Toolswatch Team NJ OUCHN & MJMJ SOLERSOLER Tools! Lots of Tools Released!

Total Page:16

File Type:pdf, Size:1020Kb

Toolswatch Team NJ OUCHN & MJMJ SOLERSOLER Tools! Lots of Tools Released! Newsletter - May 2014 ToolsWatch Team NJ OUCHN & MJMJ SOLERSOLER Tools! Lots of Tools Released! During May 2014, we published 33 Posts with 13 News Tools. Organized by Date • Cuckoo Sandbox v1.1 Released • SpiderFoot v2.1.5 Released • SAMHAIN v3.1.1 Released • WPScan v2.4 Released • w3af v1.6 Released • Tor Browser v3.6 Released • Arachni v0.4.7 – Web User Interface v0.4.4 Released • Tails v1.0 – The Amnesic Incognito Live System Released • Lynis v1.5.2 Auditing Tool Released • Nmap v6.46 Released • IPv6 Toolkit v1.5.3 Released • [New Tool] QuatraScan V3000 Web Application Vulnerability Scanner (SaaS) Released • [New Tool] Inception v0.3.5 Beta – Attacking FireWire Devices Released • [New Tool] Parsero v0.71 – Attacking Robots.txt Files Released • [New Tool] DepDep v1.0 Determine Critical Data In Network Sharing – Released • [New Tool] RedoWalker Beta Version Released • [New Tool] argus v3.0.6 – Real Time Flow Monitor Released • [New Tool] Tastic RFID Thief – Proximity Badge Released • Hook Analyser v3.1 Released • Desenmascara.me (unmaskme) PoC Security Awareness Web • APK Binder Script v0.1 Released • NTO Mobile On-Demand Service Released • oclHashcat v1.21 Released • [New Tool] Interactive Network Packet Builder v1.0 • Kali Linux v1.0.7 Released • p0f v3.07b Released • [New Tool] Webfwlog Firewall Log Analyzer v1.0 Released • [New Tool] OWASP PCI Toolkit Beta Version Released • [New Tool] OWASP OWTF – Offensive (Web) Testing Framework v0.45.0 Released • OWASP ZAP v2.3.1 Released • ThreadFix v2.1M1 Released • [New Tool] ByWaf v1.0 – Web Application Penetration Testing Framework Released • [New Tool] Big Iron Recon & Pwnage (BIRP) for Mainframe Released Cuckoo Sandbox v1.1 Released Cuckoo Sandbox is a malware analysis system. It simply means that you can throw any suspicious file at it and in a matter of seconds Cuckoo will provide you back some detailed results outlining what such file did when executed inside an isolated environment. http://www.toolswatch.org/?p=44036 SpiderFoot v2.1.5 Released SpiderFoot is a free, open-source footprinting tool, enabling you to perform various scans against a given domain name in order to obtain information such as sub-domains, e-mail addresses, owned netblocks, web server versions and so on. The main objective of SpiderFoot is to automate the footprinting process to the greatest extent possible, freeing up a penetration tester's time to focus their efforts on the security testing itself. SpiderFoot has written in Python and runs on Linux, *BSD and Windows. http://www.toolswatch.org/?p=44048 SAMHAIN v3.1.1 Released The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes. http://www.toolswatch.org/?p=44055 WPScan v2.4 Released WPScan is a black box WordPress vulnerability scanner. http://www.toolswatch.org/?p=44062 w3af v1.6 Released w3af, is a Web Application Attack and Audit Framework. The w3af core and its plugins are fully written in python, it identifies more than 200 vulnerabilities and reduce your site's overall risk exposure. Identify vulnerabilities like SQL Injection, Cross-Site Scripting, Guessable credentials, unhandled application errors and PHP misconfigurations. http://www.toolswatch.org/?p=44091 Tor Browser v3.6 Released The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. http://www.toolswatch.org/?p=44106 Arachni v0.4.7 – Web User Interface v0.4.4 Released Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. http://www.toolswatch.org/?p=44115 Tails v1.0 – The Amnesic Incognito Live System Released Tails, The Amnesic Incognito Live System, is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. http://www.toolswatch.org/?p=44117 Lynis v1.5.2 Auditing Tool Released Lynis is an auditing tool which tests and gathers (security) information from Unix based systems. The audience for this tool are security and system auditors, network specialists and system maintainers. http://www.toolswatch.org/?p=44121 Nmap v6.46 Released Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for network inventory, managing service upgrade schedules, monitoring host or service uptime, and many other tasks. http://www.toolswatch.org/?p=44128 IPv6 Toolkit v1.5.3 Released A security assessment and troubleshooting tool for the IPv6 protocols. http://www.toolswatch.org/?p=44144 [New Tool] QuatraScan V3000 Web Application Vulnerability Scanner (SaaS) Released QuatraScan is a next generation Security as a Service platform provides you with advanced website application security. It discovers, catalogs and scan vast numbers of web applications to ensure the highest level of protection against vulnerabilities and intrusion. http://www.toolswatch.org/?p=44146 [New Tool] Inception v0.3.5 Beta – Attacking FireWire Devices Released Inception is a FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP-2 DMA. The tool can unlock (any password accepted) and escalate privileges to Administrator/root on almost* any powered on machine you have physical access to. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. http://www.toolswatch.org/?p=44149 [New Tool] Parsero v0.71 – Attacking Robots.txt Files Released Parsero is a free script written in Python which reads the Robots.txt file of a web server and looks at the Disallow entries. The Disallow entries are the URL path of directories or files hosted on a web server which the administrators don't want to be indexed by the crawlers. http://www.toolswatch.org/?p=44163 [New Tool] DepDep v1.0 Determine Critical Data In Network Sharing – Released Depdep is a merciless sentinel which will seek sensitive files containing critical info leaking through your network. Basically, it is a fast and practical sensitive data search tool maintaining personal & commercial data privacy for companies and institutions. http://www.toolswatch.org/?p=44179 [New Tool] RedoWalker Beta Version Released RedoWalker is a tool to explore Oracle database transaction logs, otherwise known as redo logs. Any time changes are made to the database server, for example after an INSERT, DELETE or UPDATE, they are recorded in the redo log. http://www.toolswatch.org/?p=44243 [New Tool] argus v3.0.6 – Real Time Flow Monitor Released Argus is a fixed-model Real Time Flow Monitor designed to track and report on the status and performance of all network transactions seen in a data network traffic stream. Argus provides a common data format for reporting flow metrics such as connectivity, capacity, demand, loss, delay, and jitter on a per transaction basis. The record format that Argus uses is flexible and extensible, supporting generic flow identifiers and metrics, as well as application/protocol specific information. http://www.toolswatch.org/?p=44288 [New Tool] Tastic RFID Thief – Proximity Badge Released The Tastic RFID Thief is a silent, long-range RFID reader that can steal the proximity badge information from an unsuspecting employee as they physically walk near this concealed device. Specifically, it is targeting 125KHz, low frequency RFID badge systems used for physical security, such as those used in HID Prox and Indala Prox products. http://www.toolswatch.org/?p=44291 Hook Analyser v3.1 Released Hook Analyser is a freeware application which allows an investigator/ analyst to perform "static & run-time / dynamic" analysis of suspicious application, also gather (analyse & co- related) threat intelligence related information (or data) from various open sources on the Internet. http://www.toolswatch.org/?p=44386 Desenmascara.me (unmaskme) PoC Security Awareness Web Desenmascara.me is a tool yet in it's early PoC stage but fully functional. The goal of this tool is to raise security awareness among web owners in order to help decrease the constant rise of compromised websites. (unmaskme means desenmascarame in Spanish). http://www.toolswatch.org/?p=44388 APK Binder Script v0.1 Released apk_binder_script allows us to unify two apk's in one or add a service apk smali code to the target. This copy smali code, active and manifest. Implements a receiver acting loader loading the class specified as a parameter (a service). http://www.toolswatch.org/?p=44392 NTO Mobile On-Demand Service Released NTOMobile On-Demand combines static analysis security testing (SAST), NTOSpider’s dynamic application security testing (DAST) and expert pen testers to deliver comprehensive and effective mobile application security testing services. Leveraging the power of NTOSpider’s DAST capabilities, NTOMobile On-Demand is the only mobile security solution available capable of effectively and automatically testing the web services that power mobile back ends and that leverage new technologies like REST, JSON and SOAP. http://www.toolswatch.org/?p=44458 oclHashcat v1.21 Released oclHashcat is a GPGPU-based multi-hash cracker using a brute-force attack (implemented as mask attack), combinator attack, dictionary attack, hybrid attack, mask attack, and rule-based attack. http://www.toolswatch.org/?p=44462 [New Tool] Interactive Network Packet Builder v1.0 With Interactive Network Packet Builder you can visually build "any" syntactically correct IP packet for a number of well-known protocols via simple point-and-click operations. Supported protools are SSH, FTP, HTTP, SIP, iSCSI, SMBv1, etc.
Recommended publications
  • Linux Security: What You Need to Know
    Linux Security: What you need to know Dr. James Stanger Chief Technology Evangelist CompTIA Your presenter . James Stanger, PhD Chief Technology Evangelist - CompTIA Security+, Network+, MCSE, LPI Linux, Symantec STA Responsible for CompTIA’s cerGficaGons and conGnuing educaGon • Security analyGcs • Risk management • PenetraGon tesGng, risk assessment, and intrusion detecon • Linux and open source Twier: @jamesstanger • Network administraGon • VirtualizaGon CompTIA hub: • Web technologies hps://Gnyurl.com/y94u3v7j • CerGficaGon development • Award-winning author and instructor Poll quesGon(s) 1. What animal is the Linux mascot? 2. What is the Linux mascot’s name? 3. How did this mascot get chosen, anyway? Why Linux is important to security? Linux is table stakes for security • You’ll be securing Linux-based systems – Web servers and databases – Cloud and virtualizaon • Nearly 1 in 3 Azure virtual machines are Linux • Majority of cloud services use Linux • You will use a Linux system to perform audits – End points (e.g., IoT, mobile devices, ICS) – Many tools available – Flexibility, scalability, and cost • Used as foundaonal components for major business and security soluGons by companies worldwide Most open source security – Fortune 500 tools are built naGvely in Linux – SMB Plaorms you’ll be asked to secure • Content management systems – Wordpress – SharePoint (has other uses) • Web servers • Databases • Network infrastructure – Firewalls, routers and VPN servers – Edge devices (e.g., micro datacenters) – Mobile – DNS especially • End
    [Show full text]
  • Drukkar P66 Android-X86 4.4 RC P67 Hotshots P68 Rcssmin P68 Gipfel P69 Lynx P69 Flpsed P70 Lynis P68 Nightmaretris P70 Zatacka P71
    FOSSPICKS Drukkar p66 Android-x86 4.4 RC p67 HotShots p68 rCSSmin p68 Gipfel p69 Lynx p69 Flpsed p70 Lynis p68 NightmareTris p70 Zatacka p71 Sparkling gems and new releases from the world of FOSSpicks Free and Open Source Software Mike Saunders has spent a decade mining the internet for open source treasures. Here’s the result of his latest haul… Lightweight blog platform Drukkar 2.0 http://drukkar.sourceforge.net ituation: you want to set up entries as simple XML files, and is your own blog. Options: a designed with minimum bandwidth Smillion and one competing overheads, so the “content should blog platforms, each one trying to account for most of your web be more feature-rich, flashy and traffic” as the developer puts it. Web 4.0 than the last. End result: you get tired of trying to work out Nice and simple what’s right for you, give up, and go To install Drukkar, extract its .zip to the pub instead. file directly into a location on your Sounds familiar? Most of us web server (note that it won’t create don’t need whizz-bang WordPress a subdirectory during extraction). installations with all the trimmings Then edit config.xml and set for our day-to-day musings, and the base_url and base_location Drukkar does a splendid job with settings to match your installation minimal requirements. It doesn’t path. Finally, make sure that the need a database or special Apache entries, files and cache directories Drukkar’s default theme, “flat”, is clean and simple. To change the modules or anything like that – its are writable by your web server text on the right, edit inc/sidebar.php.
    [Show full text]
  • Hey Lynis, Audit This by Russ Mcree – ISSA Senior Member, Puget Sound (Seattle), USA Chapter
    toolsmith Hey Lynis, Audit This By Russ McRee – ISSA Senior Member, Puget Sound (Seattle), USA Chapter Prerequisites/dependencies solution will include the existing Lynis Unix/Linux operating systems client that we’ll cover here, a management and reporting interface, as well as related plugins. Michael says they’re making great progress and each appy Holidays to all readers, the ISSA community, day brings them closer to an official first version. Specific to and infosec tool users everywhere. As part of De- the plugins, while a work in progress, they create specialized cember’s editorial theme for the ISSA Journal, Di- hooks via the client. As an example, imagine heuristics scan- Hsaster Recovery/Disaster Planning, I thought I’d try to con- ning with correlation at the central node to detect security in- nect tooling and tactics to said theme. I’m going to try and do trusions. Compliance checking for the likes of Basel II, GLBA, this more often so you don’t end up with a web application HIPAA, PCI DSS, and SOX is another likely plugin candidate. hacking tool as part of the forensics and analysis issue. I can The short-term road map consists of finishing the web inter- hear Thom (editor) and Joel (editorial advisory board chair) face, followed by the presenting and supporting documents. now: “Congratulations Russ, it only took you seven years to This will include documentation, checklists, control over- catch up with everyone else, you stubborn git.” views, and materials for system administrators, security pro- Better late than never I always say, so back to it.
    [Show full text]
  • 2.6 Auditing Linux/Unix Systems
    Processing engine for security health checks Christofer Huynh, Jesper Gustafsson Department of Computer Science © Christofer Huynh, Jesper Gustafsson. LTH School of Engineering Lund University Box 882 SE-251 08 Helsingborg Sweden LTH Ingenjörshögskolan vid Campus Helsingborg Lunds universitet Box 882 251 08 Helsingborg Printed in Sweden. Lunds University Lund 2017 Abstract Computer security is still an often neglected field even though the IT industry is huge and still growing. Making sure that systems are secure is something that is very important but can take a lot of man hours. This thesis contains the research and documentation for an auditing tool created on behalf of a company that specialises in computer security, TrueSec. The audit tool uses the log files that are built from the scripts that TrueSec uses to runs various unix commands as a base, but it has been designed in such a way to allow the addition of other types of logs. The tool was designed with future development in mind. It uses configuration files that are seperated from the code itself to declare rules which the log files are checked against, allowing the tool to evolve with time by adding new rules. At the request of TrueSec a simple web service as a proof of concept for an online service with an authentication model with log in and user roles for uploading log files and storing the output from the audit tool was also developed. Keywords: audit tool, computer security, security audit, analysis engine, security health check 3 Sammanfattning Datasäkerhet är fotfarande ofta ett misskött fält även fast IT- sektorn är stor och fortfarande växer.
    [Show full text]
  • Evaluation and Testing of Several Free/Open Source Web Vulnerability Scanners
    The 10th Conference for Informatics and Information Technology (CIIT 2013) The 10 th Conference for Informatics and Information Technology (CIIT 2013) EVALUATION AND TESTING OF SEVERAL FREE/OPEN SOURCE WEB VULNERABILITY SCANNERS Nataša Šuteva Dragi Zlatkovski, Aleksandra Mileva Faculty of Computer Science, UGD Faculty of Computer Science, UGD Štip, Macedonia Štip, Macedonia ABSTRACT significant number of vulnerabilities in test applications [1, 4, 12, 14, 15, 22]. Bau et al [1], testing eight WVSs, showed that Web Vulnerability Scanners (WVSs) are software tools for WVSs need to be improved in detection of the “stored” and identifying vulnerabilities in web applications. There are second-order forms of XSS and SQLI, and in understanding commercial WVSs, free/open source WVSs, and some of active content and scripting languages. Khoury [7, 8] companies offer them as a Software-as-a-Service. In this analyzed three state-of –art black box WVSs against stored paper, we test and evaluate six free/open source WVSs using SQLI, and their results showed that stored (persistent) SQLI the web application WackoPicko with many known are not detected even when these automated scanners are vulnerabilities, primary for false negative rates. taught to exploit the vulnerability. They propose also a set of recommendations for increasing a detection rate in WVSs for I. INTRODUCTION this type of vulnerability. Doupé et al [4] tested eleven WVSs, Our everyday live heavily depends on using different web and found that eight out of sixteen vulnerabilities were not applications, as web e-mail clients, web instant messaging detected by any of the used scanners. They discuss also a clients, Voice over IP services, e-learning portals, social critical limitations of current WVSs, lack of better support for networks, electronic banking, e-commerce platforms, etc.
    [Show full text]
  • Kali Linux Web Penetration Testing Cookbook
    Kali Linux Web Penetration Testing Cookbook Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 Gilberto Nájera-Gutiérrez BIRMINGHAM - MUMBAI Kali Linux Web Penetration Testing Cookbook Copyright © 2016 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: February 2016 Production reference: 1220216 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78439-291-8 www.packtpub.com Credits Author Copy Editor Gilberto Nájera-Gutiérrez Sneha Singh Reviewers Project Coordinator Gregory Douglas Hill Nikhil Nair Nikunj Jadawala Abhinav Rai Proofreader Safis Editing Commissioning Editor Julian Ursell Indexer Rekha Nair Acquisition Editors Tushar Gupta Graphics Abhinash Sahu Usha Iyer Production Coordinator Content Development Editor Manu Joseph Arun Nadar Cover Work Technical Editor Manu Joseph Pramod Kumavat About the Author Gilberto Nájera-Gutiérrez leads the Security Testing Team (STT) at Sm4rt Security Services, one of the top security firms in Mexico.
    [Show full text]
  • Lynis Enterprise on the Other Hand Has Much More Possibilities to Display Data, Including Extended Reports in Several Formats
    Lynis Lynis Installation and Usage • Introduction • Installation • Using Lynis • Basics • Commands, Options, and Arguments • Suggestions and Warnings • Behind the scenes • Profiles • HostIDs Introduction Lynis is an open source security tool. It helps with auditing systems running UNIX-alike systems (Linux, macOS, BSD), and providing guidance for system hardening and compliance testing. This document contains the basics to use the software. Installation The installation of Lynis is explained in the Get Started guide. Using Lynis Basics By running 'lynis' the program is started and will provide the basic parameters available. If you manually extracted Lynis (or used Git), then use './lynis' to start the program from the local directory. The most common command to start Lynis is using audit system command. This still start the security scan. To run Lynis you should meet one requirement: have write access to /tmp (temporary files) Commands, Options, and Arguments Introduction The behavior of programs can influenced with commands, arguments, and options. These terms are often mixed up, so we start with a quick introduction. Commands tell the program what to do. An option tells the program how to do it. If an argument is used, it tell on what it applies. Arguments usually follow an option, like a filename, or a target. Example $ ./lynis audit system --quick --auditor "The Auditor" In this example we tell Lynis to audit (command), with the target system (argument). By using the --quick (option), we tell it not to wait. We used --auditor (option) and defined it as "The Auditor" (argument). Lynis Commands The Lynis tool requires a minimum amount of parameters to run.
    [Show full text]
  • Hardening Freebsd: an Approach to a Secure System Remy
    Hardening FreeBSD: An Approach to a Secure System Remy Baumgarten University of Hawaii [email protected] October 4th, 2009 Hardening FreeBSD 知己知彼 百戰不殆 If you know both yourself and your enemy, you can win a hundred battles without a single loss. Sun Tzu's The Art of War “Operating System are not broken into; the programs running on the operating system are.” -Micheal W. Lucas General Summary: Hardware and Software Specifications Foreword and Forewarn Who are our Adversaries? Updating and Package Auditing Mailing Lists Permissions Networking and Firewalls Kernel Security Remote Logging Command Logging Secure Remote Access with SOCKS Proxy Forwarding Web Browsing Encryption Auditing Further Reading Hardware Specifications: Intel Core i7 920 Nehalem 2.66GHz 4 x 256KB L2 Cache 8MB L3 Cache LGA 1366 130W Quad-Core Processor ASUS P6T6 WS Revolution LGA 1366 Intel X58 ATX Intel Motherboard CORSAIR XMS3 6GB (3 x 2GB) 240-Pin DDR3 SDRAM DDR3 1333 (PC3 10666) Triple Channel CORSAIR CMPSU-850TX 850W ATX12V 2.2 / EPS12V 2.91 SLI Ready CrossFire Ready Active PFC Power Supply 2x - EVGA 896-P3-1260-TR GeForce GTX 260 896MB 448-bit GDDR3 PCI Express 2.0 x16 HDCP Ready SLI Supported Video Card LG W2452T-TF Black 24" 2ms(GTG) Widescreen LCD Monitor 400 cd/m2 10000:1 DCR with HDCP support LG Black 22X (CAV) DVD+R 8X DVD+RW 16X DVD+R DL 22X (CAV) DVD-R 6X DVD-RW 12X DVD-RAM 16X DVD-ROM 48X CD-R 32X CD-RW 48X CD-ROM 2MB Cache SATA 22X DVD¬±R DVD Burner Antec Nine Hundred Black Steel ATX Mid Tower Computer Case Software Specifications: FreeBSD 7.3 AMD64 Minimal Customized Compiled Kernel Installed Packages of Relevance: tripwire-2.4.1.2 lynis-1.2.6 snort-2.8.4.1_1 john-1.7.2_1 scponly-4.8 munin-main-1.2.6 postfix-2.6.5,1 mysql-server-5.0.86 portupgrade-2.4.6_3,2 portaudit-0.5.13 netcat-1.10_2 nmap-5.00 oinkmaster-2.0_1 Foreword and Forewarn: Security tips are mostly useless unless one understands why and how that tip works with other practices to protect your system from attacks.
    [Show full text]
  • Performance Evaluation of Open Source Web Application Vulnerability Scanners Based on OWASP Benchmark
    International Journal of Computer Applications (0975 – 8887) Volume 174 – No. 18, February 2021 Performance Evaluation of Open Source Web Applica- tion Vulnerability Scanners based on OWASP Bench- mark Pious Akwasi Sarpong Lawrence Sakyi Larbi Daniel Paa Korsah S.D.A Coll. Of Educ Presby Coll. Of Educ Komenda Col.l of Educ Asokore-Koforidua, Ghana Akropong-Akuapem Komenda, Ghana Issah Bala Abdulai Richard Amankwah Akwasi Amponsah Kibi Presby Coll. of Educ Presby Coll. Of Educ Mamp. Tech Coll. of Educ. Kibi, Ghana Akropong-Akuapem, Akropong, Asante Mampong, Ghana Ghana ABSTRACT These vulnerabilities normally cause data breaches and have The use of web application has become a critical component in serious security implications when exploited. For this purpose, a our daily routine work due to its enormous benefits. Unfortu- number of web application vulnerability scanners (WAVS) such nately, most of the web application deployed are not totally de- as (W3af) [3] OWASP Zed Attack Proxy (OWASP ZAP) [4], void of bugs which makes them vulnerable to attacks. Web ap- Skipfish [5], Arachni, Vega, [6], Stalker and Iron WASP [7] plication scanners are tools that detect security vulnerability in emerged to address this phenomenon. Tung et al. [8] defined web application. Although there are several commercial and these WAVS as tools used to test and detect common security open-source web application vulnerability scanners proposed in breaches in web application. literature, the performance of these scanners varies in relation to These tools are automated and provide an easy way of detecting their detection capabilities. The aim of this paper is to assess security vulnerability in web applications in order develop miti- and compare the vulnerability detection capabilities of five gation strategies.
    [Show full text]
  • CERN Web Application Detection
    CERN Web Application Detection Refactoring and release as open source software by Piotr Lizończyk Supervised by Sebastian Łopieński and Dr. Stefan Lüders Summer Students Programme 2015 Geneva, 28. August 2015 1 Table of contents 1. Abstract ...........................................................................................................................3 2. Project specification ........................................................................................................4 2.1. What is Web Application Detection (WAD)? .............................................................4 2.2. Original project goals ................................................................................................4 2.3. Additional achievements ..........................................................................................4 3. Initial code assessment and refactoring ...........................................................................5 3.1. Determining project usability for public audience ....................................................5 3.2. Creating environment for code development ...........................................................5 3.3. Code refactoring .......................................................................................................5 3.4. Improving code maintenance ...................................................................................6 3.5. Ensuring compatibility with Python 3 .......................................................................7 4. Public release
    [Show full text]
  • Msc Project Report
    MSc Project Report Study on Web application Honey pots Submitted By KAMALDEEP SEHGAL [1135553] Course : MSc Computer Science Supervisor : Dr. Ali Mansour Year : 2013 1 | P a g e Thesis Author Consent Form AUTHOR’S NAME: Kamaldeep Sehgal TITLE OF THESIS: Study on Web application Honey pots DEGREE: MSc Computer Science Please read carefully and sign the following as appropriate. I have read and understood the University’s regulations and procedures concerning the submission of my thesis. I understand that I have already signed a declaration agreeing to my dissertations being kept in the Learning Resources Centre (LRC) when I enrolled. We would like now, to extend this agreement by making the thesis available online. Further to this, I AGREE AS FOLLOWS: - That I am the author of the work. - That I have exercised reasonable care to ensure that the Work is original, and does not to the best of my knowledge break any UK law or infringe any third party’s copyright or other Intellectual Property Right. - The LRC and BREO administrators do not hold any obligation to take legal action on behalf of the Depositor (you), or other rights holders, in the event of breach of intellectual property rights, or any other right, in the material deposited. I hereby extend my consent to this thesis being included in the LRC as well as on BREO via online access. AUTHOR’S PERSONAL SIGNATURE: Kamaldeep Sehgal AUTHOR’S STUDENT NUMBER: 1135553 DATE: 22/05/2013 2 | P a g e Acknowledgement It would be hard to complete my project without the guidance of several people who helped me to make my dissertation successful.
    [Show full text]
  • Akraino Release 3: Proposal for Mandatory Tests
    Akraino Release 3: Proposal for Mandatory Tests March 12, 2020 Introduction › The Akraino TSC has discussed the Release 3 requirements in the face-to-face meeting (see the following two slides) › This presentation is a proposal for the mandatory tests in Release 3 › Again, the tests are mandatory only as relevant 2 3 4 Proposal For Incubation projects (that For Mature projects additionally: have been in R1 and R2): › HA tests: etcd_ha, ha/*, › Redfish ceph_service › Kubernetes Conformance › 1.17 › Lynis › Vuls › Kubehunter 5 Open questions › Do we still need the OpenStack tests? › What to do with Linux Testing Project? › Is Kubernetes Conformance 1.17 ok for all? › What to do with the results of Lynis/Vuls/Kubehunter? 6 Summary › Docker › K8s › Networking › Docker Bench for Security › Conformance › Helloworld › Hardware › Etcd_ha › OpenStack › Bios_version › HA › Ceph_service › Hp_baremetal › Ha_calico_dns_proxy › Tempest › Redfish › Ha_etcd_api_ctl_sch › Os › Helm › Ha_services › Cyclictest › Helm_chart › Ha_worker › Ltp (Linux Testing Project) › Helm_repository › Kube-hunter › Lynis › Vuls 7 Docker Bench for Security › https://github.com/docker/d ocker-bench-security › “The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production” 8 Redfish › https://github.com/DMTF/Redfish-Usecase-Checkers › “collection of python3 tools to exercise and validate common use cases for Redfish” › https://github.com/DMTF/Redfish-Test-Framework › “a python3 tool and a model for
    [Show full text]