Wednesday, February 12, 2014

WAVSEP 2014 Web Application Scanner Benchmark

The *2014* WAVSEP web application scanner benchmark has been published

Currently includes new products that were tested for the first time (ScanToSecure, N-Stalker), as well as returning vendors that were not tested for a while (NTOSpider).

Covering a total *63* vulnerability scanners, including commercial scanners, multiple SAAS engines and open source vendors, the research compares the performance of the various tested scanners in the following aspects:

(*) Prices vs. Features
(*) Automated Crawling (WIVET)
(*) Technology and Input Delivery Method Support
(*) Backup/Hidden File Detection Accuracy (*NEW!*)
(*) Unvalidated Redirect Detection Accuracy (*NEW!*)
(*) SQL Injection Detection Accuracy
(*) Cross Site Scripting Detection Accuracy
(*) Path Traversal / LFI Detection Accuracy
(*) (XSS/Phishing via) Remote File Inclusion
(*) Supported Vulnerability Detection Features (e.g. audit features)
(*) Authentication and Usability Features
(*) Coverage and Scan Barrier Support (AntiCSRF Tokens, CAPTCHA, etc)
(*) Etc

The benchmark *one page* result summary can be viewed through the following link:

The full article, which includes analysis and conclusions, can be accessed through the following link:

To be up to date with all news just follow

Tuesday, December 17, 2013

Faraday - Penetration Test IDE

Faraday introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.


* +40 Plugins (Metasploit, Amap, Arachini, Dnsenum, Medusa, Nmap, Nessus, w3af, Zap and More!)
* Collaborative support
* Information Highlighting
* Knowledge Filtering
* Information Dashboard
* Conflict Detection
* Support for multiple Workspaces
* IntelliSense Support
* Easy Plugin Development
* XMLRPC, XML and Regex Parsers

More info and Download:

Monday, December 2, 2013

Evil Foca - IPv4 and IPv6 Penetration testing tool


Evil Foca is a tool for Pentesters and Security Auditors to perform security testing in IPv4/ IPv6 data networks.  

The tool is capable to do different attacks such as:
  • MITM on IPv4 networks using ARP Spoofing and DHCP ACK injection.
  • MITM on IPv6 networks using Neighbor Advertisement Spoofing, SLAAC Attack, fake DHCPv6.
  • DoS (Denial of Service) on IPv4 networks using ARP Spoofing.
  • DoS (Denial of Service) on IPv6 networks using SLAAC Attack.
  • DNS Hijacking. 


Saturday, November 2, 2013

Retire.js - Command line Scanner and Chrome plugin

 Retire.js identify JavaScript libraries with known vulnerabilities in your application  

Retire.js is a command line scanner that helps you identify dependencies with known vulnerabilites in your application. Using the provided Grunt plugin you can easily include Retire.js into your build process. Retire.js also provides a chrome extension allowing you to detect libraries while surfing your website.

To detect a given version of a given component, Retire.js uses filename or URL. If that fails, it will download/open the file and look for specific comments within the file. If that also fails, there is the possibility to use hashes for minified files. And if that fails as well, the Chrome plugin will run code in a sandbox to try to detect the component and version. This last detection mechanims is not available in the command line scanner, as running arbitrary JavaScript-files in the node-process could have unwanted consequences. If anybody knows of a good way to sandbox the code on node, feel free to register and issue or contribute. 

It's important to note that even though your site is using a vulnerable library, that does not necessarily mean your site is vulnerable. It depends on whether and how your site exercises the vulnerable code. That said, it's better to be safe than sorry. 

More Info and Download:

Thursday, September 12, 2013

SpearPhisher – A Simple Phishing Email Generation Tool

SpearPhisher is a simple point and click Windows GUI tool designed for (mostly) non-technical people who would like to supplement the education and awareness aspect of their information security program. Not only is it useful to non-technical folks, penetration testers may find it handy for sending quick and easy ad-hoc phishing emails. The tool supports specifying different sending names and email addresses, multiple recipients via TO, CC, BCC, and allows bulk loading with one recipient email address per line in a file. It allows customization of the subject, adding one attachment, and SSL support for SMTP enabled mail servers. One of the popular features with our client is the WYSIWYG HTML editor that allows virtually anyone to use the tool; previewing results as you point and click edit your malicious email body. If you want to add custom XSS exploits, client side attacks, or other payloads such as a Java Applet code generated by the Social Engineer Toolkit (SET), its split screen editor allows more advanced users to edit HTML directly.

Download and more info:

Tuesday, September 10, 2013

DefCamp 2013

 International hacking and information security conference in Romania   

The DefCamp 2013 call for papers is officially open. The fourth edition of the international information security conference hosted in Romania will take place on November 29-30 2013, in Bucharest, at the Crystal Palace Ballroom. 

Over 300 security experts, researchers, and enthusiasts from Romania and neighboring countries are expected to take part in the event. Between 29 - 30th of November the Crystal Palace Ballroom is hosting one of the most mesmerizing events of hacking & information security in Romania, Defcamp. Now in its fourth year, the event continues to impress its audience with knowledge sharing, competition with varying levels of difficulty, romanian and foreign speakers, surprises and fun.

"We have awaited the 48 hours of DefCamp 2013 since the closing moment of the last edition. It is hypnotizing to exchange ideas, to compete, to expand your knowledge and to meet people who you know only from the virtual world. DCTF (DefCamp Capture the Flag) - our main competition of the conference, Hack the Machine, App2Own, Spot the Cop, Wall of Sheep are just a few of the activities that will try to captivate your attention at Defcamp 2013. Sometimes I wish I could participate for me to fully enjoy these moments!", said Andrei Avădănei founder and coordinator of the Defcamp conference.

The conference that will take place this fall will engage participants in discussions about 0days, PRISM, mobile security problems, DDOS, networking, P2P networks, D&D APT’s, social engineering. camera surveillance, application security research, lock picking, secure system administration with key industry specialist from Romania and abroad holding presentations. Everyone can apply to be a speaker at the conference, DefCamp 2013 being the first edition where we officially launched a Call for Papers.

The DCTF ( DefCamp Capture the Flag ) will have an on line qualifying round followed by a death defying duel during the event between the teams that enter the finals. The competition challenges are extremely provocative and various - exploits, cryptography, programming, steganography, forensics, reverse engineering etc, these subjects being dealt with in 25 problems from the first round. Similar activities, like DCTF, but dedicated directly to the participants of the event are Hack the Machine and App2Own where everyone will have at their disposal different services and services to put their skills to the test and win awards.

DefCamp managed to, in just 3 editions, be the most awaited conference in the entire information security and hacking scene in Romania. Its the perfect time to join and feel the vibes. For more details you can access the conferences website or you can contact us directly at the address

Tuesday, August 27, 2013

CookieCatcher - Session Hijacking Tool

CookieCatcher is an open source application which was created to assist in the exploitation of XSS (Cross Site Scripting) vulnerabilities within web applications to steal user session IDs (aka Session Hijacking). The use of this application is purely educational and should not be used without proper permission from the target application.

- Prebuilt payloads to steal cookie data
- Just copy and paste payload into a XSS vulnerability
- Will send email notification when new cookies are stolen
- Will attempt to refresh cookies every 3 minutes to avoid inactivity timeouts
- Provides full HTTP requests to hijack sessions through a proxy (BuRP, etc)
- Will attempt to load a preview when viewing the cookie data
- Basic AJAX Attack
- HTTPONLY evasion for Apache CVE-20120053
- More to come

Video Demo: