FWAuto v1.1 – Firewall Auditing & Ruleset Analyzer Tool

Monday, July 14th, 2008

FWAuto (Firewall Rulebase Automation) is a Perl script and should work on any system with Perl installed. Provide the running config of a PIX firewall to fwauto. It will analyze and give you a list of weak rules in your rule base and store the result in multiple output files. Maybe ...

ISPs Join to Block Child Porn

Sunday, July 13th, 2008

AT&T Inc. and AOL LLC have joined three other major Internet service providers in eliminating access to child pornography newsgroups, New York Attorney General Andrew Cuomo said Friday. In June, Verizon Communications Inc., Time-Warner Cable and Sprint Nextel Corp. signed an agreement with Cuomo to shut down access to two major ...

Updates for Java eliminate many security holes

Thursday, July 10th, 2008

Sun Microsystems has issued updates for Java to eliminate many errors and vulnerabilities in the Java Development Kit (JDK) and the Java Runtime Environment (JRE). These include DoS vulnerabilities, buffer overflows and other errors that could cause a crash or allow a crafted applet to access certain resources, the filing ...

DNSenum – Domain Information Gathering Tool

Thursday, July 10th, 2008

The first stage of penetration testing is usually passive information gathering and enumeration (active information gathering). This is where tools like dnsenum come in, the purpose of DNSenum is to gather as much information as possible about a domain. The program currently performs the following operations: 1. Get the host’s addresse (A ...

Massive DNS security problem endangers the internet

Wednesday, July 9th, 2008

US-CERT and other security experts have warned of a critical design problem affecting all DNS implementations. The Domain Name Service is responsible for converting readable names like www.heise-online.co.uk into the IP addresses that computers can handle, such as 193.99.144.85. DNS is thus the internet equivalent to a phonebook and without ...