Banner 1

Herramientas lanzadas en Defcom 16



Beholder – by Nelson Murilo and Luis Eduardo
# Descripción: An open source wireless IDS program
# Pagina: http://www.beholderwireless.org/
# Correo: bh@beholderwireless.org

The Middler – by Jay Beale
# Descripción: The end-all be-all of MITM tools
# Pagina: http://www.themiddler.com/ (Online?)
# Preface Link: http://www.intelguardians.com/themiddler.html

ClientIPS – by Jay Beale
# Descripción: An open source inline “transparent” client-side IPS
# Pagina: http://www.ClientIPS.org/ (Online?)

Marathon Tool – by Daniel Kachakill
# Descripción: A Blind SQL Injection tool based on heavy queries
# Download Link: http://www.codeplex.com/marathontool
# Correo: dani@kachakil.com

The Phantom Protocol – by Magnus Brading
# Descripción: A Tor-like protocol that fixes some of Tor’s major attack vectors
# Pagina: http://code.google.com/p/phantom
# Correo: brading@fortego.se

ModScan – by Mark Bristow
# Descripción: A SCADA Modbus Network Scanner
# Pagina: http://modscan.googlecode.com/
# Correo: mark.bristow@gmail.com

Grendel Scan – by David Byrne
# Descripción: Web Application scanner that searches for logic and
design flaws as well as the standard flaw seen in the wild today (SQL
Injection, XSS, CSRF)
# Pagina: http://grendel-scan.com/

iKat – interactive Kiosk Attack Tool (This site has an image as a
banner that is definitely not safe for work! – You have been warned) by
Paul Craig

# Descripción: A web site that is dedicated to helping you break out of Kiosk jails
# Pagina: http://ikat.ha.cked.net
# Correo: paul.craig@security-assessment.com

DAVIX – by Jan P. Monsch and Raffael Marty
# Descripción: A SLAX based Linux Distro that is geared toward data/log visualization
# Pagina: http://code.google.com/p/davix/
# Download Link: http://www.geekceo.com/davix/davix-0.5.0.iso.gz
# Correo: jan.monsch@iplosion.com and raffy@secviz.org

CollabREate – by Chris Eagle and Tim Vidas
# Descripción: An IDA Pro plugin with a server backend that allows
multiple people to collaborate on a single RE (reverse engineering)
project.
# Pagina: http://www.idabook.com/defcon
# Correo: cseagle@gmail.com and tvidas@gmail.com

Dradis – by John Fitzpatrick
# Descripción: A tool for organizing and sharing information during a penetration test
# Pagina: http://dradis.sourceforge.net
# Correo: john.fitzpatrick@mwrinfosecurity.com

Squirtle – by Kurt Grutzmacher
# Descripción: A Rouge Server with Controlling Desires that steals NTLM hashes.
# Pagina: http://code.google.com/p/squirtle (Live?)
# Correo: grutz@jingojango.net

WhiteSpace – by Kolisar
# Descripción: A script that can hide other scripts such as CSRF and iframes in spaces and tabs
# Download Link: DEFCON 16 CD

VoIPer – by nnp
# Descripción: VoIP automated fuzzing tool with support for a large number of VoIP applications and protocols
# Pagina: http://voiper.sourceforge.net/

Barrier – by Errata Security
# Descripción: A browser plugin that pen-tests every site that you visit.
# Pagina: http://www.erratasec.com
# Correo: sales@erratasec.com

Psyche – by Ponte Technologies
# Descripción: An advanced network flow visualization tool that is not soley based on time.
# Pagina: http://psyche.pontetec.com/


DEFCON 16 CD (conversaciones, soft, etc)

File: defcon16.iso
Size: 734537728
MD5: 04F944946A3AA4B6B9C6C2E738D0B9D0
SHA1: 6F63D4E58B71D6F161793699E9DB131B75D4A8D7

Code:
http://www.i-hacked.com/freefiles/defcon16.iso
Pagina de DEFCON con archivos multimedia:
Code:
https://www.defcon.org/html/links/defcon-media-archives.html

No hay comentarios:

Powered by Bad Robot
Helped by Blackubay