Holes –
    The new version is available from this link, but be aware that if you accept all of the default settings, the update may include additional software, such as a toolbar or anti-virus scanner.

Other News:

2017-03-12T17:40:03-07:00 November 7th, 2010|Security Conferences, Security Tools, Security Training, Security Vulnerabilities, Security Workshops, Vendor News|0 Comments

Share This Story, Choose Your Platform!

Leave A Comment