background preloader

Tools

Facebook Twitter

BackTrack 5 Wireless Penetration Testing Beginner's Guide. Posted on 15 September 2011.

BackTrack 5 Wireless Penetration Testing Beginner's Guide

Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of wireless networking tools used to simulate network attacks and detect security loopholes. Protect The Stuff - Why You Need Norton. A Handy Guide To Microsoft's Free Security Tools. Microsoft publishes a range of free security-related software.

A Handy Guide To Microsoft's Free Security Tools

One of the best-known is Security Essentials, the excellent antivirus/antimalware product which was recently updated to version 2.0. Many of the other products in the collection are aimed primarily at large business customers, and are not of general interest to anyone else. But of the handful of exceptions, MBSA has always stood out for me. Nmap - Free Security Scanner For Network Exploration & Security Audits. McAfee Downloads. GetSusp McAfee GetSusp is intended for users who suspect undetected malware on their computer.

McAfee Downloads

Google Builds Developer Tool to Flag Web App Vulnerabilities. Google has released an experimental extension for its Chrome browser that developers can use to scan their Web applications and flag code that could make them vulnerable to malware attacks.

Google Builds Developer Tool to Flag Web App Vulnerabilities

The free tool, called DOM Snitch, is designed to sniff out potential security holes in Web applications' client-side code that could be exploited by attacks such as client-side scripting, Google said on Tuesday. "To do this, we have adopted several approaches to intercepting JavaScript calls to key and potentially dangerous browser infrastructure such as document.write or HTMLElement.innerHTML," Google official Radoslav Vasilev wrote in a blog post. In addition to developers, DOM Snitch is also aimed at code testers and security researchers, the company said. The tool displays DOM (document object model) modifications in real time so developers don't have to pause the application to run a debugging tool, according to Google. The LiveCD List.

Remove Spyware, Malware, Viruses Free. Do you think your PC has a virus?

Remove Spyware, Malware, Viruses Free

The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software. Note: The Microsoft Safety Scanner expires 10 days after being downloaded. To rerun a scan with the latest anti-malware definitions, download and run the Microsoft Safety Scanner again. The Microsoft Safety Scanner is not a replacement for using an antivirus software program that provides ongoing protection. For real-time protection that helps to guard your home or small business PCs against viruses, spyware, and other malicious software, download Microsoft Security Essentials.

Genuine Windows customers get a complimentary subscription to Microsoft Security Essentials, the award-winning antivirus software that helps you protect your PC. With Windows Live Family Safety, you can help keep your kids safer on the Internet with rules you personalize. How To Hide A File Inside Calculator [Security] Running Snort Under Windows. Loras R.

Running Snort Under Windows

Even Updated by Jim McMillan November 2009. Scapy. Security Power Tools was out in August 2007.

Scapy

I wrote a complete chapter on Scapy Scapy trainings at CanSecWest, EuSecWest, PacSec. NEXT SESSION: CanSecWest march 7th and 8th, 2011 I can give trainings on many subjects (Scapy, networks, shellcoding, exploit writing, etc.). Contact me directly: phil@secdev.org. Product Watch: New Tool Automatically Examines Suspicious Code In Memory. Website Security Check - Unmask Parasites. Security Research by Dan Rosenberg. Since the beginning of the media frenzy over CarrierIQ, I have repeatedly stated that based on my knowledge of the software, claims that keystrokes, SMS bodies, email bodies, and other data of this nature are being collected are erroneous.

Security Research by Dan Rosenberg

I have also stated that to satisfy users, it’s important that there be increased visibility into what data is actually being collected on these devices. This post represents my findings on how CarrierIQ works, and what data it is capable of collecting. There has been a lot of misinformation about which parties are responsible for which aspects of data collection. At a high level, CarrierIQ is a piece of software installed on phones that accepts pieces of information known as metrics. On receiving a submitted metric, CIQ evaluates whether that metric is “interesting” based on the current profile installed on the device.

To get a complete picture of this, suppose a carrier decides it wants to know about dropped calls. 1. 1. Firewall_Browser_Annoucement-20100310.pdf (application/pdf Object) SolarWinds Firewall Security Manager (FSM) delivers the advanced firewall management capabilities required by today’s ever-evolving security and compliance mandates and increasingly complex rulesets.

Firewall_Browser_Annoucement-20100310.pdf (application/pdf Object)

Remember, security and compliance are not one-time projects, but ongoing processes that must be maintained, which is why having the right management tool is vital! With FSM, you get an all-in-one tool to simplify firewall configuration, change management, and troubleshooting—all with an intuitive, point-and-click interface. You can discover high-risk firewalls in minutes, isolate dangerous rules and security gaps, and remediate threats to ensure the safety of your network’s valuable resources.

FSM Highlights:Automate security audits and compliance checksAnalyze and optimize complex firewall configurationsExpose hidden network vulnerabilitiesClean up redundant, conflicting, and unused rulesModel rule change impact without touching production. Windows XP - Netstat. Repair Tool of the Week: Add Remove Programs Cleaner. Occasionally an application cannot be removed by using “Add/Remove Programs” under the control panel and you have to delete it manually.

Repair Tool of the Week: Add Remove Programs Cleaner

However, sometimes the entry for the application still remains in the installed programs list even though the program is no longer on your computer. This is where Add Remove Programs Cleaner comes in. CurrPorts Freeware download and reviews from SnapFiles. CIRT.net. Google Hands Out Web Security Scanner. Burp Suite. Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. Psad - Intrusion Detection with iptables, iptables Log Analysis, iptables Policy Analysis.

Psad: Intrusion Detection and Log Analysis with iptables psad is a collection of three lightweight system daemons (two main daemons and one helper daemon) that run on Linux machines and analyze iptables log messages to detect port scans and other suspicious traffic. A typical deployment is to run psad on the iptables firewall where it has the fastest access to log data. psad incorporates many signatures from the Snort intrusion detection system to detect probes for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (FIN, NULL, XMAS) which are easily leveraged against a machine via nmap. When combined with fwsnort and the Netfilter string match extension, psad is capable of detecting many attacks described in the Snort rule set that involve application layer data.

For the second example, psad interfaces with Gnuplot to produce a graph of the number of TCP SYN packets to destination ports per hour. History. Five Best Malware Removal Tools. @gapo: I disagree. Many infections are pretty minor and can be easily removed with these tools with no damage afterwards. I mean, yeah, for some, that is the best option, but no need to just do that all the time. Extra work for nothing.

Anti-rootkit utility TDSSKiller. To know what can threat your data you should know what malicious programs (Malware) exist and how they function. Malware can be subdivided in the following types: Viruses: programs that infect other programs by adding to them a virus code to get access at an infected file start-up. This simple definition discovers the main action of a virus – infection. The spreading speed of viruses is lower than that of worms. Worms: this type of Malware uses network resources for spreading. Worms intrude your computer, calculate network addresses of other computers and send to these addresses its copies.

Spyware: software that allows to collect data about a specific user or organization, who are not aware of it. Trace user's actions on computer Collect information about hard drive contents; it often means scanning some folders and system registry to make a list of software installed on the computer. Offers a free tool that completely removes the Conficker/Downadup worm from home and business networks. March 2009 Demonstration of the removal tool available on YouTube. Md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com. Metasploit Unleashed By Offensive Security. Various tools. QFX Software - Anti-Keylogging Software and More. Product Watch: New Tool Automatically Examines Suspicious Code In Memory.

Sophos offering free data-loss prevention software. Dvdisaster. ★ 4.6 Stars (11) 144 Downloads (This Week) Website Security Check - Unmask Parasites. BackTrack Linux - Penetration Testing Distribution. Kaminsky Issues Developer Tool To Kill Injection Bugs.

Anti Rootkit Software - Helios. What Is My IP Address - Shows Your IP Address.