Black Hat 2017 Tools List

30 July 2018

@toolswatch reported the tools  picked for Black Hat

Black Hat Tools

Android, iOS and Mobile Hacking

Data Forensics and Incident Response

Exploitation and Ethical Hacking


Internet of Things

Malware Defense

Network Attacks

Network Defense

OSINT – Open Source Intelligence

Vulnerability Assessment

Web AppSec

Skaner podatności kodu

10 July 2018

analizator kodu źródłowego:

sonarqube ???

Open Source or Free Tools

    Bandit - bandit is a comprehensive source vulnerability scanner for Python
    Brakeman - Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications
    Codesake Dawn - Codesake Dawn is an open source security source code analyzer designed for Sinatra, Padrino for Ruby on Rails applications. It also works on non-web applications written in Ruby
    FindBugs - Find Bugs (including a few security flaws) in Java programs
    FindSecBugs - A security specific plugin for FingBugs that significantly improves FindBug's ability to find security vulnerabilities in Java programs
    Flawfinder Flawfinder - Scans C and C++
    Google CodeSearchDiggity - Uses Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more. Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.
    Graudit - Scans multiple languages for various security flaws.
    PMD - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)
    Progpilot - Progpilot is a static analyzer tool for PHP that detects security vulnerabilities such as XSS and SQL Injection.
    PreFast (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs. Last update 2006.
    Puma Scan - Puma Scan is a .NET C# open source static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.
    .NET Security Guard - Roslyn analyzers that aim to help security audits on .NET applications. It will find SQL injections, LDAP injections, XXE, cryptography weakness, XSS and more.
    RIPS - RIPS is a static source code analyzer for vulnerabilities in PHP web applications. Please see notes on the site.
    phpcs-security-audit - phpcs-security-audit is a set of PHP_CodeSniffer rules that finds flaws or weaknesses related to security in PHP and its popular CMS or frameworks. It currently has core PHP rules as well as Drupal 7 specific rules.
    SonarQube - Scans source code for more than 20 languages for Bugs, Vulnerabilities, and Code Smells. SonarQube IDE plugins for Eclipse, Visual Studio, and IntelliJ provided by SonarLint.
    VisualCodeGrepper (VCG) - Scans C/C++, C#, VB, PHP, Java, and PL/SQL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.
    Xanitizer - Scans Java for security vulnerabilities, mainly via taint analysis. The tool comes with a number of predefined vulnerability detectors which can additionally be extended by the user. It's free for academic and open source projects (see [1]).


    AppScan Source (IBM)
    BlueClosure BC Detect (BlueClosure)
    bugScout (Buguroo Offensive Security) Latest generation source code analysis tool bugScout detects source code vulnerabilities and makes possible an accurate management of the life cycles due to its easy use.
    CAST AIP (CAST) Performs static and architectural analysis to check for: SQL Injection, Cross Site Scripting (XSS), Input Validation,  Insecure Cryptographic Storage, Information Leakage and Improper Error Handling, Data Access, API Abuse, Encapsulation on over 30 languages.
    Codacy is free for open source projects, and integrates with tools such as Brakeman, Bandit, FindBugs, and a number of others. It offers security patterns for languages such as Python, Ruby, Scala, Java, Javascript and more.
    Contrast from Contrast Security Contrast performs code security without actually doing static analysis. Contrast does Interactive Application Security Testing (IAST), correlating runtime code & data analysis. It provides code level results without actually relying on static analysis.
    Coverity Code Advisor (Synopsys)
    CxSAST (Checkmarx)
    Fortify (HP)
    Julia - SaaS Java static analysis (JuliaSoft)
    KlocWork (KlocWork)
    Kiuwan - SaaS Software Quality & Security Analysis (an Optimyth company)
    Parasoft Test (Parasoft)
    PVS-Studio (PVS-Studio) For C/C++, C#
    Puma Scan Professional - Puma Scan Professional is a .NET C# static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.
    RIPS Code Analysis (RIPS Technologies) - RIPS is a SAST solution specialized for PHP that detects unknown security vulnerabilities and code quality issues. It can be easily integrated into the SDLC and supports various industry standards.
    SecureAssist (Synopsys) - Prevent insecure coding and configurations (Java, .NET, PHP, and JavaScript) by scanning code automatically as an IDE plugin for Eclipse, IntelliJ, and Visual Studio etc. The guidance for fixing insecure coding contains references to OWASP resources.
    Sentinel Source (Whitehat)
    Seeker (Synopsys) Seeker performs code security without actually doing static analysis. Seeker does Interactive Application Security Testing (IAST), correlating runtime code & data analysis with simulated attacks. It provides code level results without actually relying on static analysis.
    Source Patrol (Pentest)
    Veracode Static Analysis (Veracode)
    Xanitizer - Scans Java for security vulnerabilities, mainly via taint analysis.


Incydent Response Playbook

10 December 2017

Incident source

  • Any attacks affecting critical assets
  • Denial-of-Service attacks that isolate or impede critical service or network performance
  • Malicious logic (virus) attacks that isolate enclaves
  • Administrator/root-level access obtained by unauthorized personnel


  • Significant trends suspected in incidents or events
  • Indication of multiple suspected systems
  • Suspected e-mail spoofing
  • Unauthorized probes or scans of the network


  • Unusual system performance or behavior
  • Unplanned system crashes, outages, or configurationchanges
  • Suspicious files identified on a server Missing data, files, or programs
  • Unexplained access privilege changes Poor security practices
  • Unusual after-hours system activity Simultaneous logins by the same user from differentIP addresses
  • Unauthorized activity by privileged users


  • System compromise internal
  • System compromise cloud
  • Theft of confidential information
  • Theft or loss of mobile device/media
  • Malware
  • Phishing


Incydent Responder playbook with flow




Other resources


SANS Checklists & Step-by-Step Guides

8 November 2016

Microsoft Improving Web Application Security Threats and Countermeasures

13 March 2016

decompile / bug bounty of manufacturer firmware

13 March 2016

Protection of system security

3 November 2015

CISSP exam preparation

My study on CISSP | 28 April 2015



Open security training - CISSP

Baseline Exam

  • 100-Question Baseline Exam (22 pages) (pdf)
  • Answers to 100-Question Exam (22 pages) (pdf)

 Final Exam

  • 250-Question Final Exam (53 pages) (pdf)
  • Answers to 250-Question Final Exam (53 pages) (pdf)

CISSP Candidate Information Biulletin




Below you have the list of new domains on the left and the new topics that were introduced within each of the domains on the left.   I welcome your help to complete it with even more details.  If you know of topics and links that could be added, please send an email to [email protected] and let me know. 




Security &  Risk Management


Threat Modeling

More details were added about threat modeling


Asset Security


Integrate security risk consideration into acquisition and practice

Hardware, Software, and services

Third Party assessment and monitoring

(on site assessment, document exchange and review, process/policy review)

Minimum security requirements

Service-level requirements


Security Engineering

Mobile Systems

This is NOT referring to Phones and other tools.  It is referring to laptop as mobile devices and the risk associated with those mobile devices.


Internet of things (IoT)








The Cyber Defense Magazine also has some interesting articles on the challenge of IOT at:


Embedded Systems

Smart Appliance, devices with a computer.



Communications & Network Security

Converged protocols (e.g., FCoE, MPLS, VoIP, iSCSI)


Software Defined Networks


Video to watch:


If you wish to learn more:


Storage and Network Convergence

iSCSI and FCoE

Read chapter one of the document above for a quick overview.


Content Distribution Networks



Amazon CloudFront

and Others



Identity and Access Management

Session Management

Desktop Sessions Desktop sessions can be controlled and protected through several means including but not limited to the following: Screensavers


Automatic Logouts

Session/ Login limitation

Schedule Limitations


Registration and Proofing of Identity


Cloud Identity Services

Security Assessment and Testing


This is mostly a new domain that goes in a lot more depth about Security Assessment and Penetration Testing.  The two document below will give you most of what you need to know.


See:   Penetrating Testing Guidelines from the PCI DSS Council




NIST SP  800-115Technical Guide to  Information Security Testing  and Assessment


Security Operations

Asset Management and asset inventory



Configuration Management


WhiteListing and Blacklisting
understand advantages and Disadvantages


Coverage of Sandboxing



A bit more details on Patch Management


Read chapter 3 of the document above about the challenge of Patch Management


Software Development Security

Integrated Product Team (IPT)


DevOps and its principles


Software Assurance





Clement and Nathalie
Site owners and Founders

Strony "testowe" zawierające błędy i problemy bezpieczństwa

6 April 2015
Kategorie SecCase


6 April 2015
Kategorie SecCase

Szkolenia i tutoriale

6 April 2015
Kategorie SecCase


6 April 2015
Kategorie SecCase

Bazy sygnatur malware

6 April 2015
Kategorie SecCase

Strony internetowe

6 April 2015
Kategorie SecCase


6 April 2015
Kategorie SecCase

Oficjalne dokumenty

6 April 2015
Kategorie SecCase

Istotne akty prawne

6 April 2015
Kategorie SecCase