I would like to hear from you which tools (commercial and open source) do you use to share results during collaborative penetration test or source code/binary analysis. Well-known Dradis framework helps at some level, but it would be nice to see…
I'm looking for well known tools that will scan for any PII within a network. For example, I would like to be able to use a plug and play method, meaning I drive to a client, plug my laptop in, and scan for all sensitive material, such as SSN,…
I am writing an application which uses CVE identifiers to cross-reference vulnerabilities. I would like to make it compatible with future CVE identifiers.
If it happens that there are more than 9999 CVE identifiers in a year, what number will follow…
I have been working on a conky configuration to help me manage penetration tests, but after much research, I cannot find anyone else speaking of their configs in any way other than the glitz.
Currently, I have:
CPU load
Memory load
top…
Am doing a Firesheep Demo in a few weeks as a security awareness project. However I can't seem to get it working, and I'm wondering if it's just because the handlers it ships with are now outdated because everyone has fixed their sites.
I am going…
I used win64dd.exe to get a memory image on a 64-bit computer running Windows 7 and had Mandiant Redline analyze the image. One of the things marked red was one of the svchost.exe processes. Redline says
This process has a module which imports a…
Is it usually authorized to run systematic information gathering tools ?
I'm talking about tools like nmap, knock, dirb and so on. I'm obviously talking about running them on public websites without consent.
Possible Duplicate:
How can I reliably erase all information on a hard drive?
I'm looking to see if there's a method that can completely wipe out the content of a HDD, so that nothing previously on it can be recovered by any means, even by a…
The description of WinObj says:
WinObj is a must-have tool if you are a system administrator concerned about security
What kind of security issues can it detect and what is the rough usage?
When I run Nikto, its output details all the tests it ran, but I just want the bits where it found problems. How can I set it to only show errors?
JohnFF
I just pulled down the repository for an elite penetration testing tool call sn1per I want to use this tool to scan a list of websites. My goal is to automate the steps of a manual penetration test.
The steps to reach the point where I am at is to…