Blog Posts Tagged with "Open Source"

3e35900ae6facc6c146a85c435c71d82

Metasploit: The Penetration Tester's Guide

January 30, 2012 Added by:Ben Rothke

The Metasploit Project is an open-source security project that provides information about security vulnerabilities and assists those performing the penetration tests in building a framework in which to carry out the testing...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Why I Won’t Teach You To Track Terrorists Online

January 17, 2012 Added by:Infosec Island Admin

This is an organic process. I learned by just doing it and in the process of “doing it” I had to learn A LOT of other things apart from technology issues like hacking/security/coding etc. Remember you are dealing with PEOPLE and you have to be adept and reading them...

Comments  (1)

1a490136c27502563c62267354024cd5

PenTest: Get to Know Yourself Before Others Do

December 14, 2011 Added by:Malgorzata Skora

With multi-tier network architectures, web services, custom applications, and heterogeneous server platform environments, keeping data assets secure is more difficult than ever. Coupled with this complexity is the fact that criminal organizations have organized their hacking efforts...

Comments  (1)

Af9c34417f8e5e0d240850bb353b5d40

Free From Defect Software License

November 22, 2011 Added by:Keith Mendoza

This is a question that I would like to pose to the open-source software community: Assuming that we can ignore the lawyers for a second, what amount of effort would you be willing to put to produce software that is free of defect from workmanship? How will you go about making sure?

Comments  (2)

Bdcd1324539ec513ff7c10014b9668b6

Open Source Registry Decoder 1.1 Tool Released

November 02, 2011 Added by:Andrew Case

We are announcing the release of Registry Decoder 1.1, a free and open source tool. We are reaching out to practitioners and research groups (professional and academic) in an attempt to proliferate Registry Decoder. We would appreciate any plugins contributed from these communities...

Comments  (0)

759c37c6aff04cd46262f93652b5fad5

Penetration Testing Tools Update: New Version of EAPeak Released

October 15, 2011 Added by:Spencer McIntyre

EAPeak is a suite of open source tools to facilitate auditing of wireless networks that utilize the Extensible Authentication Protocol framework for authentication. It provides useful information relating to the security of these networks for PenTesters to use in searching for vulnerabilities...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous: OSINT and Leaking of Corporate Corruption

September 28, 2011 Added by:Infosec Island Admin

Anonymous came up with a new splinter organization that claims to be looking into corporate wrongdoing. This group is called Anonymous Analytics and claims that they are using open source information as well as soliciting leaks/whistleblowers to reveal corporate malfeasance...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Got A Pile of Logs from an Incident: What to Do?

September 01, 2011 Added by:Anton Chuvakin

If you received any hints with the log pile, then you can search for this and then branch out to co-occurring and related issues and drill-down as needed, but then your investigation will suffer from “tunnel vision” of only seeing this initially reported issue and that is, obviously, a bad idea...

Comments  (0)

E973b16363b3de77b360563237df7e32

Digging for Information with Open Source Intelligence

August 22, 2011 Added by:Bozidar Spirovski

Identify your point of interest - who/what is your target of investigation. Start broad, and then narrow down to the interesting elements, then you can start drilling for material left on the Internet by them for further useful clues...

Comments  (0)

E973b16363b3de77b360563237df7e32

Information Gathering - Lessons from The Big Short

August 11, 2011 Added by:Bozidar Spirovski

Regardless of whether you need to collect information on a potential competitor, the target of a penetration test, for financial spread betting and derivatives trading, or even for financial research of a company there are several lessons that the "The Big Short" teaches us...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Homemade Spy Drone Cracks WiFi and GSM Networks

August 01, 2011 Added by:Headlines

"WASP is equipped with the tools to crack Wi-Fi network passwords made possible by an on-board VIA EPIA Pico-ITX PC running BackTrack Linux equipped with 32GB of storage to record information. WASP can also act as a GSM network antenna meaning it will be able to eavesdrop on calls/text messages..."

Comments  (6)

A6f6ba95b73de19f947cf4eceecb2bed

Introducing WPScan – A WordPress Security Scanner

June 16, 2011 Added by:Ryan Dewhurst

WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses in WordPress installations. Its intended use is for security professionals or WordPress administrators, and the code base is Open Source and licensed under GPLv3...

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Understanding Network Forensics Makes Security Smarter

June 05, 2011 Added by:Kelly Colgan

Recovering successfully from a breach is definitely something to shoot for. But nothing makes executives smile, or helps build back customer confidence, more then putting the bad guys behind bars. It makes for good news headlines. Plan for it...

Comments  (0)

F520f65cba281c31e29c857faa651872

Using Open Source Business Intelligence Tools

February 09, 2011 Added by:Rahul Neel Mani

Open source BI tools do not have the same richness of features that the large BI tools have. There is a downside to this gap because many people have a need for those more advanced features. The good is that the open source products are less complex to configure and use for basic purposes...

Comments  (0)

5c9886924588e138cc18290742c2095e

The Case for an Open Source Physical Security Software

January 18, 2011 Added by:Guy Huntington

The open source formula usually delivers free software with a low yearly license. Use of this software should lower enterprises overall physical security budget over time as opposed to paying proprietary vendors large purchase amounts and annual license fees...

Comments  (0)

959779642e6e758563e80b5d83150a9f

The Seven Deadly Sins of Software Security

January 10, 2011 Added by:Danny Lieberman

The software development environment of 20 years ago is radically different than today. Development tools are free, hardware is almost free and programming talent is a global resource. Its so easy to do things today but that's precisely the problem...

Comments  (1)

Page « < 1 - 2 - 3 > »