Eikonal Blog

2011.04.04

lastlog

2011.02.24

Database security

Database auditing

Misc info

2010.12.06

Testing security of web services (Web services security testing)

2010.11.06

Security assessments for network infrastructure devices

2010.09.16

LiveCD distributions for information security

  • a list of Security Live CDs at Knoppix.net – http://www.knoppix.net/wiki/Security_Live_CD
  • BackTrack – Penetration Testing Distribution- http://www.backtrack-linux.org/ | http://en.wikipedia.org/wiki/BackTrack
  • DVWA (Damn Vulnerable Web App) – http://www.dvwa.co.uk/
      Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
  • NST (Network Security Toolkit) – http://networksecuritytoolkit.org/nst/index.html – a bootable ISO live CD/DVD (NST Live) based on Fedora Linux.
  • OWASP Live CD – http://appseclive.org/ | http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project:

      Welcome to AppSecLive.org! We are an online community focused on, you guessed it, web application security. We welcome all folks from all arenas to join us in discussing everything from tools to techniques relating to the security of the web. AppSecLive.org is also the new home of the OWASP Live CD, which is maintained by Matt Tesauro. This is where you will find support for the OWASP Live CD.
  • Samurai Web Testing Framework – http://samurai.inguardians.com/
      The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.
      Starting with reconnaissance, we have included tools such as the Fierce domain scanner and Maltego. For mapping, we have included tools such WebScarab and ratproxy. We then chose tools for discovery. These would include w3af and burp. For exploitation, the final stage, we included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.

2010.07.13

Stages of checking password crackability

  1. Check if password is empty.
  2. Check if password is equal to the username.
  3. For system (or application) provided accounts, use the Google to find default passwords provided by manufacturers’, and test them against these accounts on your system(s).
  4. Check if password is in the custom assembled corporate dictionary.
  5. Check if password is in the selected language’s dictionary. (see: https://eikonal.wordpress.com/2010/03/29/default-passwords/)
  6. Check if password is a dictionary word + one digit.
  7. Check if password is an 311tized word.
  8. Is password the concatenation of multiple words.
  9. Check in the database of precomputed password hashes.
  10. Desperate measure: brute force cracking.

2010.06.24

MetaSploit

Filed under: Penetration Testing, VA (Vulnerability Assessment) — Tags: , — sandokan65 @ 12:59

2010.01.06

Network discovery tools

Filed under: infosec, networking, Penetration Testing, VA (Vulnerability Assessment) — Tags: — sandokan65 @ 16:18

Blog at WordPress.com.