Herramientas de seguridad lanzada en DefCon 16 en las Vegas

editado agosto 2008 en Noticias
Listado de herramientas de seguridad lanzadas en la reunion de hackers “DEFCON 16” en la Vegas

Beholder – by Nelson Murilo and Luis Eduardo
# Description: An open source wireless IDS program
# Homepage Link: http://www.beholderwireless.org/
# Email Address: [email protected]

The Middler – by Jay Beale
# Description: The end-all be-all of MITM tools
# Homepage Link: http://www.themiddler.com/ (Online?)
# Preface Link: http://www.intelguardians.com/themiddler.html

ClientIPS – by Jay Beale
# Description: An open source inline “transparent” client-side IPS
# Homepage Link: http://www.ClientIPS.org/ (Online?)

Marathon Tool – by Daniel Kachakill
# Description: A Blind SQL Injection tool based on heavy queries
# Download Link: DEFCON 16 CD. No online link found.
# Email Address: [email protected]

The Phantom Protocol – by Magnus Brading
# Description: A Tor-like protocol that fixes some of Tor’s major attack vectors
# Homepage Link: http://code.google.com/p/phantom
# Email Address: [email protected]

ModScan – by Mark Bristow
# Description: A SCADA Modbus Network Scanner
# Homepage Link: http://modscan.googlecode.com/
# Email Address: [email protected]

Grendel Scan – by David Byrne
# Description: Web Application scanner that searches for logic and design flaws as well as the standard flaw seen in the wild today (SQL Injection, XSS, CSRF)
# Homepage Link: http://grendel-scan.com/

iKat – interactive Kiosk Attack Tool (This site has an image as a banner that is definitely not safe for work! – You have been warned) by Paul Craig
# Description: A web site that is dedicated to helping you break out of Kiosk jails
# Homepage Link: http://ikat.ha.cked.net
# Email Address: [email protected]

DAVIX – by Jan P. Monsch and Raffael Marty
# Description: A SLAX based Linux Distro that is geared toward data/log visualization
# Homepage Link: http://code.google.com/p/davix/
# Download Link: http://www.geekceo.com/davix/davix-0.5.0.iso.gz
# Email Addresses: [email protected] and [email protected]

CollabREate – by Chris Eagle and Tim Vidas
# Description: An IDA Pro plugin with a server backend that allows multiple people to collaborate on a single RE (reverse engineering) project.
# Homepage Link: http://www.idabook.com/defcon
# Email Addresses: [email protected] and [email protected]

Dradis – by John Fitzpatrick
# Description: A tool for organizing and sharing information during a penetration test
# Homepage: http://dradis.sourceforge.net
# Email Address: [email protected]

Squirtle – by Kurt Grutzmacher
# Description: A Rouge Server with Controlling Desires that steals NTLM hashes.
# Homepage: http://code.google.com/p/squirtle (Live?)
# Email Address: [email protected]

WhiteSpace – by Kolisar
# Description: A script that can hide other scripts such as CSRF and iframes in spaces and tabs
# Download Link: DEFCON 16 CD

VoIPer – by nnp
# Description: VoIP automated fuzzing tool with support for a large number of VoIP applications and protocols
# Homepage Link: http://voiper.sourceforge.net/

Barrier – by Errata Security
# Description: A browser plugin that pen-tests every site that you visit.
# Homepage Link: http://www.erratasec.com
# Email Address: [email protected]

Psyche – by Ponte Technologies
# Description: An advanced network flow visualization tool that is not soley based on time.
# Homepage Link: http://psyche.pontetec.com/

visto en:

http://blogs.zdnet.com/security/?p=1735

/aporte a la comunidad

Comentarios

Accede o Regístrate para comentar.