Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
4/8/2015
10:00 AM
Carric Dooley
Carric Dooley
Partner Perspectives
Connect Directly
Twitter
RSS
50%
50%

Some of the Best Things in Security Are Free

Software tools are available from our consultants free of charge.

When our Foundstone consultants are working at customer sites, they sometimes realize that they can perform a task better if they write some code. They might want a tool that scans for vulnerabilities or malware, helps with forensic analysis, or tests security settings.  After the initial proof-of-concept tool is validated, we give them some dedicated time on the bench back in the office to clean the tool up, refine and enhance it, and then we publish it on our site or on the GitHub Open Security Research repositories.

These tools provide a wide range of useful functions, and not just for checking host or network weak points. ProxBrute, for example, tests your physical security by trying brute force attacks on proximity card readers, varying both the tag value and privileges. One of our consultants was running this test at a customer site and the software happened to try the tag of a recently terminated employee who was on a watch list. The security guards came running out, thinking that this former employee had gained access to the data center. Luckily, our consultant had a get-out-of-jail-free card from the CISO! Running similar tests at your site will help validate your physical access protocols.

A cross between network and physical weak points is impersonating a legitimate Wi-Fi access point. The hostapd-wpe tool is an 802.1X authentication server that establishes connections with a laptop or other wireless device and tricks it into giving up its client credentials. Now connected to the laptop, the attacker can act as a man in the middle, redirecting DNS queries, probing for vulnerabilities such as Heartbleed, and looking for data to exfiltrate. Or the attacker can use his newly stolen credentials to connect to the real access point and look for further vulnerabilities on your network. Hostapd-wpe is a useful tool for evaluating and improving the security posture of your mobile devices.

One of our popular network tools is JMSDigger, which tests for authentication and identification vulnerabilities of applications using Apache’s ActiveMQ Java Message Service. JMSDigger runs both anonymous and manual authentication checks against your apps, with automated brute force or fuzz-testing of credentials to help find potential weak points. This tool can also impersonate other applications or create new subscribers, topics, and message queues. You can verify broker configurations, test authentications, or dump queues and topics to attempt content extraction. Armed with this information, you can make sure your sensitive apps are properly protected with the necessary configuration settings.

Social engineering is another way that attackers will try to gain access to your sensitive data. Training people to identify and defend against these attacks is made easier with FSflow. This is an automated call-flow application, similar to those used in call centers. You can use this tool to run test calls and log the responses and the information you were able to extract. You can then use this information to customize security awareness training and identify weaknesses in training coverage or user understanding of what should be confidential.

These are just a few examples of the many free security tools available for you to assess your security posture, find and fix potential weaknesses, and advance your defenses against malicious attacks. Protecting your network and data is a continuous task, and these tools make it possible for you to cover more ground, in less time, at no cost.

Carric Dooley has extensive experience leading comprehensive security assessments as well as network and application penetration tests in a wide range of industries across North America, Europe, and Asia. As the Worldwide VP of Foundstone Services at McAfee, part of Intel ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19631
PUBLISHED: 2020-01-24
An issue was discovered in Big Switch Big Monitoring Fabric 6.2 through 6.2.4, 6.3 through 6.3.9, 7.0 through 7.0.3, and 7.1 through 7.1.3; Big Cloud Fabric 4.5 through 4.5.5, 4.7 through 4.7.7, 5.0 through 5.0.1, and 5.1 through 5.1.4; and Multi-Cloud Director through 1.1.0. A read-only user can ac...
CVE-2020-5219
PUBLISHED: 2020-01-24
Angular Expressions before version 1.0.1 has a remote code execution vulnerability if you call expressions.compile(userControlledInput) where userControlledInput is text that comes from user input. If running angular-expressions in the browser, an attacker could run any browser script when the appli...
CVE-2019-18900
PUBLISHED: 2020-01-24
: Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions p...
CVE-2020-7226
PUBLISHED: 2020-01-24
CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data...
CVE-2012-6302
PUBLISHED: 2020-01-24
Soapbox through 0.3.1: Sandbox bypass - runs a second instance of Soapbox within a sandboxed Soapbox.