Friday, August 29, 2008

number six

As this is nearly the last chance for me to write up a post so that I got the three from last year I just decided to list tools as a reminder for me what I should use...

network:

yerisina
nmap
wireshark
unicornscan
packeth
tcpdump
etherape
scappy
tcptrace
paratrace
p0f
fragroute
ethercap
cain&able
dsniff
inguma
traceroute
ping
l2spike
sully
ike-scan
irpas
fierce
dnsenum
dnsmre

web application:

metoscan
nc
sslscan
w3af
grendel-scan
paros
burp
proxystrike
xss-me
sql-me
bsqlbf
firefox
ie
fiddler
nikto
dirbuster
pantera
stompy
ratproxy
hydra
medusa
hmap
halberd
flare
flasm
swfintuder
sqlninja

wireless:

air crack
kismet
airopeek
cowpatty

voip:

sipvicious
sivus
ohrwurm
sipcrack
sipbomber
sipproxy
steganRTP
voiper

misc:
john
metasploit
metagoofil
maltego
seat
nipper
rat
fwauto

This will be most probably edited.

Kind Regards
non-memory

Wednesday, August 13, 2008

number five

I am feeling a little bit under pressure as I managed to write the total number of 3 blog entries last August. So I have to get my brains together and hurry up to write some this August.

OK, here it goes then:

My colleges were paid to fly to Vegas. Somehow I think there was some kind of security conference going on. But when I am listening to them it seems more like a big fair for new jobs. Maybe I will get paid next time to go there when I am not scheduled for work.

But apparently some penetration testers at Vegas did forget that they are not black hats.
Leaving back doors after a successful break in at a clients site?
What is that about?

Kind Regards
non-black-hat

PS: And of course I have to mention that FX did two talks.

number four

As I am only reading two blogs apparently (which makes things quite easy) I have to point out one of the latest blog entry of FX:

Perception of Vulnerabilities


I would really like to have been a witness of the conversation between Dan and FX.

Well, this caused some discussion at work.

So happy discussing...


Kind Regards
the non discusser