BlackArch Linux Expands Its Roster of Tools for Security Research

1 - BlackArch Linux Expands Its Roster of Tools for Security Research
2 - BlackArch Tools Span Multiple Categories
3 - Researchers Get New PHP Attack Tool
4 - Domi-Owned Attacks IBM Lotus Domino Servers
5 - Web Reconnaissance Improved With Crawlic
6 - Credmap Helps Raise Awareness of Credential Reuse
7 - Taking Aim at Voice/Video With Isip
8 - Jooforce Probes Joomla Content Management System Sites
9 - Scanning Microsoft Outlook for Risk With WebPP Brute
10 - BackdoorMe Finds a Way Into Systems
11 - The Phishing Bell Tolls for Hemingway
12 - BlackArch Is Powered by a Linux 4.3 Kernel
1 of 12

BlackArch Linux Expands Its Roster of Tools for Security Research

An update to the BlackArch Linux security distribution adds more than 30 new tools to help researchers find flaws in software, systems and networks.

2 of 12

BlackArch Tools Span Multiple Categories

With so many tools included in BlackArch, it can be challenging to figure out what to use. The system provides a categorized menu of tools broken down by type of attack or use case, ranging from backdoors to wireless.

3 of 12

Researchers Get New PHP Attack Tool

The Static PHP Analysis and Fuzzer (spaf) tool is among the new tools added in the BlackArch 2016.01.10 release. The spaf tool helps security researchers identify entry points for scripts.

4 of 12

Domi-Owned Attacks IBM Lotus Domino Servers

The new domi-owned tool enables security researchers to conduct multiple types of attacks against IBM Lotus Domino servers, including brute-force password attacks.

5 of 12

Web Reconnaissance Improved With Crawlic

The Crawlic tool enables researchers to find temporary files and search domains hosted on the same server as a target address.

6 of 12

Credmap Helps Raise Awareness of Credential Reuse

The Credential Mapper (credmap) tool is all about helping to identify potential user and account credential reuse, which is often identified as a leading cause of data breaches.

7 of 12

Taking Aim at Voice/Video With Isip

SIP (Session Initiation Protocol) is widely used for voice and video delivery over the Internet today. With isip, security researchers get an interactive SIP toolkit for packet sniffing and man-in-the-middle attacks.

8 of 12

Jooforce Probes Joomla Content Management System Sites

The open-source Joomla content management system is the target of the new Jooforce tool in BlackArch. Jooforce provides researchers with a tool that performs brute-force attacks against Joomla to test for vulnerability.

9 of 12

Scanning Microsoft Outlook for Risk With WebPP Brute

Microsoft's Outlook is among the most popular email systems in use today, making it an attractive target for security researchers and attackers alike. With the outlook-webapp-brute-forcer, researchers can test an Outlook's Web app to see if it is vulnerable to a brute-force attack.

10 of 12

BackdoorMe Finds a Way Into Systems

The BackdoorMe utility provides security researchers with a tool that attempts to place a backdoor on a target system.

11 of 12

The Phishing Bell Tolls for Hemingway

Hemingway is a spear-phishing tool helper to assist security researchers in executing social engineering-type attacks against targets.

12 of 12

BlackArch Is Powered by a Linux 4.3 Kernel

BlackArch 2016.01.10 is powered by a Linux 4.3 kernel at the core of the operating system.

Top White Papers and Webcasts