google/nogotofail – Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on devices and applications in a flexible, scalable, powerful way. It includes testing for common SSL certificate verification issues, HTTPS and TLS/SSL library bugs, SSL and STARTTLS stripping issues, cleartext issues, and more. [ via http://www.bufferoverflow.it/ ]
Lynis – Security auditing tool for Unix/Linux systems – Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). Even the installation of the software itself is optional!
Nagios 4 (core) Check_mk pnp4Nagios Nagvis – About monitoring – Since Nagios 4 version release there was an important addon update pending. Recently, check_mk released its innovation version check_mk-1.2.5i2 including MK Livestatus with compatibility with Nagios Core 4. We need therefore check_mk-1.2.5i2 or higher to run check_mk with Nagios Core 4.
RIPS – Static Source Code Analysis For PHP Vulnerabilities – Darknet – The Darkside – […] RIPS is a tool written in PHP to find vulnerabilities using static source code analysis for PHP web applications. By tokenizing and parsing all source code files RIPS is able to transform PHP source code into a program model and to detect sensitive sinks (potentially vulnerable functions) that can be tainted by user input (influenced by a malicious user) during the program flow. Besides the structured output of found vulnerabilities RIPS also offers an integrated code audit framework for further manual analysis.[…] [via http://www.bufferoverflow.it/ ]
These are my links for 2 ott 2014 through 3 ott 2014:
NetApp built-in packet capture | VirtuallyMikeBrown – They way I use this, as you might expect, is to start the capture, perform the operation that’s failing, and then stop the capture. So as not to capture too much traffic and therefore have to wade through all of it, I try to perform those steps rather quickly. But then again, if you know a few useful features of Wireshark, you can get around in the capture file pretty easily.