Libwhisker is a Perla module, suitable for HTTP test. It can be for many known

2011-04-09 16:37

 

Libwhisker is a Perla module, suitable for HTTP test. It can be for many known vulnerabilities that test HTTP server, especially detection risk the existence of CGI. Libwhisker Whisker is a use of scanning program.

6. Burpsuite

This is a Web applications can be used to attack the integration platform. Burp suite allow an Microsoft Office is so great!

attacker will artificial and automatic technology to combine up to enumerating and analyzing, attack Web applications, or use these procedures vulnerabilities. Various burp tools work together, share information, and allow a tool finds vulnerability form another tool foundation.

7. Wikto Office 2010 –save your time and save your money.

 

Can say this is a Web server assessment tool, it can check the Web server, and provide with loopholes in the many functions as Nikto, but increased many interesting functional parts, such as back-end miner and close Google integration. It written for MS.net environment, but users need to register before they download the binary files and source code.

8. Could Acunetix Web Vulnerability

This is a new commercial level Web vulnerability scanning procedure, it can check the Web Microsoft outlook 2010 is convenient!

applications, such as SQL injection of loopholes, cross site scripting attack, identity authentication page of weak password length, etc. It has a convenient operation of the graphical user interface, and can create professional level Web site safety audit report.

9. Watchfire AppScan

This is also a paragraph business class Web vulnerability scanning program. In the application of The invention of Microsoft Office 2010 is a big change of the world.

AppScan the entire development period, thus provide security test test simplified the component test and development early security guarantees. It can scan many common vulnerabilities, such as cross site scripting attack, HTTP response split loophole, parameter tampering or implicit field processing, the back door/commissioning options, buffer overflow, etc.

N - Stealth Outlook 2010 is powerful.

10.