
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
NIELD is the Network Interface Events Logging Daemon. It is possible to receive notifications from kernel through rtnetlink socket and log events related to link state, neighbour cache, IP address, route, fib rules. Install Program # tar xvzf nield-x.x.tar.gz # cd nield-x.x # ./configure # make # make install Install ...
PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, 802.1X support, layer-2 isolation of problematic devices, integration with the Snort IDS and the Nessus vulnerability scanner; PacketFence ...
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application ...
Hack In Paris is an international and corporate security event that will take place in Disneyland Paris® from June 16th to 17th of 2011. Please refer to the homepage to get up-to-date information about the event. Topics The following list contains major topics the conference will cover. Please consider ...
MAEC™ International in scope and free for public use, MAEC is a standardized language for encoding and communicating high-fidelity information about malware based upon attributes such as behaviors, artifacts, and attack patterns. By eliminating the ambiguity and inaccuracy that currently exists in malware descriptions and by reducing reliance on signatures, ...
The Agency ENISA has issued a new guide on good practice, practical information and guidelines for the management of network and information security incidents by Computer Emergency Response Teams (CERTs). This should support the fight against cyber attacks Read Full story
A great paper from Chris Gates (carnalOwnage) enumerating techniques, vulnerabilities and metasploit modules to scan, identify and own a vulnerable Oracle based system. It is worth reading !!! Get it from this location (exploit-db)
Acunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits your web applications by checking for exploitable hacking vulnerabilities. Automated scans may be supplemented and cross-checked with the variety of manual tools to allow for comprehensive web site and web application penetration testing. New features: ...
Source: Wikipedia L0phtCrack is a password auditing and recovery application (now called L0phtCrack 6) originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, hybrid attacks, and rainbow tables. It was one of ...