Top Banner
Nabil OUCHN & Maximiliano SOLER The present document describes the Best Tools and Utilities from 2011. Divided into categories, carefully separated, based on the VulnerabilityDatabase.com Scoring Criteria. 228 Hamilton Avenue 3rd Floor Palo Alto, CA 94301 contact (at) netpeas (dot) com IT Vulnerability & ToolsWatch
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IT Vulnerability & Tools Watch 2011

Nabil OUCHN & Maximiliano SOLER The present document describes the Best Tools and Utilities from 2011. Divided into categories, carefully separated, based on the VulnerabilityDatabase.com Scoring Criteria.

228 Hamilton Avenue 3rd Floor

Palo Alto, CA 94301 contact (at) netpeas (dot) com

IT Vulnerability & ToolsWatch

Page 2: IT Vulnerability & Tools Watch 2011

- Page 2 of 14 -

Introduction

The world is changing, the security information too. For years we see that the protests are

made by people - face to face - using violence and the media to disseminate what happens

at that time.

LulzSec and others organized groups like Anonymous have threatened huge companies,

defending what they believed right. Changing the way of manifestation from political to

social issues.

Great personalities related to the technology and information security world have passed

away. These include publicly the following people: Steven Paul Jobs, Dennis Ritchie, John

McCarthy and Paul ‘CrashFR’ Pinto.

Talent people that created and innovated. Leading theories and tools that we know today

and are used as the basis of creation.

From VulnerabilityDatabase.com we create this inform developed through ToolsWatch

vision with the best tools and applications that we have focused during 2011.

Nabil OUCHN Maximiliano SOLER

CTO & Co-Founder NETpeas SA. ToolsWatcher Leader

Twitter: @toolswatch Twitter: @maxisoler

08 Automne

Security & Au

Page 3: IT Vulnerability & Tools Watch 2011

- Page 3 of 14 -

What is VulnerabilityDatabase.com?

VD is the first Collaborative Vulnerability & Tools Watch Service. It provides updates on

Threats & Security Tools.

The main features are the following:

Huge Database of Tools.

Latest Security News.

Community Feature enabled.

Ask a Hacker Forum.

Free Registration.

Page 4: IT Vulnerability & Tools Watch 2011

- Page 4 of 14 -

Content

Scoring Criteria ............................................................................................. 5

Open Source & Free Utilities ......................................................................... 6

Penetration Testing and Ethical Hacking .................................................. 6

Security Assessment .................................................................................. 6

Commercial Software .................................................................................... 7

Links and References .................................................................................... 8

2011 Security News in Brief ....................................................................... 12

What Happened ....................................................................................... 12

Cool Papers .............................................................................................. 12

The Great Loss ......................................................................................... 13

Top Hacks ................................................................................................. 13

Conferences ............................................................................................. 14

The worst and stupid Internet Strategy .................................................. 14

Page 5: IT Vulnerability & Tools Watch 2011

- Page 5 of 14 -

Scoring Criteria

We have conducted this new survey on the basis on some criteria (as we did two years before).

Since the last survey (2009), we decided to add these new criteria:

Community Support. Documentation. Popularity (Twitter followers).

Criteria Comment

Audience Each tool has its target audience.

Features Built-in, plug-in, functionalities, capabilities, use of APIs,

interoperability with other systems.

Updates Frequency of updates: adding new features, new plug-in,

updating vulnerability database, updating techniques.

Maintenance Frequency of bugs fixing, generating new releases, nightly

builds, beta testing.

Community Support Tool has a community version with support and the

appropriate documentation.

Documentation

All documentation are easy to read and to understand and

at least written in English. Wiki, blogs and other

collaborative support are a must.

Reporting Support of charts, dashboard, exporting to multiple formats

(HTML, XML, PDF).

Standards, Metrics &

Open Standards

The ability of the tool to map findings with Compliance,

standards and open standards or to score vulnerability /

risks with metrics.

Standard and metrics could be : CVE, CVSS, CWE, CPE,

CCE, OVAL, SCAP, CAPEC, ISO 2700x, NIST, PCI DSS.

Popularity

The popularity of the tool among the community.

Twitter followers

Average of visits and download based on our statistics for the

year 2009.

Page 6: IT Vulnerability & Tools Watch 2011

- Page 6 of 14 -

Open Source & Free Utilities

Penetration Testing and Ethical Hacking

Winner Excellent Recommended

(Promising)

Information Gathering Maltego

Ex æquo :

Foca

Google Hacking Diggity Project

Ex æquo :

theHarvester

WhatWeb

Network Scanners & Discovery

Nmap Ex æquo :

AutoScan

OWASP Zed Attack Proxy

Vulnerability Scanners

Ex æquo :

Nessus

NeXpose

OpenVAS VEGA

Application Scanners w3af Arachni Nikto

Exploitation Frameworks Metasploit

Armitage DB Exploit Website SAP Bizploit

Wireless Hacking Kismet AirCrack suite AirCheck

Live CDS BackTrack 5 Matriux BackBox

Security Assessment

Winner Excellent Recommended

(Promising)

Windows Auditing OVAL Interpreter

Microsoft Web

Application

Configuration

Analyzer

Sysinternals Tools

Unix Auditing Lynis

OpenSCAP

Network Monitoring SAMHAIN PacketFence Security Onion

LiveDVD

Page 7: IT Vulnerability & Tools Watch 2011

- Page 7 of 14 -

Suricata

Application Assessment BurpSuite

W3AF WebSecurify

WhatWeb

WebSecurify

Wireless Auditing Kismet inSSIder Wifite

Forensics NetworkMiner Mobius Forensic

Toolkit

DFF (Digital

Forensics

Framework)

Datamining / Logs

Management Dradis Graylog2 Log2timeline

IT Management SpiceWorks OpenDLP Splunk

Code Analysis Agnitio Graudit PHP Vulnerability

Hunter

Password Analysis

Ex æquo :

Cain & Abel

THC-Hydra

John the Ripper Patator

Database Auditing Havij

SQL Map

Pangolin

The Mole

VoIP / Telephony Auditing UCSniff Viper VAST Mausezahn

Commercial Software

Winner Excellent

Recommended

(Promising)

Vulnerability Management

Ex æquo :

Tenable Nessus

ProFeed

NeXpose Entreprise

Ex æquo :

WebSaint /

COREvidence™

Marketplace

Application Security

Assessment

Ex æquo :

Acunetix /

Netsparker

SandCat Pro COREvidence™

Marketplace

Page 8: IT Vulnerability & Tools Watch 2011

- Page 8 of 14 -

Patch Management

Ex æquo :

GFI Languard NSS /

Shavlik Technologies

Lumension EndPoint

Penetration Testing and

Exploitation

Ex æquo :

CoreImpact /

Metasploit Pro

SaintExploit Immunity CANVAS

Links and References

URL

Maltego http://www.paterva.com/web5/client/download.php

Foca http://www.informatica64.com/foca.aspx

Google Hacking Diggity

Project http://www.stachliu.com/resources/tools

theHarvester https://code.google.com/p/theharvester

WhatWeb http://www.morningstarsecurity.com/research/whatweb

Nmap http://nmap.org

AutoScan http://autoscan-network.com

OWASP Zed Attack Proxy https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Nessus http://www.nessus.org

NeXpose http://community.rapid7.com

OpenVAS http://www.openvas.org

VEGA http://subgraph.com/products.html

WA3F http://w3af.sourceforge.net

Page 9: IT Vulnerability & Tools Watch 2011

- Page 9 of 14 -

Arachni http://arachni.segfault.gr

Nikto http://cirt.net/nikto2

Metasploit http://www.metasploit.org

Exploit DB http://www.exploit-db.com

SAP Bizploit http://www.onapsis.com/research-free-solutions.php

Kismet http://www.kismetwireless.net

AirCrack-NG Suite http://www.aircrack-ng.org

AiroScript-NG http://airoscript.aircrack-ng.org

Backtrack 5 http://www.backtrack-linux.org

Matriux http://www.matriux.com

BackBox http://www.backbox.org

Oval Interpreter http://oval.mitre.org

Microsoft Web Application

Configuration Analyzer http://www.microsoft.com/download/en/details.aspx?id=573

Nessus Local Plug-ins http://www.nessus.org/plugins/index.php?view=all

Sysinternals Tools http://technet.microsoft.com/sysinternals

Lynis http://www.rootkit.nl

OpenSCAP http://www.open-scap.org

SAMHAIN http://www.la-samhna.de/samhain

Suricata http://www.openinfosecfoundation.org

PacketFence http://www.packetfence.org

Security Onion LiveDVD http://securityonion.blogspot.com

BurpSuite http://portswigger.net

Websecurify http://www.websecurify.com

Inssider http://www.metageek.net/products/inssider

Wifite https://code.google.com/p/wifite

DEFT http://www.deftlinux.net

Mobius Forensics Toolkit http://freshmeat.net/projects/mobiusft

Page 10: IT Vulnerability & Tools Watch 2011

- Page 10 of 14 -

DFF (Digital Forensics

Framework) http://www.digital-forensic.org

Dradis http://dradisframework.org

Graylog2 http://graylog2.org

Log2timeline http://log2timeline.net/files

Spiceworks Community http://www.spiceworks.com

OpenDLP https://code.google.com/p/opendlp

Splunk http://www.splunk.com

Paglo IT http://paglo.com

Graudit http://www.justanotherhacker.com

Agnitio http://www.securityninja.co.uk

PHP Vulnerability Hunter https://code.google.com/p/php-vulnerability-hunter

Cain & Abel http://www.oxid.it

OphCrack http://ophcrack.sourceforge.net

John the Ripper http://www.openwall.com/john

Patator https://code.google.com/p/patator

Havij http://itsecteam.com/en

Pangolin http://www.nosec.org

SQL Map http://sqlmap.sourceforge.net

The Mole http://themole.sourceforge.net

UCSniff http://ucsniff.sourceforge.net

Viper VAST http://vipervast.sourceforge.net

Mausezahn http://www.perihel.at/sec/mz

Page 11: IT Vulnerability & Tools Watch 2011

- Page 11 of 14 -

Page 12: IT Vulnerability & Tools Watch 2011

- Page 12 of 14 -

2011 Security News in Brief

What Happened

Editor

EMC Acquires NetWitness Corporation

http://www.vulnerabilitydatabase.com/2011/04/emc-acquires-

netwitness-corporation/

McAfee Acquires Sentrigo http://www.vulnerabilitydatabase.com/2011/03/mcafee-acquires-

sentrigo-to-enhance-database-security-portfolio/

Google Acquires Zynamics http://www.vulnerabilitydatabase.com/2011/03/google-acquires-

zynamics/

SalesForge Acquired Dimdim

http://www.vulnerabilitydatabase.com/2011/01/dimdim-has-been-

acquired-by-salesforce-com/

Citrix Acquired NetViewer http://www.vulnerabilitydatabase.com/2010/12/citrix-acquired-

netviewer/

Hackers break SSL encryption

http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/

GnackTrack project retired https://www.phillips321.co.uk/gnacktrack/

Ettercap New Version (Back from 5 years)

http://www.vulnerabilitydatabase.com/2011/12/ettercap-v0-7-4-

lazarus-back-from-5-years/

OWASP Academy Portal http://www.vulnerabilitydatabase.com/2011/11/owasp-academy-

portal/

Cool Papers

Results of a Security Assessment of the IPv6

2011 CWE/SANS Top 25 Most Dangerous Software Errors v1.0

Whitepaper on SCADA Security Vulnerabilities

Common Weakness Risk Analysis Framework (CWRAF)

Page 13: IT Vulnerability & Tools Watch 2011

- Page 13 of 14 -

CybOX v0.6.2 – Cyber Observable eXpression (MITRE)

Browser Security Comparison: A Quantitative Approach

Onapsis SAP Security In-Depth

The Great Loss

Steven Paul Jobs (February 24, 1955 – October 5, 2011)

He was co-founder, chairman, and chief executive officer of Apple Inc.

Dennis Ritchie (September 9, 1941 - October 12, 2011)

He created the C programming language and, with long-time colleague Ken

Thompson, the Unix operating system.

John McCarthy (September 4, 1927 – October 24, 2011)

The father of "artificial intelligence" (AI), invented the Lisp programming language

and was highly influential in the early development of AI.

Paolo Pinto (CrashFR)

Founder of HZV & Sysdreams.

Top Hacks

Sony investigating another hack

Dropbox Lied to Users About Data Security, Complaint to FTC Alleges

OpenSSH 3.5p1 Remote Root Exploit for FreeBSD

Fraudulent Digital Certificates Could Allow Spoofing

Kernel.org Linux repository rooted in hack attack

Attack Code for SCADA Vulnerabilities Released Online

Researchers Uncover The Email That Led To The RSA Hack

Page 14: IT Vulnerability & Tools Watch 2011

- Page 14 of 14 -

Conferences

BlackHat USA 2011

NETpeas SA and ToolsWatch have been present sponsoring Black Hat USA 2011 and

organizing the Black Hat Arsenal Tools. This is an area for independent researchers and

the open source community that will allow you to showcase their work.

The worst and stupid Internet Strategy

Stop Online Piracy Act (SOPA)

PROTECT IP Act (PIPA)

Anti-Counterfeiting Trade Agreement (ACTA)

www.vulnerabilitydatabase.com

Contact Us

228 Hamilton Avenue 3rd Floor Palo Alto, CA 94301 contact (at) netpeas (dot) com Phone: +1 650 798-5109 Fax : +1 650 798-5001