Tshark is actually part of the Wireshark package, and has some similar functionality. It does some cool stuff though so I thought it’s worthy of its own post. TShark is a network protocol analyzer. It lets you capture packet data from a live network, or read packets from a previously saved capture file, either printing […]
Serious Vulnerability In Adobe ColdFusion Application Server
We haven’t often reported anything relating to ColdFusion, the application server from Adobe, most likely because it’s not a very prevalent hosting platform. It was quite popular earlier in the decade before PHP became so popular, the choices back then were early versions of ASP, JSP and CFM. We’ve only posted one tool related to […]
RSMangler – Keyword Based Wordlist Generator For Bruteforcing
RSMangler will take a word list and perform various manipulations on it similar to those done by John the Ripper with a few extras. It goes along well with our previous post on Password Cracking Wordlists and Tools for Brute Forcing. There are other options too like Wyd – Automated Password Profiling Tool, which is […]
Dangerous iPhone iOS JailBreak Exploit Goes Public
Apple just released a patch for iOS that fixes the vulnerability that was being used by JailbreakMe website to exploit a weakness in PDF handling to Jailbreak the device. Shortly after that the developer of the JailbreakMe exploit released the code to the public via GitHub. The code is available in full here: http://github.com/comex/star But […]
BitBlaze – Binary Analysis Platform For Computer Security
Binary analysis is imperative for protecting COTS (common off-the-shelf) programs and analyzing and defending against the myriad of malicious code, where source code is unavailable, and the binary may even be obfuscated. Also, binary analysis provides the ground truth about program behavior since computers execute binaries (executables), not source code. However, binary analysis is challenging […]