29 Sept 2009

Vulnerability assessment tools

Application Security DbProtect [$30,000 for 5 DB]
Enterprise-class database security, risk and compliance suite. It combines discovery, vulnerability scanning, real-time activity monitoring, auditing and intrusion detection to help organizations reduce risk and enhance compliance throughout their database infrastructure. This product can protect databases from internal and external threats, as well as ensuring regulatory compliance. SC Review

Auditor Assuria
[$3,800 starter pack: central software + 5 agents]
Security and compliance scanner for enterprise servers. This product features capabilities, such as vulnerability assessment, system change detection, system information and regulatory compliance. The Auditor can actively scan systems using agents deployed across the enterprise network, and these agents report back to the main console. SC Review

Cenzic Hailstorm ARC [$26,000]
Web application vulnerability scanner. This product can scan websites and web applications in the enterprise to see how vulnerable they are to possible attack from hackers. This application can also go above and beyond standard scanning by providing complete risk analysis and compliance checks as well. SC Review

Core Security Technologies Core Impact Pro 8 [$30,000/year]
One of our favorite tools is back this year and it's better than ever. Core Impact Pro 8 is the ultimate tool in vulnerability assessment and penetration testing. It provides a comprehensive suite of features gathered in one place. This product can be used to scan and exploit systems using multiple modules for information gathering, exploitation, local information gathering, privilege escalation, pivoting, and clean-up and reporting. This tool also deploys agents that run in the target's memory if a target can be exploited. SC Review

eEye Digital Security Retina [$575 for 32 IPs]
Multi-platform vulnerability management. Retina identifies known and zero-day vulnerabilities and provides security risk assessment, enabling security best practices, policy enforcement and compliance with regulatory audits. This product analyzes specific pieces of the operating system, applications and policies. The tool targets high-risk host components and how a cybercriminal could potentially leverage them for malicious activity. SC Review

GFI LANguard [10-24 IPs at $32/IP]
Vulnerability assessment engine able to discover more than 15,000 vulnerabilities, including Microsoft missing patches in various languages. This product can scan and discover vulnerabilities across the network. It uses an update engine, which runs in real time and synchronizes the local vulnerability database with the latest releases from Microsoft, CVE, OVAL and SANS. SC Review

IBM ISS Network Enterprise Scanner [$7,250]
Proactive tool that accelerates time to risk reduction by prioritizing vulnerability remediation tasks. It eliminates manual steps by allowing continuous automated scanning across multiple network segments from a single appliance. It helps you leverage existing investments and decrease the cost of ownership through IT system integration (ISS SiteProtector, Virtual Patching). It helps identify existing IT risks and enables you to observe due diligence in conforming to regulatory requirements. CC Eval. CVE Support.

IBM Rational AppScan [starts at $17,500]
Protects against the threat of attacks and data breaches. Web application security, including new Malware detection capabilities, can be used for vulnerability scanning in all stages of application development and by testers with or without security expertise. SC Review.

McAfee Vulnerability Manager [$16,820 for 1,000 IP addresses]
Network vulnerability scanner and network auditing tool. This appliance can actively discover and scan network assets across the enterprise looking for possible threats that leave these assets vulnerable to attack. Vulnerability Manager does this using its very versatile scanning engine. SC Review

netVigilance SecureScout NX [$595]
network vulnerability scanning tool that at first glance looks like a scanning tool from times past. However, this product packs a serious punch. The SecureScout can scan almost anything that has an IP address - be it firewalls, routers, operating systems or anything else you can find to throw at it. The tool can also do in-depth firewall testing and scan multiple subnets from one console. SC Review

N-Stalker Web Application Security Scanner [$1,399/URL, $6,299 unlimited]
Assesses a web application against a wide range of vulnerabilities, including the application layer and infrastructure layer. Scans for the application layer are based on the Open Web Application Security Project (OWASP) Top 10 and Common Weakness Enumeration (CWE) Top 25. Scans against the infrastructure layer include more than 35,000 signatures for server and third-party packages. SC Review

Ounce Labs Ounce 6 [$30,000]
Static source code security analysis. It will analyze any application written in C/C++, Java/JSP, .NET (C#, VB .NET, ASP.NET), Classic ASP (VBScript, JavaScript) and Visual Basic 6. This product provides a way to carefully examine any source code written in these languages for possible holes and vulnerabilities. These applications do not need to be web-based. Any source code can be tested. SC Review

Saint Saint Suite [$2,695 for a Class C]
Vulnerability scanning across a vast number of platforms, routers and basically anything else with an IP address. It can also try to exploit and penetrate those vulnerabilities using a penetration tool. This provides an all-around overview of network vulnerabilities. SC Review

Sunbelt Software Network Security Inspector
[$795-$3,495 based on employee size]
Network vulnerability scanner using a database of over 4,000 ranked multiplatform vulnerabilities. This product can perform comprehensive vulnerability assessment without causing interruptions to the machines being scanned. The tool not only detects vulnerabilities, but also shows how to remediate the threat by providing locations where, if any, applicable patches can be downloaded to fix the machine. SC Review


27 Sept 2009

Anatomy of an attack

SANS: The Top Cyber Security Risks
Good attack process explanation

Security Report - Anatomy of an Attack - Introduction

Security Report - Anatomy of an Attack - Introduction

apache-scalp

apache-scalp is an Apache log file IDS.

See also http://php-ids.org/

Exploit toolkits used by crackers

Durzosploit is a javascript exploits generator framework that works through the console. This goal of that project is to quickly and easily generate working exploits for cross-site scripting vulnerabilities in popular web applications or web sites.It does not find browser vulnerabilities, it's only a framework containing exploits.

MPack is a PHP-based malware kit produced by Russian crackers. Since 2006, a new version is thought to have been released roughly every month. It is thought to have been used to infect up to 160,000 PCs with keylogging. In August 2007 it was believed to have been used in an attack on the web site of the Bank of India which originated from the Russian Business Network.

Firepack: Exploit toolkit which utilizes PHP on the server side, on the client Javascript and Vbscript and exploits MSIE 6

Adpack stands for "Advanced Pack" and was written in PHP on the server side along with SQL backend for tracking and statistics.

Neosploit is an advanced exploit framework to compromise web site visitors. It's not as popular as the Mpack toolkit but has gained popularity. Used as a CGI script, it can support multiple users from the same script. The exploit code will be the same from all users but the delivered executables can be different. Similar to other toolkits this one provide various statistics too. The following information about the visitor is logged: Operating System, Web browser and its version, IP address, and the Referer.Delivered exploit code is obfuscated using custom Javascript decoding function. The function name and all local variables are random in order to avoid detection by Network IDS. Often, several layers of obfuscation with anti-decoding tricks are used to deter the faint-hearted. It seems that development of this exploit pack has ended. Apparently, efforts which are put into development are not returning enough income and support is ending.

For more details, see http://dxp2532.blogspot.com

Defeating Signature-Based AV Scanners

[yehg.net] Download DefeatingSignature-BasedAVScanners.zip

Video showing different javascript obfuscation methods to defeat signature-based Anti-Virus software.

24 Sept 2009

Loi sur l'accès aux documents des organismes publics et sur la protection des renseignements personnels (org. publics)

Titre de la loi: "Loi sur l'accès aux documents des organismes publics et sur la protection des renseignements personnels"

Loi sur la protection d'information personnelle dans le secteur privé

An Act respecting the protection of personal information in the private sector