Five More Hacker Tools Every CISO Should Understand

2019-03-02 23:44|来源: 网路

As we mentioned in the first article, Top Five Hacker Tools Every CISO Should Understand, the role of the CISO continues to evolve within organizations towards that of an executive level position.

Nonetheless, CISOs need to keep on top of the best tools and technologies available that can benefit their organization’s security posture.

We recently spoke to Nabil Ouchn (@toolswatch), the founder of the portal ToolsWatch.org and organizer of the Arsenal Tools exhibit at the BlackHat Conferences, and asked him to assemble what he believed to be the top ten hacker tools every CISO should understand.

Here are five more hacker tools for the CISO playbook, according to Ouchn:

Vega Open Source Web Application Scanner

“How many applications are developed internally in large companies that are not subject to a regular security inspection?” Ouchn asks. “This is one of the CISO’s biggest fears: Deploying an application without validating the security status.

“Fortunately Vega Open Source can do the job and check whether the developers have followed a Security Development Lifecycle. Vega is a free and open source scanner designed to test the security of web applications,” Ouchn explains.

“Vega can help CISO’s internal teams to find and validate SQL Injection, Cross-Site Scripting (XSS) and all the vulnerabilities described in the OWASP Top Ten, and can significantly reduce the exposure of an application.”

“This tool can be part of a continuous loop for securing applications and can used in two different ways: By the development team to ensure that their processes is clean against the OWASP Top Ten most exploited issues, and by Red tiger teams to assess the application prior to its deployment,” Ouchn continued.

“Solutions for Web Application security are many, and the choice should not be limited only to Vega, so we could also include in the same vein tools like Wa3f, Watobo or Netsparker Community, Burp Suite, and Zap. Each solution has its strong point and can be used to fill the application security gap.”

Open Vulnerability Assessment Language Interpreter (OVAL)

It is very important to keep an eye on the security status of internally deployed systems, and OVAL Interpreter has been developed with this task in mind, Ouchn says.

“It provides a non-intrusive way to check the OS compliance and security levels. An ideal tool for OS / Systems configuration management. The hands-on is very simple and the added value is enormous. The tool is part of a bundle toolkit created by Mitre for analysis of configuration and vulnerabilities,” Ouchn said. “A CISO must add this tool to his arsenal.”

“The icing on the cake is that the tool generates an HTML report and has several testcases called “Definitions” to conduct with an application’s inventory, patch management overview, vulnerability checking, etc. A must for CISO and system administrators.” (See also Open-SCAP and XCCDF Interpreter).

Scuba – The Free Database Vulnerability Scanner

“Databases are critical assets for an information system, and therefore CISOs must implement the best strategy to protect them,” Ouchn said.

“To do so, we must draw a picture of the vulnerabilities they suffer from, and that is where Scuba comes into play. It ships with an average 1200 built-in testcases to check for vulnerabilities and configurations. It also overs the basics of the most common databases such as Oracle and Microsoft SQL Server,” Ouchn continued.

“A CISO should always instruct database admins to constantly assess the configuration of their databases. While Scuba cannot perform the exploitation of vulnerabilities, Metasploit is already in the Arsenal for that,” Ouchn says.

“To fill the gap, we also recommend using the OpenVAS (Open Source Vulnerability Scanner) with its several dedicated database plugins.” (See also oriented database Nessus plugins.)

Drozer – An Android Device’s Metasploit

“In the last decade, mobile phones have become a thorn in the side for security managers, and their security should not escape the attention of the CISO,” Ouchn said.

Drozer is the perfect tool to demonstrate how an Android application poorly developed or subject to compromise could become a Trojan in an enterprise network environment and ruin the whole security in depth strategy.”

“Drozer can perform an Android systems security assessment prior to a massive deployment within a company, and a wise CISO can indeed ensure that the devices comply with the security policy by checking the installed packages, the services in use, the possible vulnerabilities identified, and the opportunities to exploit them,” Ouchn continued.

“We must not fool ourselves, smartphones and other intelligent mobile devices are rooted in the culture, and an aware CISO must manage and secure them as best they can.” (See also SPF – Smartphone Pentesting Framework).

PwnPad – The Sexiest Pentesting Tablet

“I saved the best for last. One of the gadgets that has taken the security and hacking community by storm right now is the PwnPad Nexus tablet created by Pwnie Express. In fact, this one has all the ingredients to compromise your network,” Ouchn said.

“The tablet has been designed in such a way to work in all cases: It has WiFi dongle for cracking Wireless networks and a Bluetooth dongle and support for Mobile Data, and the best tools used by security professionals are already integrated and pre-configured.”

“It only takes few clicks and little effort to configure a malicious rogue AP and trap anyone who connects into it, so this is a great tool for performing pentesting, wireless assessment (WiFi / Bluetooth) and Awareness campaigns to educate internal users to avoid connecting to any open WiFi network,” Ouchn continued. “The Pwnpad hardware is a must for a CISO’s Red Tiger team.”

“The tablet has a significant cost if you opt to buy it, however there’s an option to build your own using the Community Release (here is my own: http://www.toolswatch.org/2013/05/installing-my-own-pwnpad-community-for-fun-and-for-less-than-300/)”.


转自:http://www.cnblogs.com/microzone/p/3324434

相关问答

更多
  • understand sth 或者understand sb doing sth understand: [ ˌʌndə'stænd ] v. 理解,了解,领会,闻知 词形变化: 形容词:understandable 副词:understandably 名词:understandability 动词过去式:understood 过去分词:understood 现在分词:understanding 第三人称单数:understands 例句与用法: 1. If you can't do it, I will ...
  • 我怀疑你是从资源管理器的图标缓存中看到图标的。 I suspect that you are seeing the icon from explorer's icon cache.
  • 如果它是加密的,你确实有机会(事实上,你有100%的机会,如果你正确处理它):密钥必须驻留在你的计算机上的某个地方。 只需弹出你最喜欢的调试器,看一下(错误,一百个字节,我希望)数据从套接字进来,设置一个关于该数据的观察点,并查看访问的事物的堆栈跟踪它。 如果你真的很幸运,你甚至可能会看到它被解密了。 如果没有,你可能会发现他们正在使用标准加密算法(从理论上的安全角度来看,他们不是傻瓜)要么通过查看堆栈跟踪(如果你很幸运),要么使用其中一个IV / S-box分析器(避开学术分析器,大多数不能没有很多麻烦) ...
  • 尝试GNU cflow ,它将分析函数的调用树 - 您将很好地看到函数的调用层次结构。 或者使用Eclipse浏览代码。 Try GNU cflow, that will analyze the call tree of the functions - you will nicely see the call hierarchy of the functions. Or browse the code with Eclipse.
  • 有几个问题。 从func返回时确实会溢出你的int 。 另外,你的printf语句应该是printf("%llu\n", count); 所以, func , count和局部变量j的返回值都应该unsigned long long并且打印输出也应该反映出来。 因为func的返回语句中的算术运算(至少在VS 2013中是这种情况),所以需要将j unsigned long long 。 There are a couple of issues. You are indeed overflowing your ...
  • 想象一下你有K个数字{a0,a1,a2...a(k-1)} ,现在你想找到第一个不在它们中的非负数。 可以超过K吗? 如果这是真的,那么所有数字{0,1,...K}都出现在上面的集合中,并且K+1数字应该出现在上面的集合中,其由K数字组成。 这是不可能的,并且与新数字大于K的假设相矛盾。 因此,在每个步骤中,您添加的下一个数字将在[0,K]范围内,因此在K+1步骤中,所有最后的K+1数字将在该步骤中,因此在该范围内是不同的数字。 Imagine you have K numbers {a0,a1,a2... ...
  • PE文件的资源是可执行文件的内部结构(标头)的一部分。 所以你不能隐藏它们或只读。 只有您可以检查资源是否被修改,以便保护您的资源免受修改 1.)存储一个资源或外部文件(加密)与你的EXE资源的散列,当你的应用程序初始化比较存储的散列与当前。 2.)您可以存储您的资源加密,这可以使用后建立事件或执行一个外部工具来加密您的资源编译您的exe后,然后当该应用程序初始化您可以解密内存中的资源。 The resources of a PE File are part of the internal structur ...
  • 我偶然发现了同样的问题。 这是因为将'tools.sessions.secure'设置为True会将“安全”标志添加到存储会话标识的生成cookie中。 如果您在CherryPy中未使用HTTPS,则此cookie将不会在任何后续请求中返回,因此每次都会生成一个新的会话ID。 在CherryPy中启用HTTPS可以解决问题。 有关如何启用此功能,请参阅有关SSL的CherryPy文档 。 I've just stumbled across this same problem. This is because ...
  • 这个维基百科页面给出了一个体面的工具列表,您可能会发现有帮助。 我喜欢cpplint,我自己。 This Wikipedia page gives a decent list of tools that you may find helpful. I'm fond of cpplint, myself.
  • Tools基本上是可以添加到TextView的额外属性的集合,可以在Android Studio中设计布局时为您提供帮助。 在此特定示例中, tools:text允许您将伪值放入TextView ,该值仅显示在Android Studio中的布局预览中。 这将允许您在Android Studio中设计布局时查看TextView外观,但是当您为手机构建应用程序的“真实”版本时,您不必担心从布局中删除该虚拟文本。 另请参见: 工具属性参考 Tools is basically a collection of e ...