The SANS Investigative Forensic Toolkit (SIFT) Workstation is a VMware Appliance that is pre-configured with all the necessary tools to perform a detailed digital forensic examination. It is compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. The brand new version has been completely rebuilt on an Ubuntu base with many additional tools and capabilities that can match any modern forensic tool suite.

New in SIFT 2.14
October 28, 2012
Short URLForensic Toolkit, Hacking Tools, SANS, Scanners, Security Tools, Vulnerability AssessmentGeneral, Penetration Testing, Security, Tools
The Social Engineering Toolkit (SET) updated to version 4.1 . It is an open source, python-driven, social-engineering penetration testing framework of custom tools which solely focuses on attacking the human element of penetration testing. It was designed in order to arm penetration testers and security researchers with the ability to effectively test heavily advanced social-engineering attacks armed with logical methods. The Social Engineer Toolkit leverages multiple attack vectors that take advantage of the human element of security in an effort to target attackers.

Toolkit change log
- Removed the Java Exploit from being built into the Java Applet. Being detected by to many AV vendors.
- Added core libraries to the scraper, needed for check_config and apache mode checks
- Added check for apache mode within harvester, will move new php customize script to apache directory and extract under different directory Read More
October 14, 2012
Short URLLinux, penetration testing, Scanners, Social Engineer Toolkit, Social Engineering, Vulnerability Assessment, vulnerability scanner, Wi-Fi HackingHacking, Penetration Testing, Security, Tools
Nessus is the world’s most widely-deployed vulnerability and configuration assessment product updated to version 5.0.2 .Nessus 5 features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, patch management integration, and vulnerability analysis of your security posture with features that enhance usability, effectiveness, efficiency, and communication with all parts of your organization.

October 14, 2012
Short URLHacking Tools, Linux, Nessus, penetration testing, Scanners, Security Tools, vulnerability scanner, WindowsPenetration Testing, Security, Tools
Burp Suite Is a very powerful tool for web application security testing. This tool is great for Penetration Testers, Security Researcher. It contains a variety of tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application.

New in Burp Suite v1.5rc2 : The Burp Repeater UI has been modified to conserve screen space. The previous fields for host / port / protocol have been removed, since these details are automatically populated when a request is sent to Repeater, and typically do not need to be modified. The details of the target server for the current request are still displayed, and you can change these details by clicking on the target server label, to open a dialog. Burp’s memory handling has been further refined, particularly when actively scanning, to reduce the overall memory footprint and improve Burp’s resilience in low memory conditions.
All of the tools share the same robust framework for handling and displaying HTTP messages, persistence, authentication, proxies, logging, alerting and extensibility.
Read More
October 14, 2012
Short URLHacking Tools, penetration testing, Security Tools, Vulnerabilities, Vulnerability AssessmentHacking, Penetration Testing, Security, Tools
Wireshark is the world’s foremost network protocol analyzer, and is the de facto standard across many industries and educational institutions.

• A lot of protocols were updated:
• A bug that caused the HSRP dissector could to go into an infinite loop has been fixed;
• A bug that causeD the PPP dissector to abort has been repaired;
• Martin Wilck discovered an infinite loop in the DRDA dissector. It was fixed;
• HDCP2 now used the correct protocol id;
• Markers are now showed when maps are displayed;
• Truncated/partial JPEG files are now dissected;
• Support for MPLS Packet Loss and Delay Measurement has been implemented;
• A bug that caused Wireshark to crash when VoIP Calls were selected was fixed;
Read More
October 12, 2012
Short URLMonitoring, Network Hacking, Network Mapping, Security Tools, Vulnerability AssessmentGeneral
Snort 2.9.4 Beta is now available on snort.org. Snort is a powerful network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks.
Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for IPS.
October 12, 2012
Short URLfirewall, Monitoring, Network Mapping, Security ToolsSecurity, Tools