background preloader

Web Application Security

Web Application Security
★ 4.2 Stars (5) 1,498 Downloads (This Week) Last Update: Download paros-3.2.13-win.exe Browse All Files Windows Mac Linux A Java based HTTP/HTTPS proxy for assessing web application vulnerability. Paros Web Site 4.2 out of 5 stars ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5 features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5 design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5 support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 thank you paros 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 Great tool 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 no trouble to install and run, works nicely. 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 Paros was a great project, but unfortunately it hasnt been updated for many years.

http://sourceforge.net/projects/paros/

Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

The Infection File Popularity Contest - SpywareGuide Greynets Bl Ever wondered exactly how people who enjoy putting malicious files into the wide blue yonder ensure their bundles of joy are as attractive as possible to those who would happily download them? Well, I came across this program today and thought it was worth looking into. It dips into what's hot and current in the world of free downloads then uses that to ensnare as many potential victims as possible. How do they do it?

Testing Your Web Application - A Quick 10 Step Guide A Quick 10-Step Guide by Krishen Kota, PMP Interested in a quick checklist for testing a web application? Nessus Vulnerability Scanner From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Today, Nessus is trusted by more than 27,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. See for yourself - explore the product here.

How to hide files in JPEG pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one!

We Were Hacked! 8 Tips From A Hacking Victim For Minimizing Your Risk :... - StumbleUpon Think you're safe from a cyberattack just because you're a small biz? Think again. Here's how to prevent a hacking. July 20, 2011 Computer hacking has become front-page news lately, but many small business owners assume that because they’re small potatoes, have a firewall, and use anti-virus software they’re immune to a cyber attack. They're dangerously wrong.

Nikto Web Scanner Nikto Web Scanner is a Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software and other problems. It performs generic and server type specific checks. It also captures and prints any cookies received. The Nikto code itself is Open Source (GPL), however the data files it uses to drive the program are not. [1] Testing Your Web Applications for Cross-Site Scripting Vulnerabilities Published: May 6, 2005 by Chris Weber, Casaba Security, LLC (chris@casabasec.com) By now there’s no argument that cross-site scripting attacks are real and potently dangerous. If you know all about XSS and just want to see some testing ideas, just skip straight to the testing section. If this is new to you, please read on! Cross-site scripting attacks occur when a malicious person, the attacker, can force an unknowing user, the victim, to run client-side script of the attacker’s choice.

Black Hat ® Technical Security Conference: USA 2010 // Archives Caesars Palace Las Vegas, NV • July 28-29 Event AUDIO & VIDEO: The Source of Knowledge will be onsite to sell audio and video recordings of the Briefings sessions. Their booth will be located outside of the Fourth Floor (Promenade Level), Emperor's Ballroom, or click here to visit the SOK site: order media » Quynh Nguyen Anh, Kuniyasu Suzaki Virt-ICE: next generation debugger for malware analysis How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one.

Web Application Security Testing Cheat Sheet This cheat sheet provides a checklist of tasks to be performed during blackbox security testing of a web application. This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the OWASP Testing Guide. It will be updated as the Testing Guide v4 is progressed. The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc.

Related: