计算机安全超级工具(二十)-应用程序干扰
2009-12-13 12:44
441 查看
Spike
http://www.immunityinc.com/
When you need to analyze a new network protocol for buffer overflows or similar weaknesses, the SPIKE is the tool of choice for professionals. While it requires a strong knowledge of C to use, it produces results second to none in the field. SPIKE is available for the Linux platform only.
SPIKE proXy
SPIKE proXy is part of the SPIKE Application Testing Suite,
It functions as an HTTP and HTTPS proxy, and allows the web developer
or web application auditor low level access to the entire web application
interface, while also providing a bevy of automated tools and techniques
for discovering common problems. These automated tools include:
- Automated SQL Injection Detection
- Web Site Crawling (guaranteed not to crawl sites other than
the one being tested)
- Login form brute forcing
- Automated overflow detection
- Automated directory traversal detection
In addition to automated analysis, SPIKE proXy allows the user to
analyse the internals of the web application by viewing and changing
all variables, cookies, headers, or other parts of the request and
resubmit them. Also, a single installation can be shared by multiple users.
WebProxy
wwww.atstake.com
http://www.symantec.com/business/index.jsp
WebInspect
http://hp-webinspect.software.informer.com/
HP WebInspect
software is web application
security assessment software designed to thoroughly analyze today's
complex web applications. It delivers fast scanning capabilities, broad
assessment coverage and accurate web application scanning results.
http://www.immunityinc.com/
When you need to analyze a new network protocol for buffer overflows or similar weaknesses, the SPIKE is the tool of choice for professionals. While it requires a strong knowledge of C to use, it produces results second to none in the field. SPIKE is available for the Linux platform only.
SPIKE proXy
SPIKE proXy is part of the SPIKE Application Testing Suite,
It functions as an HTTP and HTTPS proxy, and allows the web developer
or web application auditor low level access to the entire web application
interface, while also providing a bevy of automated tools and techniques
for discovering common problems. These automated tools include:
- Automated SQL Injection Detection
- Web Site Crawling (guaranteed not to crawl sites other than
the one being tested)
- Login form brute forcing
- Automated overflow detection
- Automated directory traversal detection
In addition to automated analysis, SPIKE proXy allows the user to
analyse the internals of the web application by viewing and changing
all variables, cookies, headers, or other parts of the request and
resubmit them. Also, a single installation can be shared by multiple users.
WebProxy
wwww.atstake.com
http://www.symantec.com/business/index.jsp
WebInspect
http://hp-webinspect.software.informer.com/
HP WebInspect
software is web application
security assessment software designed to thoroughly analyze today's
complex web applications. It delivers fast scanning capabilities, broad
assessment coverage and accurate web application scanning results.
相关文章推荐
- 计算机安全超级工具(八)——探测框架应用程序
- 计算机安全超级工具(十)-Rootkit
- 计算机安全超级工具(-)——网络扫描
- 计算机安全超级工具(二)——漏洞扫描
- 计算机安全超级工具(七)——无线渗透
- 计算机安全超级工具(十一)-防火墙
- 计算机安全超级工具(十二)-主机加固
- 计算机安全超级工具(十七)-网络监控
- 计算机安全超级工具(三)——局域网搜索
- 计算机安全超级工具(十三)-通信安全保护
- 计算机安全超级工具(十八)-主机监控
- 计算机安全超级工具(四)——无线搜索
- 计算机安全超级工具(十四)-电子邮件安全和反垃圾邮件
- 计算机安全超级工具(十九)-Forensic工具
- 计算机安全超级工具(十五)-设备安全测试
- 计算机安全超级工具(二十一)-二进制逆向工程
- 计算机安全超级工具(五)——自定义数据包生成
- 计算机安全超级工具(九)-后门程序
- 计算机安全超级工具(六)——渗透工具
- 谷歌发布应用程序安全工具skipfish