Vulnerability Assessment The vulnerability assessment directory contains software which can be used to detect security vulnerabilities in software, services and network design. o Authforce Authforce is a HTTP authentication bruteforce tool. It uses various methods to brute force username and password pairs. o CIS CIS is a free security scanner written and maintained by Cerberus Information Security, Ltd and is designed to help administrators locate and fix security holes in their computer systems. Runs on Windows NT or 2000. o ike-scan The ike-scan tool scans IP addresses for VPN servers by sending a specially crafted IKE packet to each host within a network. Most hosts running IKE will respond, identifying their presence. The tool then remains silent and monitors retransmission packets. These retransmission responses are recorded, displayed and matched against a known set of VPN product fingerprints. o Nessus Nessus is a modular network security scanner. Well regarded as the premier vulnerability assessment utility, Nessus features NASL (Nessus Attack Scripting Language) which allows for custom written security tests. Nessus also recognises services running on non-default ports and its vulnerability database is updated daily. o Nikto Nikto is a web server scanner which performs comprehensive tests against web servers for multiple items, including over 2200 potentially dangerous files/CGIs, versions on over 140 servers, and problems on over 210 servers. o NSAT NSAT is a fast, highly configurable, bulk network security scanner for over 50 different services and hundreds of vulnerabilities. It's main advantage is its flexibility and configurability. NSAT currently supports distributed scanning. o SARA Security Auditor's Research Assistant is a third generation Unix-based security analysis tool that is primarily based off the well known SATAN project. SARA tests for multiple vulnerabilities including the 'SANS/FBI Top 20' and will run on most Unix operating systems including Mac OS X. o SATAN SATAN stands for Security Administrator Tool for Analyzing Networks and does exactly what it sounds like. Written by Wietse Venema and Dan Farmer in 1995, SATAN is one of the original assessment tools. Largely superceded by SARA. o ScanSSH ScanSSH scans a list of addresses and networks for running SSH servers and their version numbers. scanssh supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH servers in a company or the Internet as whole. The author of ScanSSH, Neils Provos, has also done extensive work with privilege separated OpenSSH and written other security tools like honeyd. o Spike Spike is a fuzzer creation kit. Spikes' API attempts to make duplicating an unknown protocol easier for a reverse engineer or security researcher. o Whisker Whisker is a well-regarded Web/CGI vulnerability scanner by RFP. Unfortunately, it is now officially listed as deprecated. Nikto is the designated successor to Whisker, and features an updated version of libwhisker. (Note: This list of software and information available at Wiretapped is not exhaustive. Users are encouraged to browse and search the archive and read any available "-README.txt" files that are available)