IT Vulnerability & Tools Watch 2011
Upcoming SlideShare
Loading in...5
×
 

IT Vulnerability & Tools Watch 2011

on

  • 1,073 views

 

Statistics

Views

Total Views
1,073
Views on SlideShare
1,071
Embed Views
2

Actions

Likes
0
Downloads
45
Comments
0

1 Embed 2

http://www.wasecurity.com.cn 2

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

IT Vulnerability & Tools Watch 2011 IT Vulnerability & Tools Watch 2011 Document Transcript

  • IT Vulnerability & ToolsWatchNabil OUCHN & Maximiliano SOLERThe present document describes the Best Tools and Utilities from 2011. Divided into categories,carefully separated, based on the VulnerabilityDatabase.com Scoring Criteria. 228 Hamilton Avenue 3rd Floor Palo Alto, CA 94301 contact (at) netpeas (dot) com
  • Introduction The world is changing, the security information too. For years we see that the protests are made by people - face to face - using violence and the media to disseminate what happens at that time. LulzSec and others organized groups like Anonymous have threatened huge companies, defending what they believed right. Changing the way of manifestation from political to social issues. Great personalities related to the technology and information security world have passed away. These include publicly the following people: Steven Paul Jobs, Dennis Ritchie, John McCarthy and Paul ‘CrashFR’ Pinto.S Talent people that created and innovated. Leading theories and tools that we know todaye and are used as the basis of creation.c From VulnerabilityDatabase.com we create this inform developed through ToolsWatchu vision with the best tools and applications that we have focused during 2011.rit  Nabil OUCHN  Maximiliano SOLERy CTO & Co-Founder NETpeas SA. ToolsWatcher Leader Twitter: @toolswatch Twitter: @maxisoler& - Page 2 of 14 -A
  • What is VulnerabilityDatabase.com?VD is the first Collaborative Vulnerability & Tools Watch Service. It provides updates onThreats & Security Tools.The main features are the following:  Huge Database of Tools.  Latest Security News.  Community Feature enabled.  Ask a Hacker Forum.  Free Registration. - Page 3 of 14 -
  • ContentScoring Criteria ............................................................................................. 5Open Source & Free Utilities ......................................................................... 6 Penetration Testing and Ethical Hacking .................................................. 6 Security Assessment .................................................................................. 6Commercial Software .................................................................................... 7Links and References .................................................................................... 82011 Security News in Brief ....................................................................... 12 What Happened ....................................................................................... 12 Cool Papers .............................................................................................. 12 The Great Loss ......................................................................................... 13 Top Hacks ................................................................................................. 13 Conferences ............................................................................................. 14 The worst and stupid Internet Strategy .................................................. 14 - Page 4 of 14 -
  • Scoring CriteriaWe have conducted this new survey on the basis on some criteria (as we did two yearsbefore).Since the last survey (2009), we decided to add these new criteria: Community Support. Documentation. Popularity (Twitter followers). Criteria Comment Audience Each tool has its target audience. Built-in, plug-in, functionalities, capabilities, use of APIs, Features interoperability with other systems. Frequency of updates: adding new features, new plug-in, Updates updating vulnerability database, updating techniques. Frequency of bugs fixing, generating new releases, nightly Maintenance builds, beta testing. Tool has a community version with support and the Community Support appropriate documentation. All documentation are easy to read and to understand and Documentation at least written in English. Wiki, blogs and other collaborative support are a must. Support of charts, dashboard, exporting to multiple formats Reporting (HTML, XML, PDF). The ability of the tool to map findings with Compliance, standards and open standards or to score vulnerability / Standards, Metrics & risks with metrics. Open Standards Standard and metrics could be : CVE, CVSS, CWE, CPE, CCE, OVAL, SCAP, CAPEC, ISO 2700x, NIST, PCI DSS. The popularity of the tool among the community. Twitter followers Popularity Average of visits and download based on our statistics for the year 2009. - Page 5 of 14 -
  • Open Source & Free UtilitiesPenetration Testing and Ethical Hacking Recommended Winner Excellent (Promising) Ex æquo : Ex æquo : FocaInformation Gathering Maltego theHarvester Google Hacking WhatWeb Diggity ProjectNetwork Scanners & Ex æquo : OWASP Zed NmapDiscovery AutoScan Attack Proxy Ex æquo :Vulnerability Scanners Nessus OpenVAS VEGA NeXposeApplication Scanners w3af Arachni Nikto MetasploitExploitation Frameworks DB Exploit Website SAP Bizploit ArmitageWireless Hacking Kismet AirCrack suite AirCheckLive CDS BackTrack 5 Matriux BackBoxSecurity Assessment Recommended Winner Excellent (Promising) Microsoft Web ApplicationWindows Auditing OVAL Interpreter Sysinternals Tools Configuration Analyzer LynisUnix Auditing OpenSCAP Security OnionNetwork Monitoring SAMHAIN PacketFence LiveDVD - Page 6 of 14 -
  • Suricata BurpSuite WhatWebApplication Assessment WebSecurify W3AF WebSecurifyWireless Auditing Kismet inSSIder Wifite DFF (Digital Mobius ForensicForensics NetworkMiner Forensics Toolkit Framework)Datamining / Logs Dradis Graylog2 Log2timelineManagementIT Management SpiceWorks OpenDLP Splunk PHP VulnerabilityCode Analysis Agnitio Graudit Hunter Ex æquo :Password Analysis Cain & Abel John the Ripper Patator THC-Hydra Havij PangolinDatabase Auditing The Mole SQL MapVoIP / Telephony Auditing UCSniff Viper VAST MausezahnCommercial Software Recommended Winner Excellent (Promising) Ex æquo : Tenable Nessus Ex æquo : COREvidence™Vulnerability Management ProFeed WebSaint / Marketplace NeXpose Entreprise Ex æquo :Application Security COREvidence™ Acunetix / SandCat ProAssessment Marketplace Netsparker - Page 7 of 14 -
  • Ex æquo :Patch Management GFI Languard NSS / Lumension EndPoint Shavlik Technologies Ex æquo :Penetration Testing and CoreImpact / SaintExploit Immunity CANVASExploitation Metasploit ProLinks and References URLMaltego http://www.paterva.com/web5/client/download.phpFoca http://www.informatica64.com/foca.aspxGoogle Hacking Diggity http://www.stachliu.com/resources/toolsProjecttheHarvester https://code.google.com/p/theharvesterWhatWeb http://www.morningstarsecurity.com/research/whatwebNmap http://nmap.orgAutoScan http://autoscan-network.comOWASP Zed Attack Proxy https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_ProjectNessus http://www.nessus.orgNeXpose http://community.rapid7.comOpenVAS http://www.openvas.orgVEGA http://subgraph.com/products.htmlWA3F http://w3af.sourceforge.net - Page 8 of 14 -
  • Arachni http://arachni.segfault.grNikto http://cirt.net/nikto2Metasploit http://www.metasploit.orgExploit DB http://www.exploit-db.comSAP Bizploit http://www.onapsis.com/research-free-solutions.phpKismet http://www.kismetwireless.netAirCrack-NG Suite http://www.aircrack-ng.orgAiroScript-NG http://airoscript.aircrack-ng.orgBacktrack 5 http://www.backtrack-linux.orgMatriux http://www.matriux.comBackBox http://www.backbox.orgOval Interpreter http://oval.mitre.orgMicrosoft Web Application http://www.microsoft.com/download/en/details.aspx?id=573Configuration AnalyzerNessus Local Plug-ins http://www.nessus.org/plugins/index.php?view=allSysinternals Tools http://technet.microsoft.com/sysinternalsLynis http://www.rootkit.nlOpenSCAP http://www.open-scap.orgSAMHAIN http://www.la-samhna.de/samhainSuricata http://www.openinfosecfoundation.orgPacketFence http://www.packetfence.orgSecurity Onion LiveDVD http://securityonion.blogspot.comBurpSuite http://portswigger.netWebsecurify http://www.websecurify.comInssider http://www.metageek.net/products/inssiderWifite https://code.google.com/p/wifiteDEFT http://www.deftlinux.netMobius Forensics Toolkit http://freshmeat.net/projects/mobiusft - Page 9 of 14 -
  • DFF (Digital Forensics http://www.digital-forensic.orgFramework)Dradis http://dradisframework.orgGraylog2 http://graylog2.orgLog2timeline http://log2timeline.net/filesSpiceworks Community http://www.spiceworks.comOpenDLP https://code.google.com/p/opendlpSplunk http://www.splunk.comPaglo IT http://paglo.comGraudit http://www.justanotherhacker.comAgnitio http://www.securityninja.co.ukPHP Vulnerability Hunter https://code.google.com/p/php-vulnerability-hunterCain & Abel http://www.oxid.itOphCrack http://ophcrack.sourceforge.netJohn the Ripper http://www.openwall.com/johnPatator https://code.google.com/p/patatorHavij http://itsecteam.com/enPangolin http://www.nosec.orgSQL Map http://sqlmap.sourceforge.netThe Mole http://themole.sourceforge.netUCSniff http://ucsniff.sourceforge.netViper VAST http://vipervast.sourceforge.netMausezahn http://www.perihel.at/sec/mz - Page 10 of 14 -
  • - Page 11 of 14 -
  • 2011 Security News in BriefWhat Happened EditorEMC Acquires NetWitness http://www.vulnerabilitydatabase.com/2011/04/emc-acquires-Corporation netwitness-corporation/ http://www.vulnerabilitydatabase.com/2011/03/mcafee-acquires-McAfee Acquires Sentrigo sentrigo-to-enhance-database-security-portfolio/ http://www.vulnerabilitydatabase.com/2011/03/google-acquires-Google Acquires Zynamics zynamics/SalesForge Acquired http://www.vulnerabilitydatabase.com/2011/01/dimdim-has-been-Dimdim acquired-by-salesforce-com/ http://www.vulnerabilitydatabase.com/2010/12/citrix-acquired-Citrix Acquired NetViewer netviewer/Hackers break SSL http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/encryptionGnackTrack project retired https://www.phillips321.co.uk/gnacktrack/Ettercap New Version (Back http://www.vulnerabilitydatabase.com/2011/12/ettercap-v0-7-4-from 5 years) lazarus-back-from-5-years/ http://www.vulnerabilitydatabase.com/2011/11/owasp-academy-OWASP Academy Portal portal/Cool Papers  Results of a Security Assessment of the IPv6  2011 CWE/SANS Top 25 Most Dangerous Software Errors v1.0  Whitepaper on SCADA Security Vulnerabilities  Common Weakness Risk Analysis Framework (CWRAF) - Page 12 of 14 -
  •  CybOX v0.6.2 – Cyber Observable eXpression (MITRE)  Browser Security Comparison: A Quantitative Approach  Onapsis SAP Security In-DepthThe Great Loss Steven Paul Jobs (February 24, 1955 – October 5, 2011) He was co-founder, chairman, and chief executive officer of Apple Inc. Dennis Ritchie (September 9, 1941 - October 12, 2011) He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system. John McCarthy (September 4, 1927 – October 24, 2011) The father of "artificial intelligence" (AI), invented the Lisp programming language and was highly influential in the early development of AI. Paolo Pinto (CrashFR) Founder of HZV & Sysdreams.Top Hacks Sony investigating another hack Dropbox Lied to Users About Data Security, Complaint to FTC Alleges OpenSSH 3.5p1 Remote Root Exploit for FreeBSD Fraudulent Digital Certificates Could Allow Spoofing Kernel.org Linux repository rooted in hack attack Attack Code for SCADA Vulnerabilities Released Online Researchers Uncover The Email That Led To The RSA Hack - Page 13 of 14 -
  • Conferences BlackHat USA 2011 NETpeas SA and ToolsWatch have been present sponsoring Black Hat USA 2011 and organizing the Black Hat Arsenal Tools. This is an area for independent researchers and the open source community that will allow you to showcase their work.The worst and stupid Internet Strategy Stop Online Piracy Act (SOPA) PROTECT IP Act (PIPA) Anti-Counterfeiting Trade Agreement (ACTA) www.vulnerabilitydatabase.comContact Us228 Hamilton Avenue 3rd FloorPalo Alto, CA 94301contact (at) netpeas (dot) comPhone: +1 650 798-5109Fax : +1 650 798-5001 - Page 14 of 14 -