Home page logo

pen-test logo Penetration Testing mailing list archives

Tools Update - last week of november 2009
From: "SD List" <list () security-database com>
Date: Sun, 29 Nov 2009 11:33:29 +0100 (CET)


Here is the site's newsletter "Security Database Tools Watch"
This letter summarizes the articles and news items published since 7 days.

We also announce 3 new features :

- Vulnerability Dashboard is fully integrated the OSVDB API. Now with each
CVE comes the available OSVDB entry(ies).

- Vulnerability Dashboard is now linking to SAINT Corporation Exploits.
When available, the CVE displays with CVSS, CPE, CAPEC, CWE, OVAL, OSVDB
and SaintExploit ID.

- ToolsWatch Process (6 categories : Vulnerability Scanner & Management,
Penetration testing & Ethical Hacking, IDS, Code Auditing, Application
Scanner) is now mapped with to the appropriate standard or regulation as
well as PCI DSS, GLBA, HIPAA, ISO 27001/27002, SOX, and FISMA

         New articles

** Eclipse HTTP Client (HTTP4e) v2.0 available **
by  Tools Tracker Team
- 28 November 2009

Eclipse HTTP Client (HTTP4e) is an Eclipse plugin formaking HTTP and
RESTful calls. Build with user experience in mind, it simplifies the
developer/QA job of testing Web Services, REST, JSON and HTTP. It is a
useful tool for your daily job of HTTP header tampering and hacking.


Making/Replaying an HTTP call directly from Eclipse IDE

Visual Editor Panels for headers, parameters and http packet body

Tabbed browsing (allowing replaying different RESTful, HTTP calls on
separate (...)


** History of Hacking - Part 1 **
by  Tools Tracker Team
- 28 November 2009

Every culture has its beginning somewhere, Computer hacking is no
exception. The History of Hacking video series is a 5 part documentary
which runs down memory lane and presents important figures, facts and
personalities of the Hacking culture. In History of Hacking Part 1, we will
look at Phone Phreaking and John Draper a.k.a Captain Crunch and try and
understand the string of events which molded the Phone Phreaking culture.

Those of you who have not heard of John, he is the guy who (...)


** Security Acts Magazine Issue 1 released **
by  Tools Tracker Team
- 27 November 2009

Security Acts is the challenge of producing a high-quality magazine for
profes- sionals in IT Security, which is made by and issued for the people
involved in IT Security. This online magazine is free of charge and will
finance itself through adverts.

In this 1st issue

AJAX makes applications more difficult to secure by Manu Cohen

AJAX is the new hot technology concerning web applications. It allows the
client to do much more than before and have a much better user experience.

An (...)


** vmap v0.7 released - identifying remotely daemons **
by  ToolsTracker
- 26 November 2009

vmap lets you remotely ident the version of a daemon. It currently works
for ftp, smtp, pop3, imap and http.

Version 0.7

Code cleanup

Fixed lots of bugs

Added support for nmap and amap logs

Added a "make install" (public dir is /usr/local/share/vmap)

Got rid of that damn rn-stuff, now every line ends just with n

How does it work?

Every daemon has it's own reply on commands. For example, the HELP command
sends different replies on different FTP daemons.

This can be (...)


** Slitaz Aircrack-ng Distribution v20091117 released **
by  ToolsTracker
- 26 November 2009

The “Slitaz Aircrack-ng Distribution” is the base Slitaz cooking
version plus the latest Aircrack-ng SVN version, wireless drivers patched
for injection and other related tools. The custom distribution is
especially tuned for the Acer Aspire One netbooks but will work well on
virtually all desktops, notebooks and netbooks.

Version November 17/2009

Updated aircrack-ng suite to 1.0 final including sqlite airolib-ng support

Updated all Slitaz packages as of November 16/2009. This is Slitaz (...)


** log2timeline v0.40 released **
by  ToolsTracker
- 26 November 2009

log2timeline is a framework for artifact timeline creation and analysis.
The main purpose is to provide a single tool to parse various log files and
artifacts found on suspect systems (and supporting systems, such as network
equipment) and produce a body file that can be used to create a timeline,
using tools such as mactime from TSK, for forensic investigators.

Version 0.40

[CFTL output] Fixed few bugs in the cftl.pm output module, didn't work in
the current CFTL version without these (...)


** Websecurify v0.4 released **
by  ToolsTracker
- 26 November 2009

Websecurify Security Testing Framework identifies web security
vulnerabilities by using advanced browser automation, discovery and fuzzing
technologies. The framework is written in JavaScript and successfully
executes in numerous platforms including modern browsers with support for
HTML5, xulrunner, xpcshell, Java, V8 and others.

What's New in Websecurify

better, more responsive UI

support for Workspaces

nicer looking tasks

netter reporting with ability to export to various formats (...)


** SAINT v7.2.1 released **
by  ToolsTracker
- 26 November 2009

SAINT is the Security Administrator’s Integrated Network Tool. It is
used to non-intrusively detect security vulnerabilities on any remote
target, including servers, workstations, networking devices, and other
types of nodes. It will also gather information such as operating system
types and open ports. The SAINT graphical user interface provides access to
SAINT’s data management, scan configuration, scan scheduling, and data
analysis capabilities through a web browser. Different aspects of (...)

-> http://www.security-database.com/toolswatch/SAINT-v7-2-1-released.html

** Graudit v1.4 released **
by  ToolsTracker
- 25 November 2009

Graudit is a simple script and signature sets that allows you to find
potential security flaws in source code using the GNU utility grep. It's
comparable to other static analysis applications like RATS, SWAAT and
flaw-finder while keeping the technical requirements to a minimum and being
very flexible.

Version 1.4

New and improved signatures

Graceful detection of grep version graudit /path/to/scan

The following options are available:

-h prints a short help text

-v prints version number (...)

-> http://www.security-database.com/toolswatch/Graudit-v1-4-released.html

** (updated) SHODAN - Computer Search Engine released **
by  Tools Tracker Team
- 25 November 2009

SHODAN lets you find servers/ routers/ etc. by using the simple search bar
up above. Most of the data in the index covers web servers at the moment,
but there is some data on FTP, Telnet and SSH services as well.

I've just looked upon the new search engine. My first impression was :
Holy s.., it could find a lot of buggy servers, websites, devices and so

But when playing again with google dorks (GHDB), it happens to look (hope
i'm not mistaken), that Shodan is a kind of GUI for (...)


** Acunetix WVS Version 6.5 build 20091124 released **
by  Tools Tracker Team
- 24 November 2009

Acunetix Web Vulnerability Scanner (WVS) is an automated web application
security testing tool that audits your web applications by checking for
exploitable hacking vulnerabilities. Automated scans may be supplemented
and cross-checked with the variety of manual tools to allow for
comprehensive web site and web application penetration testing

An updated build for Acunetix WVS Version 6.5 has been released with a
number of improvements, bug fixes, and most important of all, a good number
of (...)


** Focus on Pangolin SQL Injection Tool **
by  Tools Tracker Team
- 24 November 2009

Pangolin is an automatic SQL injection penetration testing tool developed
by NOSEC. Its goal is to detect and take advantage of SQL injection
vulnerabilities on web applications.

Once it detects one or more SQL injections on the target host, the user
can choose among a variety of options to perform an extensive back-end
database management system fingerprint, retrieve DBMS session user and
database, enumerate users, password hashes, privileges, databases, dump
entire or user's specific (...)


** OSSEC v2.3 BETA available  **
by  Tools Tracker Team
- 24 November 2009

OSSEC is a scalable, multi-platform, open source Host-based Intrusion
Detection System (HIDS). It has a powerful correlation and analysis engine,
integrating log analysis, file integrity checking, Windows registry
monitoring, centralized policy enforcement, rootkit detection, real-time
alerting and active respons

New features - v2.3

Added support for the Nginx web server.

Added support for Suhosin (Hardened PHP).

Added support for real time integrity monitoring on Windows systems

Added (...)


** Nmap 5.10BETA1 released  **
by  Tools Tracker Team
- 24 November 2009

Nmap ("Network Mapper") is a free open source utility for network
exploration or security auditing. It was designed to rapidly scan large
networks, although it works fine against single hosts. Nmap uses raw IP
packets in novel ways to determine what hosts are available on the network,
what services (application name and version) those hosts are offering, what
operating systems (and OS versions) they are running, what type of packet
filters/firewalls are in use, and dozens of other (...)


** Security-Database integrates OSVDB  **
by  Tools Tracker Team
- 23 November 2009

Security-Database provides a continuous IT vulnerability XML feed based on
open security standards for classification, scoring, enumeration and
exploitation. It also provides a well maintained repository for latest
security and auditing tools and utilities.

We are happy (again) to announce that we have fully integrated the OSVDB
API with our Vulnerability Crosslinker Engine.

Now with each CVE comes its appropriate OSVDB entry.

Here is an example. For this MS09-68 Microsoft bulletin, you (...)


** RISK IT Framework and Practitioner Guide published **
by  Tools Tracker Team
- 23 November 2009

The Risk IT Framework fills the gap between generic risk management
frameworks and detailed (primarily security-related) IT risk management
frameworks. It provides an end-to-end, comprehensive view of all risks
related to the use of IT and a similarly thorough treatment of risk
management, from the tone and culture at the top, to operational issues. In
summary, the framework will enable enterprises to understand and manage all
significant IT risk types, building upon the existing risk (...)


** "Compliance Mandates" feature added to ToolsWatch Process **
by  Tools Tracker Team
- 22 November 2009

ToolsWatch Process is a free service started by Security-Database in Sept
2006. ToolsWatch is tracking hundreds of software and utilities divided
into different categories.

We are happy to announce that we've just implemented a new feature called
"Compliance Mandatory". In fact, we took as basis for our work the
excellent reference SANS WhatWorks.

Now along with a category, we provide a mapping to the appropriate
standard or regulation as well as PCI DSS, GLBA, HIPAA, ISO 27001/27002,
SOX, (...)


** NetworkMiner updated to v0.91 **
by  Tools Tracker Team
- 22 November 2009

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows.
NetworkMiner can be used as a passive network sniffer/packet capturing tool
in order to detect operating systems, sessions, hostnames, open ports etc.
without putting any traffic on the network.

NetworkMiner can also parse PCAP files for off-line analysis and to
regenerate/reassemble transmitted files and certificates from PCAP files.

The purpose of NetworkMiner is to collect data (such as forensic evidence)
about (...)


** ISO 31000:2009 risk management standard released **
by  Tools Tracker Team
- 22 November 2009

ISO 31000:2009 provides principles and generic guidelines on risk

ISO 31000:2009 can be used by any public, private or community enterprise,
association, group or individual. Therefore, ISO 31000:2009 is not specific
to any industry or sector.

ISO 31000:2009 can be applied throughout the life of an organization, and
to a wide range of activities, including strategies and decisions,
operations, processes, functions, projects, products, services and assets.

ISO 31000:2009 can be (...)


** Process Hacker v1.7 released **
by  ToolsTracker
- 21 November 2009

Process Hacker is a free and open source process viewer and memory editor
with unique features such as powerful process termination and a Regex
memory searcher. It can show services, processes and their threads,
modules, handles and memory regions.

Version 1.7


#2873973 - "Columns window improvements"

New settings system - settings can now be saved anywhere

Decreased memory and CPU usage

Process Hacker probably runs on Windows 2000 now


#2880368 - "Highlight Option (...)


** Hyena v8.0 32-bit & 64-bit released **
by  ToolsTracker
- 21 November 2009

Hyena is a tool for day-to-day administration of Windows NT and Windows
XP/2000/2003 systems. Now Windows 7 too.

Hyena brings together all of the administrative tools from Windows NT such
as User Manager, Server Manager, and File Manager/Explorer, and many of the
MMC components from Windows 2000/2003 into a single, easy-to-use,
centralized program. Hyena arranges all system objects, such as users,
servers, and groups, in a hierarchical tree for easy and logical system
administration. (...)


         New news items

* Security-Database integrates OSVDB  *
- 23 November 2009

We are happy (again) to announce that we have fully integrated the OSVDB
API with our Vulnerability Crosslinker Engine.

Now with each CVE comes its appropriate OSVDB entry.

Here is an example. For this MS09-68 Microsoft bulletin, you have very
nice information:


CVSS v2.0


CAPEC (...)


* Mapping Tools with Standards and Regulations feature added *
- 22 November 2009

We are happy to announce that we've just implemented a new feature called
"Compliance Mandatory". In fact, we took as basis for our work the
excellent reference SANS WhatWorks.

Now along with a category, we provide a mapping to the appropriate
standard or regulation as well as PCI DSS, GLBA, (...)



CEO & Founder

Maximiliano Soler
ToolWatch Leader

This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified. 


  By Date           By Thread  

Current thread:
  • Tools Update - last week of november 2009 SD List (Nov 30)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]