Blog Posts Tagged with "Open Source"


Metasploit: The Penetration Tester's Guide

January 30, 2012 Added by:Ben Rothke

The Metasploit Project is an open-source security project that provides information about security vulnerabilities and assists those performing the penetration tests in building a framework in which to carry out the testing...

Comments  (1)


Why I Won’t Teach You To Track Terrorists Online

January 17, 2012 Added by:Infosec Island Admin

This is an organic process. I learned by just doing it and in the process of “doing it” I had to learn A LOT of other things apart from technology issues like hacking/security/coding etc. Remember you are dealing with PEOPLE and you have to be adept and reading them...

Comments  (1)


PenTest: Get to Know Yourself Before Others Do

December 14, 2011 Added by:Malgorzata Skora

With multi-tier network architectures, web services, custom applications, and heterogeneous server platform environments, keeping data assets secure is more difficult than ever. Coupled with this complexity is the fact that criminal organizations have organized their hacking efforts...

Comments  (1)


Free From Defect Software License

November 22, 2011 Added by:Keith Mendoza

This is a question that I would like to pose to the open-source software community: Assuming that we can ignore the lawyers for a second, what amount of effort would you be willing to put to produce software that is free of defect from workmanship? How will you go about making sure?

Comments  (2)


Open Source Registry Decoder 1.1 Tool Released

November 02, 2011 Added by:Andrew Case

We are announcing the release of Registry Decoder 1.1, a free and open source tool. We are reaching out to practitioners and research groups (professional and academic) in an attempt to proliferate Registry Decoder. We would appreciate any plugins contributed from these communities...

Comments  (0)


Penetration Testing Tools Update: New Version of EAPeak Released

October 15, 2011 Added by:Spencer McIntyre

EAPeak is a suite of open source tools to facilitate auditing of wireless networks that utilize the Extensible Authentication Protocol framework for authentication. It provides useful information relating to the security of these networks for PenTesters to use in searching for vulnerabilities...

Comments  (0)


Anonymous: OSINT and Leaking of Corporate Corruption

September 28, 2011 Added by:Infosec Island Admin

Anonymous came up with a new splinter organization that claims to be looking into corporate wrongdoing. This group is called Anonymous Analytics and claims that they are using open source information as well as soliciting leaks/whistleblowers to reveal corporate malfeasance...

Comments  (0)


Got A Pile of Logs from an Incident: What to Do?

September 01, 2011 Added by:Anton Chuvakin

If you received any hints with the log pile, then you can search for this and then branch out to co-occurring and related issues and drill-down as needed, but then your investigation will suffer from “tunnel vision” of only seeing this initially reported issue and that is, obviously, a bad idea...

Comments  (0)


Digging for Information with Open Source Intelligence

August 22, 2011 Added by:Bozidar Spirovski

Identify your point of interest - who/what is your target of investigation. Start broad, and then narrow down to the interesting elements, then you can start drilling for material left on the Internet by them for further useful clues...

Comments  (0)


Information Gathering - Lessons from The Big Short

August 11, 2011 Added by:Bozidar Spirovski

Regardless of whether you need to collect information on a potential competitor, the target of a penetration test, for financial spread betting and derivatives trading, or even for financial research of a company there are several lessons that the "The Big Short" teaches us...

Comments  (0)


Homemade Spy Drone Cracks WiFi and GSM Networks

August 01, 2011 Added by:Headlines

"WASP is equipped with the tools to crack Wi-Fi network passwords made possible by an on-board VIA EPIA Pico-ITX PC running BackTrack Linux equipped with 32GB of storage to record information. WASP can also act as a GSM network antenna meaning it will be able to eavesdrop on calls/text messages..."

Comments  (6)


Introducing WPScan – A WordPress Security Scanner

June 16, 2011 Added by:Ryan Dewhurst

WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses in WordPress installations. Its intended use is for security professionals or WordPress administrators, and the code base is Open Source and licensed under GPLv3...

Comments  (1)


Understanding Network Forensics Makes Security Smarter

June 05, 2011 Added by:Kelly Colgan

Recovering successfully from a breach is definitely something to shoot for. But nothing makes executives smile, or helps build back customer confidence, more then putting the bad guys behind bars. It makes for good news headlines. Plan for it...

Comments  (0)


Using Open Source Business Intelligence Tools

February 09, 2011 Added by:Rahul Neel Mani

Open source BI tools do not have the same richness of features that the large BI tools have. There is a downside to this gap because many people have a need for those more advanced features. The good is that the open source products are less complex to configure and use for basic purposes...

Comments  (0)


The Case for an Open Source Physical Security Software

January 18, 2011 Added by:Guy Huntington

The open source formula usually delivers free software with a low yearly license. Use of this software should lower enterprises overall physical security budget over time as opposed to paying proprietary vendors large purchase amounts and annual license fees...

Comments  (0)


The Seven Deadly Sins of Software Security

January 10, 2011 Added by:Danny Lieberman

The software development environment of 20 years ago is radically different than today. Development tools are free, hardware is almost free and programming talent is a global resource. Its so easy to do things today but that's precisely the problem...

Comments  (1)

Page « < 1 - 2 - 3 > »