Black Hat 2017 Tools List

30 July 2018

@toolswatch reported the tools  picked for Black Hat

Black Hat Tools

Android, iOS and Mobile Hacking

Data Forensics and Incident Response

Exploitation and Ethical Hacking

Hardware/Embedded

Internet of Things

Malware Defense

Network Attacks

Network Defense

OSINT – Open Source Intelligence

Vulnerability Assessment

Web AppSec

Skaner podatności kodu

10 July 2018

analizator kodu źródłowego:

sonarqube ???

https://www.blackhat.com/docs/us-15/materials/us-15-Cornell-ThreadFix.pdf

Open Source or Free Tools

    Bandit - bandit is a comprehensive source vulnerability scanner for Python
    Brakeman - Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications
    Codesake Dawn - Codesake Dawn is an open source security source code analyzer designed for Sinatra, Padrino for Ruby on Rails applications. It also works on non-web applications written in Ruby
    FindBugs - Find Bugs (including a few security flaws) in Java programs
    FindSecBugs - A security specific plugin for FingBugs that significantly improves FindBug's ability to find security vulnerabilities in Java programs
    Flawfinder Flawfinder - Scans C and C++
    Google CodeSearchDiggity - Uses Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more. Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.
    Graudit - Scans multiple languages for various security flaws.
    PMD - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)
    Progpilot - Progpilot is a static analyzer tool for PHP that detects security vulnerabilities such as XSS and SQL Injection.
    PreFast (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs. Last update 2006.
    Puma Scan - Puma Scan is a .NET C# open source static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.
    .NET Security Guard - Roslyn analyzers that aim to help security audits on .NET applications. It will find SQL injections, LDAP injections, XXE, cryptography weakness, XSS and more.
    RIPS - RIPS is a static source code analyzer for vulnerabilities in PHP web applications. Please see notes on the sourceforge.net site.
    phpcs-security-audit - phpcs-security-audit is a set of PHP_CodeSniffer rules that finds flaws or weaknesses related to security in PHP and its popular CMS or frameworks. It currently has core PHP rules as well as Drupal 7 specific rules.
    SonarQube - Scans source code for more than 20 languages for Bugs, Vulnerabilities, and Code Smells. SonarQube IDE plugins for Eclipse, Visual Studio, and IntelliJ provided by SonarLint.
    VisualCodeGrepper (VCG) - Scans C/C++, C#, VB, PHP, Java, and PL/SQL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.
    Xanitizer - Scans Java for security vulnerabilities, mainly via taint analysis. The tool comes with a number of predefined vulnerability detectors which can additionally be extended by the user. It's free for academic and open source projects (see [1]).

Commercial

    AppScan Source (IBM)
    BlueClosure BC Detect (BlueClosure)
    bugScout (Buguroo Offensive Security) Latest generation source code analysis tool bugScout detects source code vulnerabilities and makes possible an accurate management of the life cycles due to its easy use.
    CAST AIP (CAST) Performs static and architectural analysis to check for: SQL Injection, Cross Site Scripting (XSS), Input Validation,  Insecure Cryptographic Storage, Information Leakage and Improper Error Handling, Data Access, API Abuse, Encapsulation on over 30 languages.
    Codacy is free for open source projects, and integrates with tools such as Brakeman, Bandit, FindBugs, and a number of others. It offers security patterns for languages such as Python, Ruby, Scala, Java, Javascript and more.
    Contrast from Contrast Security Contrast performs code security without actually doing static analysis. Contrast does Interactive Application Security Testing (IAST), correlating runtime code & data analysis. It provides code level results without actually relying on static analysis.
    Coverity Code Advisor (Synopsys)
    CxSAST (Checkmarx)
    Fortify (HP)
    Julia - SaaS Java static analysis (JuliaSoft)
    KlocWork (KlocWork)
    Kiuwan - SaaS Software Quality & Security Analysis (an Optimyth company)
    Parasoft Test (Parasoft)
    PVS-Studio (PVS-Studio) For C/C++, C#
    Puma Scan Professional - Puma Scan Professional is a .NET C# static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.
    RIPS Code Analysis (RIPS Technologies) - RIPS is a SAST solution specialized for PHP that detects unknown security vulnerabilities and code quality issues. It can be easily integrated into the SDLC and supports various industry standards.
    SecureAssist (Synopsys) - Prevent insecure coding and configurations (Java, .NET, PHP, and JavaScript) by scanning code automatically as an IDE plugin for Eclipse, IntelliJ, and Visual Studio etc. The guidance for fixing insecure coding contains references to OWASP resources.
    Sentinel Source (Whitehat)
    Seeker (Synopsys) Seeker performs code security without actually doing static analysis. Seeker does Interactive Application Security Testing (IAST), correlating runtime code & data analysis with simulated attacks. It provides code level results without actually relying on static analysis.
    Source Patrol (Pentest)
    Veracode Static Analysis (Veracode)
    Xanitizer - Scans Java for security vulnerabilities, mainly via taint analysis.

Source: https://www.owasp.org/index.php/Source_Code_Analysis_Tools

Incydent Response Playbook

10 December 2017

Incident source

  • Any attacks affecting critical assets
  • Denial-of-Service attacks that isolate or impede critical service or network performance
  • Malicious logic (virus) attacks that isolate enclaves
  • Administrator/root-level access obtained by unauthorized personnel

 

  • Significant trends suspected in incidents or events
  • Indication of multiple suspected systems
  • Suspected e-mail spoofing
  • Unauthorized probes or scans of the network

 

  • Unusual system performance or behavior
  • Unplanned system crashes, outages, or configurationchanges
  • Suspicious files identified on a server Missing data, files, or programs
  • Unexplained access privilege changes Poor security practices
  • Unusual after-hours system activity Simultaneous logins by the same user from differentIP addresses
  • Unauthorized activity by privileged users

 

  • System compromise internal
  • System compromise cloud
  • Theft of confidential information
  • Theft or loss of mobile device/media
  • Malware
  • Phishing

 

Incydent Responder playbook with flow

  • https://www.incidentresponse.com/playbooks/malware-outbreak
  • https://www.incidentresponse.com/playbooks/phishing
  • https://www.incidentresponse.com/playbooks/data-theft
  • https://www.incidentresponse.com/playbooks/virus-outbreak
  • https://www.incidentresponse.com/playbooks/ddos
  • https://www.incidentresponse.com/playbooks/unauthorized-access
  • https://www.incidentresponse.com/playbooks/elevation-of-privilege
  • https://www.incidentresponse.com/playbooks/root-access
  • https://www.incidentresponse.com/playbooks/improper-computer-usage

Handbook

  • http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
  • https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901
  • https://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf
  • https://www.nasa.gov/pdf/589502main_ITS-HBK-2810.09-02%20%5BNASA%20Information%20Security%20Incident%20Management%5D.pdf
  • https://www.cybersecuritycoalition.be/content/uploads/cybersecurity-incident-management-guide-EN.pdf

Other resources

  • https://www.crest-approved.org/wp-content/uploads/2014/11/CSIR-Procurement-Guide.pdf
  • https://www.it-cube.net/wp-content/uploads/2017/09/Exabeam_Incident_Response_for_Top_3_Security_Scenarios.pdf
  •  

SANS Checklists & Step-by-Step Guides

8 November 2016

Microsoft Improving Web Application Security Threats and Countermeasures

13 March 2016

decompile / bug bounty of manufacturer firmware

13 March 2016

Protection of system security

3 November 2015

CISSP exam preparation

My study on CISSP | 28 April 2015

Egzaminy:

  • https://www.skillset.com/certifications/cissp

Open security training - CISSP

Baseline Exam

  • 100-Question Baseline Exam (22 pages) (pdf)
  • Answers to 100-Question Exam (22 pages) (pdf)

 Final Exam

  • 250-Question Final Exam (53 pages) (pdf)
  • Answers to 250-Question Final Exam (53 pages) (pdf)

 

http://ptgmedia.pearsoncmg.com/images/9780789749598/samplepages/0789749599.pdf

http://samples.sainsburysebooks.co.uk/9781118176122_sample_399791.pdf

http://files.meetup.com/768823/CISSPc%20qs.pdf

http://www.certificationking.net/others/CISSP%20brain%20dumpid=19.htm

http://www.certificationking.com/CISSP-s.zip

http://www.cisspexampractice.com/public/uiExamDemoOverview.aspx

CISSP Candidate Information Biulletin

 

source:CISSP® CBK® 2015 WHAT WAS ADDED

WHAT IS NEW WITHIN EACH OF THE DOMAINS

Below you have the list of new domains on the left and the new topics that were introduced within each of the domains on the left.   I welcome your help to complete it with even more details.  If you know of topics and links that could be added, please send an email to [email protected] and let me know. 

NEW DOMAIN NAME

NEW TOPICS THAT WERE ADDED

 

Security &  Risk Management

 

Threat Modeling

More details were added about threat modeling

 

Asset Security

Acquisition

Integrate security risk consideration into acquisition and practice

Hardware, Software, and services

Third Party assessment and monitoring

(on site assessment, document exchange and review, process/policy review)

Minimum security requirements

Service-level requirements

 

Security Engineering

Mobile Systems

This is NOT referring to Phones and other tools.  It is referring to laptop as mobile devices and the risk associated with those mobile devices.

 

Internet of things (IoT)

http://www.itworld.com/article/2906805/welcome-to-the-internet-of-things-please-check-your-privacy-at-the-door.html?phint=newt%3Ditworld_today&phint=idg_eid%3D4d76928f948553d246266242f20ee850#tk.ITWNLE_nlt_tonight_2015-04-08

 

and

 

 

https://www.ftc.gov/news-events/press-releases/2015/01/ftc-report-internet-things-urges-companies-adopt-best-practices

 

and

 

http://spectrum.ieee.org/telecom/security/how-to-build-a-safer-internet-of-things

 

and

 

The Cyber Defense Magazine also has some interesting articles on the challenge of IOT at:

http://www.cyberdefensemagazine.com/newsletters/march-2015/index.html

 

Embedded Systems

Smart Appliance, devices with a computer.

 

 

Communications & Network Security

Converged protocols (e.g., FCoE, MPLS, VoIP, iSCSI)

 

Software Defined Networks

see:  https://www.opennetworking.org/sdn-resources/sdn-definition

Video to watch:

https://www.youtube.com/watch?v=DiChnu_PAzA

and

If you wish to learn more:  https://www.youtube.com/watch?v=l25Ukkmk6Sk

 

Storage and Network Convergence

iSCSI and FCoE

http://www.redbooks.ibm.com/redbooks/pdfs/sg247986.pdf

Read chapter one of the document above for a quick overview.

 

Content Distribution Networks

Akamai

Cloudflare

Amazon CloudFront

and Others

 

 

Identity and Access Management

Session Management

Desktop Sessions Desktop sessions can be controlled and protected through several means including but not limited to the following: Screensavers

Timeouts

Automatic Logouts

Session/ Login limitation

Schedule Limitations

 

Registration and Proofing of Identity

 

Cloud Identity Services

Security Assessment and Testing

 

This is mostly a new domain that goes in a lot more depth about Security Assessment and Penetration Testing.  The two document below will give you most of what you need to know.

 

See:   Penetrating Testing Guidelines from the PCI DSS Council
https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf

 

And

 

NIST SP  800-115Technical Guide to  Information Security Testing  and Assessment

http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf

 

Security Operations

Asset Management and asset inventory

https://www.sei.cmu.edu/productlines/frame_report/config.man.htm

 

 

Configuration Management

http://acqnotes.com/Attachments/IEEE%20Guide%20to%20Software%20Configuration%20Management.pdf

 

WhiteListing and Blacklisting
understand advantages and Disadvantages

 

Coverage of Sandboxing

http://en.wikipedia.org/wiki/Sandbox_%28computer_security%29

 

 

A bit more details on Patch Management

Technologies http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-40r3.pdf

Read chapter 3 of the document above about the challenge of Patch Management

 

Software Development Security

Integrated Product Team (IPT)

http://www.acq.osd.mil/se/docs/DoD-IPPD-Handbook-Aug98.pdf

 

DevOps and its principles

http://itrevolution.com/the-three-ways-principles-underpinning-devops/

http://theagileadmin.com/what-is-devops/

 

Software Assurance

http://en.wikipedia.org/wiki/Software_assurance

 

 

 


 

Clement and Nathalie
Site owners and Founders

Strony "testowe" zawierające błędy i problemy bezpieczństwa

6 April 2015
Kategorie SecCase

Video

6 April 2015
Kategorie SecCase

Szkolenia i tutoriale

6 April 2015
Kategorie SecCase

Programowanie

6 April 2015
Kategorie SecCase

Bazy sygnatur malware

6 April 2015
Kategorie SecCase

Strony internetowe

6 April 2015
Kategorie SecCase

Książki

6 April 2015
Kategorie SecCase

Oficjalne dokumenty

6 April 2015
Kategorie SecCase

Istotne akty prawne

6 April 2015
Kategorie SecCase