Six Steps to Stop SQL Injections

Monday, June 8th, 2009

According to IBM ISS X-Force findings, SQL injections last year became the most common Web-based attack technique. Hackers are successful with these attacks largely due to poor coding practices. The following are six ways organizations can start to mitigate the risk from SQL injections. Slideshow: http://www.baselinemag.com/c/a/IT-Management/Six-Steps-to-Stop-SQL-Injections-129263/

Ophcrack 3.3.0 and Ophcrack LiveCD 2.3.0 Released

Monday, June 8th, 2009

Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds. Ophcrack version 3.3.0 includes support for our new tables vista_seven. These tables crack 99% of passwords of ...

Nessus v4.0.1 Released

Sunday, June 7th, 2009

The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. Fixes: Fixed memory & register leaks in NASL nessus-fetch ...

NetworkMiner 0.88 Released

Sunday, June 7th, 2009

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic. New functionalities in the v 0.88 release are: Support for the Cisco ...

Cain & Abel v4.9.31 Released

Sunday, June 7th, 2009

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...