Security List Network™

VAST is a Linux-based security distribution specifically designed for pentesting VoIP and UC networks. It enables security professionals and UC owners to more rapidly perform VoIP security assessments, or enumerate vulnerabilities in IP Phones or IP PBX servers within a lab or testbed. With VAST, a security consultant has every tool necessary to carry out a successful onsite or remote penetration test or vulnerability assessment against a UC network. VAST is built on Ubuntu 9.04 and includes all of the open source VIPER Lab tools, in addition to some other network pentest tools.
Sample Screenshot
Some of the tools included in VAST are as follows:

  1. UCsniff
  2. VideoSnarf
  3. Videojak
  4. VoIP Hopper
  5. ACEX
  6. test
  7. Metasploit
  8. Artemisa
  9. SteganRTP
  10. Proto
  11. sXtenXlite
  12. SecurLogixTools
  13. MACchanger
  14. Hydra
  15. Nmap
  16. tshark
  17. Sipvicious 0.2.6
  18. SIPp
  19. Netcat
  20. Warvox
  21. Hping2
  22. Ettercap


VAST has been thoroughly tested in the VIPER Lab not only for operability, but for ease of use as well. In addtion, a repository system for updating VIPER Lab tools. When a new version of a VIPER tool is released, it’s as easy as apt-get update.

Change Log for NOWASP 2.3.1 (Codename: Mutillidae):
  • Updated vulnerabilities listing
  • Added an entirely new attack on a new page: view-user-privilege-level.php
  • Added view-user-privilege-level.php to main menu under broken session management


NOWASP (Mutillidae) is a free, open source web application provided to allow security enthusiest to pen-test a web application. NOWASP (Mutillidae) can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to administrate a webserver. It is already installed on Samurai WTF and Rapid7 Metasploitable-2. The existing version can be updated on either. NOWASP (Mutillidae) contains dozens of vulns and hints to help the user; providing an easy-to-use web hacking environment deliberately designed to be used as a lab for security enthusiast, classrooms, labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an “assess the assessor” target for vulnerability assessment software.

NOWASP (Mutillidae) has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and oth

Features :

  1. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver.
  2. Installs easily by dropping project files into the “htdocs” folder of XAMPP.
  3. Preinstalled on Rapid7 Metasploitable 2
  4. Preinstalled on Samurai Web Testing Framework (WTF)
  5. Has dozen of vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
  6. System can be restored to default with single-click of “Setup” button
  7. Switches between secure and insecure mode
  8. Secure and insecure source code for each page stored in the same PHP file for easy comparison
  9. Used in graduate security courses, in corporate web sec training courses, and as an “assess the assessor” target for vulnerability software
  10. Contains 2 levels of hints to help users get started
  11. Instructional Videos: http://www.youtube.com/user/webpwnized
  12. Updates tweeted to @webpwnized
  13. Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools

The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.
Platform : Unix/LinuxStarting with reconnaissance, we have included tools such as the Fierce domain scanner and Maltego. For mapping, we have included tools such WebScarab and ratproxy. We then chose tools for discovery. These would include w3af and burp. For exploitation, the final stage, we included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.

The OWASP O2 Platform is an OWASP Project which is a collection of Open Source modules that help Web Application Security Professionals to maximize their efforts and quickly obtain high visibility into an application’s security profile. The objective is to ‘Automate Application Security Knowledge and Workflows”

——————————————| Change Log Version: v1.3 |——————————————
+ Added the ability to toggle on and off the banner on script start up
+ Fixed some issues with the configure utility and made it so some of
its functions are no longer case sensitive in addition to
eliminating the possibility of misconfiguring certain items and
making it generally more user friendly
+ Added dependency checks and the installation of missing dependencies
        to the first run of the script
+ Added the ability to force dependency checks even after the first run
+ Added the ability to convert the numbers of a word list into their
word equivelant
+ Added ATT Mifi wireless hotspots to the list of default passwords
(I highly suggest you only use the passthrough for this feature)
+ Added the ability to install the script so you can run it from any
terminal by typing “thad0ctor”
+ Added a feature that removes ‘s and version info from the script directory
in order to properly install the script and provide continuity for
future releases when utilizing the install feature
+ Added the ability to create word lists from an ebook file
(requires: Calibre)
+ Added the ability to batch convert multiple PDFs and Ebooks into a
word list (requires: Calibre)
+ Fixed some manipulation tools so they have y/n prompts before they go
ahead and create / modify word lists
+ Added a feature that installs a shortcut and icon to run the script
from the Applications > Other menu
+ Made many sed based features i.e. replace, insert etc. so you can now
edit files in place or create a new file

Thad0ctor’s BT5 Toolkit has become an all purpose script to simplify many Backtrack 5 functions to help Pentesters strengthen their systems


————————————-|Requirements|——————————————

-This scripts requires Backtrack 5 Linux based on Ubuntu, although
it has not been tested on other DISTROS it could work
with the proper configuration

-In order to run this script you will need the following programs:

-zenity
-policygen
-crunch
-find
-cat
-sed
-grep
-pyrit (for the benchmarks)
-aircack-ng (for the benchmarks)
-pdftotext
-cewl.rb
-cupp.py
-dictstat.py
-maskgen.py
-policygen.py
-unzip
-awk
-tr
-wc
-paste
-rev
-gnome-terminal
-nautilus

-System wise I would recommend a minimum of a dual core setup with
2 GB of RAM in addition to at least 50 GB of HDD space if
you plan on making some word lists.

——————————————|  Change Log Version: v1.2 |——————————————
+ Updated TAPE’s Datelist and Word List Manipulator to their most recent
    versions and updated functions to reflect new features
+ Fixed issue when using 3rd party scripts and the conigured color not
    returning to the terminal after use
+ Fixed issue with the updater when a failed internet connection did not
    reroute the use back to the main menu
+ Fixed the wordify function to adjust for prefixes added via TAPE’s
    datelist
+ Cleaned up and compartamentalized the menu system in an attempt to make
    it more user friendly

Thad0ctor’s BT5 Toolkit has become an all purpose script to simplify many Backtrack 5 functions to help Pentesters strengthen their systems
————————————-|Requirements|———————————————————————————————-


-This scripts requires Backtrack 5 Linux based on Ubuntu, although
it has not been tested on other DISTROS it could work
with the proper configuration

-In order to run this script you will need the following programs:

-Zenity (optional for the GTK version)
-Policygen
-Crunch
-Find
-Cat
-Sed
-Grep
-Pyrit (for the benchmarks)
-Aircack-NG (for the benchmarks)
-PDFtoText

-System wise I would recommend a minimum of a dual core setup with
2 GB of RAM in addition to at least 50 GB of HDD space if
you plan on making some word lists.

Change Log for NOWASP 2.2.2 (Codename: Mutillidae):

  •         Improved error handling and error exception bubbling in the MySQL class to make it easier to diagnose errors in the bubble hint handler.
  •         Imporved bubble handler code via refactoring
  •         Patched a bug in the show/hide bubble hints
  •         Converted add-to-your-blog to object oriented MySQLHandler
  •         Corrected minor error handling bug in browser-info.php
  •         Added logging to add to your blog to create more opportunity to poison logs
  •         Added Method switching vulnerability to user poll
  •         Cleaned up code in user poll
  •         Fixed cross site scripting vulnerability in user poll when in secure mode (ironic)
  •         Added logging to user poll

NOWASP (Mutillidae) is a free, open source web application provided to allow security enthusiest to pen-test a web application. NOWASP (Mutillidae) can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to administrate a webserver. It is already installed on Samurai WTF and Rapid7 Metasploitable-2. The existing version can be updated on either. NOWASP (Mutillidae) contains dozens of vulns and hints to help the user; providing an easy-to-use web hacking environment deliberately designed to be used as a lab for security enthusiast, classrooms, labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an “assess the assessor” target for vulnerability assessment software.

NOWASP (Mutillidae) has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and oth


Features :

  1. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver.
  2. Installs easily by dropping project files into the “htdocs” folder of XAMPP.
  3. Preinstalled on Rapid7 Metasploitable 2
  4. Preinstalled on Samurai Web Testing Framework (WTF)
  5. Has dozen of vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
  6. System can be restored to default with single-click of “Setup” button
  7. Switches between secure and insecure mode
  8. Secure and insecure source code for each page stored in the same PHP file for easy comparison
  9. Used in graduate security courses, in corporate web sec training courses, and as an “assess the assessor” target for vulnerability software
  10. Contains 2 levels of hints to help users get started
  11. Instructional Videos: http://www.youtube.com/user/webpwnized
  12. Updates tweeted to @webpwnized
  13. Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other to

=======================
Changes version 1.2 =
=======================
(*) Added 816 Path Traversal / Local File Inclusion test cases.
(*) Added 8 categories of false positive Path Traversal / Local File Inclusion test cases.
(*) Added 108 Remote File Inclusion test cases.
(*) Added 6 categories of false positive Remote File Inclusion test cases.
(*) Replicated 408 Path Traversal test cases to “active-form-action-version” directory,
    and altered them to include the action property in forms.
(*) Created a platform for easily implementing test cases for 4+ additional vulnerabilities Open Redirect, Insecure Forward/File Enumeration, Code LFI, Code RFI, etc) - will be implemented in future versions of wavsep (now implemented as false lfi/rfi test cases).
(*) Fixed a few minor spelling issues.
(*) Updated the main index page and several other index pages.
(*) Added documentation on the admin/root permissions required to run wavsep (the tomcat user should be granted permissions on the /db/ folder under tomcat/eclipse root, or root/admin privileges - recommended for better coverage of lfi/rfi test cases).


A vulnerable web application designed to help assessing the features, quality and accuracy of web application vulnerability scanners.
This evaluation platform contains a collection of unique vulnerable web pages that can be used to test the various properties of web application scanners

Purpose: A flexible web app showing vulnerabilities such as cross site scripting, sql injections, and session management issues. Helpful to IT auditors honing web security skills and setting up ‘capture the flag’.


Main :
A lightweight flexible vulnerable web application written in PERL and PHP. It demonstrates common web application vulnerabilities such as cross site scripting and session management issues. Vicnum is helpful to IT auditors who need to hone web security skills and can also be used by those setting up ‘capture the flag’ exercises or by those who just want to have some fun with web assessments.