background preloader

Samurai Web Testing Framework

Samurai Web Testing Framework
Samurai Web Testing Framework The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test. Starting with reconnaissance, we have included tools such as the Fierce domain scanner and Maltego.

http://samurai.inguardians.com/

Katana Katana v2.0 Release Updated: 11/10/2010 Katana is a portable multi-boot security suite which brings together many of today's best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, NMAP, Cain & Abel, and many more. Release Notes: Hacking Hacking and Penetration Testing is the core topic here at InfoSec Institute. A wealth of free training materials is here & we continue to write and publish them daily. If you or your organization needs classroom or online ethical hacking training and education, give us a look!

A Security-Focused HTTP Primer What follows is a primer on the key security-oriented characteristics of the HTTP protocol. It’s a collection of a number of different sub-topics, explained in my own way, for the purpose of having a single reference point when needed. Basics Message-based You make a request, you get a response. zaproxy - OWASP ZAP: An easy to use integrated penetration testing tool for finding vulnerabilities in web applications. The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen testers toolbox. ZAP 2.3.0 is now available! Download it here: ZAP is taking part in the Google Summer of Code 2014. See the OWASP wiki for suggested projects.

KON-BOOT System Requirements: Pentium III compatible processor, 10MB free space on the hard drive. CD-ROM, Floppy Drive or USB flash drive, keyboard, Internet connection (for product download). Compatible BIOS version.Windows system is required for installer to run. USB flash drive is required for the EFI version to work. Disk encryption is not supported. Tablets are not supported.

Summer@EPFL Summer Internships for BSc and MSc Students The School of Computer and Communication Sciences provides internship opportunities in the Summer period for students enrolled in BSc, MSc, or equivalent programmes in Computer Science, Computer Engineering, Telecommunications, or Electrical Engineering. Internships are assigned competitively to students with excellent academic results. (Students of other disciplines or interested in interships in other periods of the year may want to check the information below.)

XSS (Cross Site Scripting) Cheat Sheet Last revision (mm/dd/yy): 07/4/2018 This cheat sheet lists a series of XSS attacks that can be used to bypass certain XSS defensive filters. Please note that input filtering is an incomplete defense for XSS which these tests can be used to illustrate. Basic XSS Test Without Filter Evasion This is a normal XSS JavaScript injection, and most likely to get caught but I suggest trying it first (the quotes are not required in any modern browser so they are omitted here): XSS Locator (Polygot) Total Business Security Anti-Malware for Workstations Rigorous anti-malware With a combination of signature-based, heuristic and cloud-assisted anti-malware technologies, Kaspersky TOTAL Security for Business protects against known and emerging threats.

Should Alice marry Bob? Two problems: 1. You are in an airport and are walking from the main departure lounge to a rather distant gate. On the way there are several moving walkways. There is a small stone in your shoe, which is annoying enough that you decide that you must remove it. If you want to get to the gate as quickly as possible, and if there is no danger of your annoying other passengers, is it better to remove the stone while on a moving walkway or while on stationary ground, or does it make no difference? Review: Bitdefender Internet Security 2013: Excellent protection, user-friendly interface Bitdefender Internet Security 2013 ($70 for one year and three PCs, as of 12/19/12) may just be everything that you’d want in a security suite. This program, which earned the highest rating in both our real-world attack test and our system cleanup test, has a user-friendly interface that will appeal to both regular and advanced users. It also comes with several extra services, such as antitheft protection for various mobile devices.

A Graph Map of Math.SE - Mathematics Meta - Stack Exchange I've just made a map of tags for Math.SE. (And to some degree - a greatly simplified map of mathematics.) In short: tag size is related to tag popularity (caveat: see below) and edges are related to tag co-occurrences in questions (or more precisely: the observed/expected ratio, see About joint probability divided by the product of the probabilities). Colors are to distinguish graph communities, as detected by this algorithm. For me it looks as a "snapshot" of topics and scope of this SE site. McAfee Tanks Independent AV Test The well-known independent antivirus testing labs AV-Test and AV-Comparatives typically include 20 to 25 security products in each test. The dedicated researchers at Dennis Technology Labs puts a much smaller group of products to the test, usually eight or nine, but they perform intensive testing that comes extremely close to real-world user experience. In the latest quarterly report five products did very well, three earned a decent grade, and McAfee just bombed. Testing Protection Half of the test relates to how well each product protected a test system against infestation by 100 real-world malware attacks. For a simple, static, signature-based test that would be a laughably small number. However, the real-world tests run by Dennis Labs are anything but simple.

Related: