As we mentioned in the first article, Top Five Hacker Tools Every CISO Should Understand, the role of the CISO continues to evolve within organizations towards that of an executive level position.

Nonetheless, CISOs need to keep on top of the best tools and technologies available that can benefit their organization’s security posture.

We recently spoke to Nabil Ouchn (@toolswatch), the founder of the portal ToolsWatch.org and organizer of the Arsenal Tools exhibit at the BlackHat Conferences, and asked him to assemble what he believed to be the top ten hacker tools every CISO should understand.

Here are five more hacker tools for the CISO playbook, according to Ouchn:

Vega Open Source Web Application Scanner

“How many applications are developed internally in large companies that are not subject to a regular security inspection?” Ouchn asks. “This is one of the CISO’s biggest fears: Deploying an application without validating the security status.

“Fortunately Vega Open Source can do the job and check whether the developers have followed a Security Development Lifecycle. Vega is a free and open source scanner designed to test the security of web applications,” Ouchn explains.

“Vega can help CISO’s internal teams to find and validate SQL Injection, Cross-Site Scripting (XSS) and all the vulnerabilities described in the OWASP Top Ten, and can significantly reduce the exposure of an application.”

“This tool can be part of a continuous loop for securing applications and can used in two different ways: By the development team to ensure that their processes is clean against the OWASP Top Ten most exploited issues, and by Red tiger teams to assess the application prior to its deployment,” Ouchn continued.

“Solutions for Web Application security are many, and the choice should not be limited only to Vega, so we could also include in the same vein tools like Wa3f, Watobo or Netsparker Community, Burp Suite, and Zap. Each solution has its strong point and can be used to fill the application security gap.”

Open Vulnerability Assessment Language Interpreter (OVAL)

It is very important to keep an eye on the security status of internally deployed systems, and OVALInterpreter has been developed with this task in mind, Ouchn says.

“It provides a non-intrusive way to check the OS compliance and security levels. An ideal tool for OS / Systems configuration management. The hands-on is very simple and the added value is enormous. The tool is part of a bundle toolkit created by Mitre for analysis of configuration and vulnerabilities,” Ouchn said. “A CISO must add this tool to his arsenal.”

“The icing on the cake is that the tool generates an HTML report and has several testcases called “Definitions” to conduct with an application’s inventory, patch management overview, vulnerability checking, etc. A must for CISO and system administrators.” (See also Open-SCAP and XCCDF Interpreter).

Scuba – The Free Database Vulnerability Scanner

“Databases are critical assets for an information system, and therefore CISOs must implement the best strategy to protect them,” Ouchn said.

“To do so, we must draw a picture of the vulnerabilities they suffer from, and that is where Scuba comes into play. It ships with an average 1200 built-in testcases to check for vulnerabilities and configurations. It also overs the basics of the most common databases such as Oracle and Microsoft SQL Server,” Ouchn continued.

“A CISO should always instruct database admins to constantly assess the configuration of their databases. While Scuba cannot perform the exploitation of vulnerabilities, Metasploit is already in the Arsenal for that,” Ouchn says.

“To fill the gap, we also recommend using the OpenVAS (Open Source Vulnerability Scanner) with its several dedicated database plugins.” (See also oriented database Nessus plugins.)

Drozer – An Android Device’s Metasploit

“In the last decade, mobile phones have become a thorn in the side for security managers, and their security should not escape the attention of the CISO,” Ouchn said.

Drozeris the perfect tool to demonstrate how an Android application poorly developed or subject to compromise could become a Trojan in an enterprise network environment and ruin the whole security in depth strategy.”

“Drozer can perform an Android systems security assessment prior to a massive deployment within a company, and a wise CISO can indeed ensure that the devices comply with the security policy by checking the installed packages, the services in use, the possible vulnerabilities identified, and the opportunities to exploit them,” Ouchn continued.

“We must not fool ourselves, smartphones and other intelligent mobile devices are rooted in the culture, and an aware CISO must manage and secure them as best they can.” (See also SPF – Smartphone Pentesting Framework).

PwnPad – The Sexiest Pentesting Tablet

“I saved the best for last. One of the gadgets that has taken the security and hacking community by storm right now is the PwnPad Nexus tablet created by Pwnie Express. In fact, this one has all the ingredients to compromise your network,” Ouchn said.

“The tablet has been designed in such a way to work in all cases: It has WiFi dongle for cracking Wireless networks and a Bluetooth dongle and support for Mobile Data, and the best tools used by security professionals are already integrated and pre-configured.”

“It only takes few clicks and little effort to configure a malicious rogue AP and trap anyone who connects into it, so this is a great tool for performing pentesting, wireless assessment (WiFi / Bluetooth) and Awareness campaigns to educate internal users to avoid connecting to any open WiFi network,” Ouchn continued. “The Pwnpad hardware is a must for a CISO’s Red Tiger team.”

“The tablet has a significant cost if you opt to buy it, however there’s an option to build your own using the Community Release (here is my own: http://www.toolswatch.org/2013/05/installing-my-own-pwnpad-community-for-fun-and-for-less-than-300/)”.

Five More Hacker Tools Every CISO Should Understand的更多相关文章

  1. Top Five Hacker Tools Every CISO Should Understand

    As the role of the CISO continues to evolve within organizations towards that of an executive level ...

  2. MetInfo 5.1 自动化getshell工具

    title: MetInfo V5.1 GetShell一键化工具 date: 2016-06-08 22:40:32 categories: Hacker tags: - Hacker - Tool ...

  3. cygwin-使用介绍

    cygwin使用: 使用上的方便性很是不错,启动Cygwin以后,会在Windows下得到一个Bash Shell,由于Cygwin是以Windows下的服务运行的,所以很多情况下和在Linux下有很 ...

  4. 网络安全学习和CTF必不可少的一些网站

    [转载备用] 原文地址  http://blog.csdn.net/ida0918/article/details/52730662 http://www.sec-wiki.com/skill/ 安全 ...

  5. 【转】Cygwin访问Windows驱动器

    From:http://www.cygwin.cn/site/info/show.php?IID=1000 由于自己的项目需要使用Linux内核,所以自己在windows下安装了一个Linux虚拟机! ...

  6. 美国政府关于Google公司2013年度的财务报表红头文件

    请管理员移至新闻版块,谢谢! 来源:http://www.sec.gov/ 财务报表下载↓ 此文仅作参考分析. 10-K 1 goog2013123110-k.htm FORM 10-K   UNIT ...

  7. 打造高效的工作环境 – SHELL 篇

    注:本文由雷俊(Javaer/Emacser)和我一起编辑,所以文章版权归雷俊与我共同所有,转载者必需注明出处和我们两位作者.原文最早发于酷壳微信公众号,后来我又做了一些修改,再发到博客这边. 程序员 ...

  8. Cygwin下编译的程序不使用Cygwin.dll即可运行的命令 及常用命令简介

    cc -mno-cygwin foo.c 1.$ ps PS的相关用法: QuoteUsage ps [-aefl] [-u uid]-f = show process uids, ppids-l = ...

  9. weblogic弱密码检测

    http://www.secbox.cn/hacker/tools/6252.html http://60.12.168.73:8088/console/login/LoginForm.jsp htt ...

随机推荐

  1. linux 下搭建svn

    Update 程序设计中的“后悔药”——SVN 一.历史起源 1.版本控制软件   答:主要是对源代码版本进行控制与管理 2.版本控制软件起源 CVS:最早期的开源的版本控制软件(开源奇葩) VSS: ...

  2. 1.2 如何在visual studio 中建立C#程序

    这一节简单介绍一下怎么在visual studio 2015中建立第一个C#程序,我使用的是2015版的visual studio,不同版本可能有一些差异,不过大体上是相同的,这些信息仅供新手参考,大 ...

  3. android的listview的详细用法

    listview是android开发中的一个极其重要的控件.所以,要学会android,如果这个不会,基本是不会android的. 这里按照几个步骤介绍这个控件的使用. 1. 使用API中ArrayA ...

  4. c/s 与b/s构架

    C/S架构是一种比较早的软件架构,主要应用于局域网内.在这之前经历了集中计算模式,随着计算机网络的进步与发展,尤其是可视化工具的应用,出现过两层C/S和三层C/S架构,不过一直很流行也比较经典的是我们 ...

  5. Java 基础知识 练习题

    利用文本编辑器输入课堂上练习的Hello.java,并在JDK环境下编译和运行.请将程序编译.运行的结果截图.

  6. double函数和int函数

    可以看到,当tensor全是double型时,int函数会把所有元素取整,从1.5可以看出,不是四舍五入,而是取整.double函数又把整数型元素变成double型. th> a 0.0000 ...

  7. php实战正则表达式:验证手机号

    摘自http://www.tuicool.com/articles/MFNZRzu 本文通过逐步完善一个验证手机号的正则表达式来介绍了正则表达式中的 字符组 .量词 . 字符串起始/结束位置 . 分组 ...

  8. C#中调用Matlab人工神经网络算法实现手写数字识别

    手写数字识别实现 设计技术参数:通过由数字构成的图像,自动实现几个不同数字的识别,设计识别方法,有较高的识别率 关键字:二值化  投影  矩阵  目标定位  Matlab 手写数字图像识别简介: 手写 ...

  9. linux chomd 学习

    chomd -R 777 directory_name :递归地给directory目录下所有文件和子目录的属主分配读的权限 ------2016-10-31 -- source: Linux chm ...

  10. Java面向对象三大特点之封装

    封装 含义:将对象的属性和行为封装起来,而将对象的属性和行为封装起来的载体是类,类通常对客户隐藏其实现细节,这就是封装的思想.封装最主要的功能在于我们能修改自己的实现代码,而不用修改那些调用我们代码的 ...