< Prev 4 5 6 7 8 9 10 11 12 13 14 Next >
Category: Auditing » Network
Acunetix Web Vulnerability Scanner
Audit your website security: Acunetix Web Vulnerability Scanner checks your web applications (shopping carts, forms, dynamic content, etc.) for vulnerabilities to SQL injection, Cross site scripting & other web attacks. Hackers are concentrating their efforts on websites: 75% of cyber attacks are launched on web applications! Scan your web site today and find vulnerabilities before hackers do!
Solsoft Firewall Manager
Solsoft Firewall Manager provides customers with centralized management of security policies across heterogeneous platforms that include leading firewall, router, switch, VPN, and IDS/IPS platforms.
is a graphical interface that will automate the design, deployment and documentation of security rules and policies as they pertain to a networked Netfilter firewall - the packet filtering framework inside the Linux 2.4.x and 2.6.x kernel series
1. Overview SwitchSniffer is a program that can scan your switched LAN for up hosts and can reroute and collect all packets without the target users' recognition. It can also detect the arpspoofer program running on the network and block user definable sessions like firewall. If you use this program in tandem with any sniffer program, you can capture and see the users IDs and passwords on a switched network. >>> What's new: -. MAC Based Blocking. -. Converting the ip address into the country name. -. Export the view data into an excel file -. Coloring each row items. Employing the speed bars. Finding out the collision of ip addresses. >>> Features: -. SwitchSniffer can poll and collect all the packets on the switched LAN. -. SwitchSniffer can scan and display the active hosts on the LAN quickly, and automatically. -. While spoofing ARP tables, SwitchSniffer can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.' -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in about 30 seconds. But, SwitchSniffer can keep spoofing continuously by updating the target computers ARP table more frequently. -. If one or more network interface cards are installed on a computer, you can choose which NIC you would like SwitchSniffer to scan and spoof through. -. SwitchSniffer can display information about the amount of data transferred to and from the internet. -. SwitchSniffer can detect if any computer on the LAN is running an arpspoofer program. -. SwitchSniffer can filter: sessions, local hosts, and remote hosts. The installation of the winpcap driver is not necessary for SwitchSniffer. -. SwitchSniffer can manage the local hosts based on MAC Address. -. SwitchSniffer can act as a plug-and-played router. -. SwitchSniffer can export the data of view into an excel file. >>> Benefits: -. SwitchSniffer can find hidden hosts on the LAN. -. SwitchSniffer can find if abnormal hosts are connected to your wireless network. -. SwitchSniffer protects your network from abnormal users. -. SwitchSniffer can check if there are abnormal packets on the LAN. -. SwitchSniffer allows you to capture user IDs, passwords, chat sessions and web sessions etc., on the switched network through the use of a sniffer application. -. SwitchSniffer can block the local hosts based on MAC Address. -. SwitchSniffer can resolve the problem of IP Collision. -. SwitchSniffer can find out the contry name by ip address on remote. -. SwitchSniffer enables you to monitor all the packets on a switch network.
dotDefender secures websites against a broad range of HTTP-based attacks, including Session attacks (e.g. Denial of Service), Web application attacks (e.g. SQL injection, Cross-site scripting, and known attack signatures), as well as requests originating from known attack sources ( e.g. spammer bots and compromised servers). dotDefender installs within moments on the Web server along with a predefined, configurable rule-base - enabling it to secure the Web environment from the moment it is deployed, with virtually no administrator intervention. dotDefender retails at a fraction of the cost of conventional web application firewalls, and is available for evaluation via a free 30-day trial.
SOAPSonar Enterprise Edition
SOAPSonar Enterprise Edition is a SOAP/XML Web Services diagnostics tools. The software performs Vulnerability Assessment and Compliance Testing of SOAP/XML based Web Services. Vulnerability Assessment enables a user to perform vulnerability discovery, risk assessment and risk mediation of an Enterprise Web Service. The software also provides Functional and Performance testing features. The software has a very rich reporting engine that enables the user to determine the risk posture of a Web Service.
JProbe will check remotely for supported cipher suites on a webserver. It will also check for redirections in case a cipher is supported but the client is then directed to a "not valid cipher" page. JProbe also will export the results to an HTML page. (Additionally you can set cookies)
Netdiscover is an active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks. Built on top of libnet and libpcap, it can passively detect online hosts, or search for them, by actively sending arp requests, it can also be used to inspect your network arp traffic, and find network addresses using auto scan mode, which will scan for common local networks.
Rogue Network Tools
The Rogue Network Tools allow you to perform active discovery of unauthorized network links.
Thor is Internet Explorer driven tool for manual web application testing. Both security professionals and testers found it useful while testing web applications. You can control (intercept and change) what web forms submit to web servers, see the source code of the page and/or manipulate cookies. It supports frames and, if required, it is possible to use HttpWebRequest instead of IE navigation. Built for .NET Framework 2.0 and, as it uses IE COM control, it requires FullTrust. Sorry, no proper web page or manual yet, but give me a shout if you need more information... pak76
Browse by category