Page 56 - index
P. 56







Tool:

You can find the code on Github:

http://github.com/infobyte/cscan


In the next iteration of Faraday we are going to be distributing it within the tool sets in the
directory$FARADAY_DIR/scripts/cscan/


Install:


*For burp it is necessary include the plugin plugin/carbonator/carbonator.py, it has some
modifications to adapt it for our implementation.


A couple more requirements:
* pip install python-owasp-zap-v2 w3af-api-client



To-Do:

To add more tools and to improve the detection of errors of the tools.
We are really looking forward to hear your recommendations, questions and pull requests!

About The Author

Francisco Amato is a researcher and computer security consultant who works in
the area of vulnerability Development, blackbox testing and reverse engineering.
He is CEO of Infobyte Security Research (Infobyte LLC) www.infobytesec.com,
from where he published his developments in audit tools and vulnerabilities in
products from companies like Novell, IBM, Sun Microsystems, Apple, Microsoft.
Infobyte LLC. founded in 2001, providing specialized services in offensive
security, is the first company providing Red Team Services in Latin America. By using real attack
scenarios where the physical security and the IT infrastructure of our clients is put to the test.
Faraday is the first Multiuser Penetration IDE released back in 2013 by Infobyte LLC
http://www.faradaysec.com. Designed for distributing, indexation and analysis of the generated
knowledge during the engagement of a penetration test. The main purpose of Faraday is to re-use
the tools available in the community to get more advantage from them in a multiuser way. His last
work was evilgrade a modular framework that allows the user to take advantage of an upgrade
process from different applications, compromising the system by injecting custom payloads.

Founder and organizer of ekoparty south america security conference www.ekoparty.org.

http://twitter.com/famato

56 Cyber Warnings E-Magazine – October 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   51   52   53   54   55   56   57   58   59   60   61