Monday, June 8th, 2009
According to IBM ISS X-Force findings, SQL injections last year became the most common Web-based attack technique. Hackers are successful with these attacks largely due to poor coding practices. The following are six ways organizations can start to mitigate the risk from SQL injections.
Slideshow:
http://www.baselinemag.com/c/a/IT-Management/Six-Steps-to-Stop-SQL-Injections-129263/
Posted in Internet, Security | No Comments
Monday, June 8th, 2009
Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.
Ophcrack version 3.3.0 includes support for our new tables vista_seven. These tables crack 99% of passwords of ...
Posted in Internet, Privacy, Security, Windows | No Comments
Sunday, June 7th, 2009
The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.
Fixes:
Fixed memory & register leaks in NASL
nessus-fetch ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Sunday, June 7th, 2009
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.
New functionalities in the v 0.88 release are:
Support for the Cisco ...
Posted in Internet, Networking, Privacy, Security, Software, Windows | No Comments
Sunday, June 7th, 2009
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...
Posted in Internet, Privacy, Security, Windows | No Comments