Acra: Database Protection With Encryption & Intrusion Detection!

This year at RSA, I remember meeting with a vendor who dealt with database security by encrypting the database. I forget the name, but found a open source project – Acra, which I think is a promising product if designed & developed right.

Acra
Acra

Continue reading “Acra: Database Protection With Encryption & Intrusion Detection!”

Pwnbox: A Docker Container For Reverse Engineering & Exploitation!

Since I blogged a bit about docker security tools, I thought of continuing the trend and introduce Pwnbox, is an open source docker container that has tools to aid you in reverse engineering and exploitation. It allows you to package up an container with all of the tools of trade you need in a capture-the-flag situation, or elsewhere too!

Pwnbox
Pwnbox

Continue reading “Pwnbox: A Docker Container For Reverse Engineering & Exploitation!”

Ostinato: The Network Traffic Generator and Analyzer!

I had covered Ostinato in our earlier blog, before it got blown away and was reminded of it when I was working on the Apache Struts S2-046 vulnerability. I had a .pcap file which I had to replay and this is where Ostinato came into picture. A bit off track, if you want to protect yourself from S2-045 & S2-046, and your application is on Apache, simply add the following to your .htaccess file:

<IfModule mod_headers.c>
RequestHeader unset Content-Type
RequestHeader unset Content-Disposition
RequestHeader unset Content-length
</IfModule>

Back to Ostinato:

Ostinato
Ostinato

Continue reading “Ostinato: The Network Traffic Generator and Analyzer!”

Wifiphisher: Perform Automated Customized Phishing Attacks Against Wi-Fi Clients!

A human is the weakest link in cyber security and tools like Wifiphisher cement the fact. This tool exploits this weak link by launching a social-engineering attack leading the user to a phishing page and then you can get the users password or install your stuff.

Wifiphisher
Wifiphisher

Continue reading “Wifiphisher: Perform Automated Customized Phishing Attacks Against Wi-Fi Clients!”

Dagda: The Docker Security Suite!

The Docker security god must surely be smiling and thinking he must have done something right to have tools like Dagda that helps in performing static analysis of known vulnerabilities on Docker containers. If you did not get my “Docker security guard” analogy, I won’t blame you either. Google told me that Dagda¬†is an important god of Irish mythology.

Dagda
Dagda

Continue reading “Dagda: The Docker Security Suite!”

Sysdig Falco: The Open Source Behavioral Activity Monitor!

Since my last posts (Anchore & Docker Scan) were about Docker security, I thought I should continue the trend and blog about Sysdig Falco, the open source behavioral activity monitor with container support.

Sysdig falco
Sysdig falco

Continue reading “Sysdig Falco: The Open Source Behavioral Activity Monitor!”

OWASP Dependency-Check: The Vulnerable Library Detector!

At work, I wanted to check if there were any vulnerabilities in the JAVA libraries that were being used. This is when I remembered of an old project – OWASP Dependency-Check. I was pleasantly surprised to see that it was still being updated and maintained by Jeremy Long.

OWASP Dependency-Check
OWASP Dependency-Check

It really did work for me and I ended up updating the few libraries that were being used in my project!
Continue reading “OWASP Dependency-Check: The Vulnerable Library Detector!”