Archive | Countermeasures




fwknop – Port Knocking Tool with Single Packet Authorization

Port Knocking came about in around 2003, but it has various weaknesses. There are plenty of implentations though (some quite advanced). Most of the problems are fixed however by fwknop! fwknop stands for the “FireWall KNock OPerator”, and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Network Hacking, Security Software | Add a Comment

psad – Intrusion Detection and Log Analysis with iptables

psad is a collection of three lightweight system daemons (two main daemons and one helper daemon) that run on Linux machines and analyze iptables log messages to detect port scans and other suspicious traffic. A typical deployment is to run psad on the iptables firewall where it has the fastest access to log data. psad […]

Tags: , , , , , , ,

Posted in: Countermeasures, Network Hacking, Security Software | Add a Comment

MoocherHunter – Detect & Track Rogue Wifi Users

MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. It’s included as part of the OSWA Assistant LiveCD we mentioned quite recently.’ I wanted to mention this tool separately as I think it’s very cool! MoocherHunter™ identifies the location of an 802.11-based wireless moocher or hacker by […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Security Software, Wireless Hacking | Add a Comment

Lynis – Security & System Auditing Tool for UNIX/Linux

Lynis is an auditing tool for Unix (specialists). It scans the system and available software, to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This is a tool that might be useful for both penetration testers performing white box tests and system admins […]

Tags: , , , , , , ,

Posted in: Countermeasures, Linux Hacking, Security Software | Add a Comment

Which Browser Users Are More Secure?

Some new statistics just came out regarding Browser Security, this is more in terms of which users are most likely to apply patches and be using the most secure version. I would have thought Firefox would have been pretty high since the newer series prompt automatically new patches. My only guess is a lot of […]

Tags: , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities | Add a Comment

NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance

You might remember a while ago we mentioned MP3 spam, which in October last year was the latest evolution in spam. Currently there is a new type annoying mail-server owners the world over, it’s known as NDR or Backscatter Spam and involved NDRs or Non Delivery Reports (those emails you get when you send a […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Spammers & Scammers | Add a Comment

ArpON – ARP Handler Detect and Block ARP Poisoning/Spoofing

ArpON (Arp handler inspectiON) is a portable handler daemon with some nice tools to handle all ARP aspects. It has a lot of features and it makes ARP a bit safer. This is possible using two kinds of anti Arp Poisoning tecniques, the first is based on SARPI or “Static ARP Inspection”, the second on […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Network Hacking | Add a Comment

AV Firms Split Over Defcon Contest

Now this is a pretty interesting contest from the guys at Defcon, antivirus evasion! It’s a question that gets asked a LOT…how do I avoid AV? There are various ways to do it and I’ll be interested to see which are used in the contest, the most elegant solutions of course get better prizes. Security […]

Tags: , , , , , , , , , , , , ,

Posted in: Countermeasures, Events/Cons, Malware | Add a Comment

HDIV – Java Web Application Security Framework

HDIV (HTTP Data Integrity Validator) is a Java Web Application Security Framework. HDIV extends web applications’ behaviour by adding Security functionalities, maintaining the API and the framework specification. This implies that we can use HDIV in applications developed in Struts 1.x, Struts 2.x, Spring MVC and JSTL in a transparent way to the programmer and […]

Tags: , , , , , , ,

Posted in: Countermeasures, Web Hacking | Add a Comment

WSGW – Web Security Gateway for Secure Apache

The Web Security Gateway is a security-centric distribution of the Apache web server, bundled with additional security modules, and configured as a front-end (reverse) HTTP proxy. The goal is to mirror most of the features of commercial web application “firewalls”, with free and Open-Source software. The Web Security Gateway provides a configurable caching, authentication, input […]

Tags: , , , , , , , , , , , ,

Posted in: Countermeasures, Web Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·