cve-search - a free software to collect, search and analyse common vulnerabilities and exposures in software
|
|
|
- Emil Booker
- 10 years ago
- Views:
Transcription
1 cve-search - a free software to collect, search and analyse common vulnerabilities and exposures in software Alexandre Dulaunoy and Pieter-Jan Moreels BruCON 0x07 9th October 2015
2 What we were looking for? Offline local search of common vulnerabilities and exposures Do you really want to search NIST (based in US) for your current vulnerable software... Fast-lookup of vulnerabilities (e.g. live evaluation of network traffic for vulnerable software). Allow localized classification of vulnerabilities (e.g. classify software following your exposure). Flexible data structure (e.g. NIST/NVD is not the only source). Allowing the use of Unix-like tools to process the vulnerabilities. Build new tools based on local database of software and hardware vulnerabilities. 2 of 23
3 History of cve-search Wim Remes started with a simple script to read CVE and import it in MongoDB. In late 2012, Alexandre Dulaunoy improved the back-end of cve-search and associated tools. In 2014, Pieter-Jan Moreels improved the various Web interface to make them usable. Today, Alexandre and Pieter-Jan are lead and welcome all additional contributions. 3 of 23
4 A functional overview of cve-search (populating databases) db mgmt.py fetch NVD/CVE from NIST db updater.py index n last new CVE db fulltext.py Whoosh index 4 of 23 db mgmt cpe dictionnary.py fetch CPE from NIST MongoDB cve cpe ranking info Redis cache
5 Data sources imported and used by cve-search NIST NVD Common Vulnerabilities and Exposure (CVE), Common Platform Enumeration (CPE), Official Vendor Statements, Common Weakness Enumeration (CWE), Common Attack Pattern Enumeration and Classification (CAPEC), NIST MITRE cross-reference assignment. Exploitation reference from D2 Elliot Web Exploitation Framework (D2SEC). Microsoft Bulletin (Security Vulnerabilities and Bulletin). vfeed 1 additional cross-references from Toolswatch of 23
6 A functional overview of cve-search (tools) MongoDB cve cpe ranking info search.py / search fulltext.py dump last.py search xmpp.py index.py / minimal-web.py 6 of 23 search irc.py Whoosh search cpe.py index search cve fulltext.py doc.py DB tools db blacklist.py db cpe browser.py db fulltext.py db mgmt *.py db notification.py db ranking.py db updater.py db whitelist.py
7 cve-search starting up... Import and update of the CVE/NVD and CPE database: 1 % python3. 3 d b u p d a t e r. py v i Search CVE of a specific vendor (via CPE): 1 % python3. 3 s e a r c h. py p joomla : CVE CVE CVE CVE CVE CVE of 23
8 cve-search simple query and JSON output 1 s e a r c h. py c CVE n 2 { M o d i f i e d : T13 : 0 1 : : 0 0, P u b l i s h e d : T20 : 5 5 : : 0 0, i d : { $ o i d : 514 cce0db fa3f211 }, c v s s : 5. 0, i d : CVE , r e f e r e n c e s : [ h t t p : / / x f o r c e. i s s. net / x f o r c e / xfdb /81926, h t t p : / / d e v e l o p e r. joomla. org / s e c u r i t y / news / core i n f o r m a t i o n d i s c l o s u r e. html ], summary : Joomla! x through a l l o w s a t t a c k e r s to o b t a i n s e n s i t i v e i n f o r m a t i o n v i a u n s p e c i f i e d v e c t o r s r e l a t e d to an \ U ndefined v a r i a b l e. \, v u l n e r a b l e c o n f i g u r a t i o n : [ Joomla! , Joomla! ] } Without CPE name lookup: 1 v u l n e r a b l e c o n f i g u r a t i o n : [ cpe : / a : joomla : joomla % 2 1 : , cpe : / a : joomla : joomla % 2 1 : ] } 8 of 23
9 CPE - an overview 1 cpe : / { p a r t } : { vendor } : { p r o d u c t } : { v e r s i o n } : { update } : { e d i t i o n } : { l a n g u a g e } part o a h name Operating System Application Hardware An empty part defines any element. CPE are updated at a regular interval by NIST but it happens that CPE dictionnary are updated afterwards. cve-search supports version 2.2 and 2.3 of the CPE format. 9 of 23
10 Which are the top vendors using the word unknown? 1 s e a r c h f u l l t e x t. py q unknown f j q r.. v u l n e r a b l e c o n f i g u r a t i o n [ 0 ] cut f 3 d : s o r t u n i q c s o r t nr head of 23 Count CPE vendor name 1145 oracle 367 sun 327 hp 208 google 192 ibm 113 mozilla 102 microsoft 98 adobe 76 apple 68 linux
11 Which are the top products using the word unknown? 1 s e a r c h f u l l t e x t. py q unknown f j q r.. v u l n e r a b l e c o n f i g u r a t i o n [ 0 ] cut f3, 4 d : s o r t u n i q c s o r t nr head of 23 Count CPE vendor/product name 191 oracle:database server 189 google:chrome 115 oracle:e-business suite 111 sun:jre 101 mozilla:firefox 99 oracle:fusion middleware 95 oracle:application server 80 sun:solaris 68 linux:linux kernel 61 sun:sunos
12 oracle:java versus sun:jre 1 s e a r c h. py p o r a c l e : j a v a o j s o n j q r. cvss R s c r i p t e summary ( as. numeric ( read. t a b l e ( f i l e ( s t d i n ) ) [, 1 ] ) ) 2 3 Min. 1 s t Qu. Median Mean 3 rd Qu. Max s e a r c h. py p sun : j r e o j s o n j q r. c v ss R s c r i p t e summary ( as. numeric ( read. t a b l e ( f i l e ( s t d i n ) ) [, 1 ] ) ) 7 8 Min. 1 s t Qu. Median Mean 3 rd Qu. Max of 23
13 Ranking of vulnerabilities 1 d b r a n k i n g. py c sap : g a c c o u n t i n g r 3 2 s e a r c h. py c CVE o j s o n r 3... c v s s : , i d : CVE , r a n k i n g : [ [ { a c c o u n t i n g : 3 } ] ]... Ranking is a simple and flexible approach based on CPE value. An organisation or a dept (-g) and an integer value is set when a CPE hits. If you are a CSIRT or a local ICT team, you can use your own tagging to weight the critical software/vendor in your constituency. 13 of 23
14 Ranking helping for internal publishing of vulnerabilities dump last.py can be used to generate an overview of the current/recent vulnerabilities in your organization. You can limit the result to the ranked software to avoid non-related software vulnerabilities. 1 d u m p l a s t. py r l 100 f html 2 d u m p l a s t. py r l 100 f atom 14 of 23
15 search fulltext.py -g -s 15 of 23
16 Visualization using the browser (index.py) 16 of 23
17 Optimizing search results - Web interface github.com/cve-search/cve-search-mt (management tools) 17 of 23
18 Simple ReST API (minimal-web.py) 1 c u r l h t t p s : / / cve. c i r c l. l u / a p i / l a s t API returns JSON data Browse vendors (/api/browse). Find products associated to a vendor (/api/browse/microsoft). Find CVEs for a specific product (/api/search/microsoft/xbox 360). Get CVE detailed information including CAPEC and CWE (/api/cve/cve ). Recent CVEs (/api/last). Public version running on 18 of 23
19 Can cve-search be used by bad guys? If you know that a system is vulnerable, you have two options: If you are a good guy, you inform the system owner to fix the vulnerability. If you are a bad guy 2, you abuse your position and compromise the vulnerable system. cve-search could help both guys. Don t forget the freedom 0 of free software The freedom to run the program, for any purpose of 23
20 How can you help? Looking for open data source of software vulnerabilities to integrate into cve-search. Software or hardware vendors who provide a new open data source are elligible for 1Kg of Belgian chocolade or a pack of 6 Orval beers. Dataset of cve-search ranking can be shared with localized information (e.g. per country/region/sector). Pushing vendors to release their vulnerability information in an open way. Asking vendors to support CPE naming convention (e.g. openssl versus libssl in Debian). Fork it, abuse it and then send pull request github.com/adulau/cve-search (stable) github.com/pidgeyl/cve-search (unstable) 20 of 23
21 Roadmap and future Add vulnerabilities data sources from software and hardware vendors. Improve data structure and back-end to reduce code size. Expand cve-search to include vulnerabilities without CVE assignment. Improve documentation and external tools relying on cve-search. 21 of 23
22 Software using CVE-Search CVE-Portal CVE Notification Portal CVE-Scan Extract vunerabilities in systems from NMAP scans NorthernSec Vulnerability-Management Vulnerability management tool (Still under development) 22 of 23
23 Contact Details Alexandre 23 of 23
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
ECS 235A Project - NVD Visualization Using TreeMaps
ECS 235A Project - NVD Visualization Using TreeMaps Kevin Griffin Email: [email protected] December 12, 2013 1 Introduction The National Vulnerability Database (NVD) is a continuously updated United
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
Manage Vulnerabilities (VULN) Capability Data Sheet
Manage Vulnerabilities (VULN) Capability Data Sheet Desired State: - Software products installed on all devices are free of known vulnerabilities 1 - The list of known vulnerabilities is up-to-date Desired
JAVASCRIPT CHARTING. Scaling for the Enterprise with Metric Insights. 2013 Copyright Metric insights, Inc.
JAVASCRIPT CHARTING Scaling for the Enterprise with Metric Insights 2013 Copyright Metric insights, Inc. A REVOLUTION IS HAPPENING... 3! Challenges... 3! Borrowing From The Enterprise BI Stack... 4! Visualization
SAP NetWeaver 7.4 Planning Product Availability Matrix (Planning PAM)
SAP NetWeaver 7.4 Planning Product Availability Matrix (Planning PAM) with all EHPs February, 2014 Disclaimer: This document represents current planning for NW only and not for the SAP products using NW
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
IT Risk Management: Guide to Software Risk Assessments and Audits
IT Risk Management: Guide to Software Risk Assessments and Audits Contents Overview... 3 Executive Summary... 3 Software: Today s Biggest Security Risk... 4 How Software Risk Enters the Enterprise... 5
Risk Assessment and Security Testing Johannes Viehmann 2015 of Large Scale Networked Systems with RACOMAT
Risk Assessment and Security Testing Johannes Viehmann 2015 of Large Scale Networked Systems with RACOMAT Overview Risk Assessment and Security Testing of Large Scale Networked Systems with RACOMAT Table
Newsletter - September 2014. T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER
Newsletter - September 2014 T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER Tools! Lots of Tools Released! During September 2014, we published 7 Posts with 2 News Tools. Organized by Date OWASP Xenotix
White Paper. Understanding NIST 800 37 FISMA Requirements
White Paper Understanding NIST 800 37 FISMA Requirements Contents Overview... 3 I. The Role of NIST in FISMA Compliance... 3 II. NIST Risk Management Framework for FISMA... 4 III. Application Security
1 Scope of Assessment
CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned
User s Guide. Skybox Risk Control 7.0.0. Revision: 11
User s Guide Skybox Risk Control 7.0.0 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)
Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,
APPENDIX A Web Redesign Infrastructure. Deployment Overview
APPENDIX A Web Redesign Infrastructure Deployment Overview Last Updated: 02/22/2010 New Products Glossary IBM Server Components IBM WebSphere Portal: IBM WebSphere Portal Server extends the WebSphere platform
Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities
Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner BanyanOps {www.banyanops.com, [email protected]} Docker Hub
VRDA Vulnerability Response Decision Assistance
VRDA Vulnerability Response Decision Assistance Art Manion CERT/CC Yurie Ito JPCERT/CC EC2ND 2007 2007 Carnegie Mellon University VRDA Rationale and Design 2 Problems Duplication of effort Over 8,000 vulnerability
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Open Source Technologies on Microsoft Azure
Open Source Technologies on Microsoft Azure A Survey @DChappellAssoc Copyright 2014 Chappell & Associates The Main Idea i Open source technologies are a fundamental part of Microsoft Azure The Big Questions
Copyright 2015 Splunk Inc. Affordable Security: Making the most of free tools and data. Craig Merchant. Senior Security Architect, Oracle
Copyright 2015 Splunk Inc. Affordable Security: Making the most of free tools and data Craig Merchant Senior Security Architect, Oracle Disclaimer During the course of this presentafon, we may make forward
Security Vulnerabilities in Open Source Java Libraries. Patrycja Wegrzynowicz CTO, Yonita, Inc.
Security Vulnerabilities in Open Source Java Libraries Patrycja Wegrzynowicz CTO, Yonita, Inc. About Me Programmer at heart Researcher in mind Speaker with passion Entrepreneur by need @yonlabs Agenda
TECHNICAL VULNERABILITY & PATCH MANAGEMENT
INFORMATION SECURITY POLICY TECHNICAL VULNERABILITY & PATCH MANAGEMENT ISO 27002 12.6.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-12.6.1 Version No: 1.1 Date: 1 st
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP Vasileios A. Baousis (Ph.D) Network Applications Team Slide 1 Agenda Introduction Background - SCAP - Puppet &Mcollective
Security compliance automation with Red Hat Satellite
Security compliance automation with Red Hat Satellite Matt Micene Solution Architect, DLT Solutions @cleverbeard @nzwulfin Created with http://wordle.net Compliance is a major problem About half of the
Product comparison. GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2
Product comparison GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2 General features GFI LanGuard 2014 Microsoft WSUS 3.0 SP2 Scheduled scans Agent-less r Agent-based Integration
HTML5 and security on the new web
HTML5 and security on the new web By James Lyne, Director of Technology Strategy There are lots of changes happening to the key technologies that power the web. The new version of HTML, the dominant web
Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015
For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6
Security Vulnerability Management. Mark J Cox
Security Vulnerability Management Mark J Cox Responsibility & Accountability Unique challenges Many vendors all ship the same thing The vulnerabilities are there. The fact that somebody in the middle of
LAMP Server A Brief Overview
2012 LAMP Server A Brief Overview Daniel Eakins Santa Fe College CTS 2356 Advanced Administration 3/21/2012 Abstract LAMP is short for Linux, Apache, MySQL, and PHP. LAMP servers are typically not Windows
ORACLE USER PRODUCTIVITY KIT V3.6.1 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3)
ORACLE USER PRODUCTIVITY KIT V3.6.1 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3) KEY FEATURES AND BENEFITS DRIVE USER PRODUCTIVITY AND MITIGATE RISK. FEATURES Single, synchronized authoring
Qualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore
CYBER TRENDS & INDUSTRY PENETRATION TESTING Technology Risk Supervision Division Monetary Authority of Singapore A NEW DAWN New Services / Mobile Application, NFC, FAST Technology / Biometrics, Big Data,
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Federal Desktop Core Configuration (FDCC)
Federal Desktop Core Configuration (FDCC) Presented by: Saji Ranasinghe Date: October, 2007 FDCC Federal Desktop Core Configuration (FDCC) Standardized Configuration with Hardened Security Settings to
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
WHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
Vulnerability Scanning Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014
Vulnerability Scanning Requirements and Process Clarification Disposition and FAQ 11/27/2014 Table of Contents 1. Vulnerability Scanning Requirements and Process Clarification Disposition... 3 2. Vulnerability
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
Microsoft Azure: Opção de Nuvem para Todo o Desenvolvedor. Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert
Microsoft Azure: Opção de Nuvem para Todo o Desenvolvedor Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert Open Source on Microsoft Azure Two categories Compute Data IaaS, PaaS, and
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
2013 Ruby on Rails Exploits. CS 558 Allan Wirth
2013 Ruby on Rails Exploits CS 558 Allan Wirth Background: Ruby on Rails Ruby: Dynamic general purpose scripting language similar to Python Ruby on Rails: Popular Web app framework using Ruby Designed
StreamServe Persuasion SP5 Supported platforms and software
StreamServe Persuasion SP5 Supported platforms and software Reference Guide Rev A StreamServe Persuasion SP5 Reference Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520
Programming Flaws and How to Fix Them
19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council
Version 1.0 Date: Author: PCI Security Standards Council Executive Summary The time to migrate is now. For over 20 years Secure Sockets Layer (SSL) has been in the market as one of the most widely-used
Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
apiomat Enterprise Mobile Enterprise Application Platform the Next Generation
Mobile Enterprise Application Platform the Next Generation Digital Transformation Mobile is changing the game Starting with Apple s iphone mobile devices have changed economy from the scratch new business
Cloud Powered Mobile Apps with Microsoft Azure
Cloud Powered Mobile Apps with Microsoft Azure Malte Lantin Technical Evanglist Microsoft Azure Malte Lantin Technical Evangelist, Microsoft Deutschland Fokus auf Microsoft Azure, App-Entwicklung Student
Web Design Technology
Web Design Technology Terms Found in web design front end Found in web development back end Browsers Uses HTTP to communicate with Web Server Browser requests a html document Web Server sends a html document
Common Platform Enumeration (CPE) Technical Use Case Analysis
Common Platform Enumeration (CPE) Technical Use Case Analysis The MITRE Corporation November, 2008 Executive Summary A common theme taken from discussions at the Common Platform Enumeration (CPE) Developer
Service Manager and the Heartbleed Vulnerability (CVE-2014-0160)
Service Manager and the Heartbleed Vulnerability (CVE-2014-0160) Revision 1.0 As of: April 15, 2014 Table of Contents Situation Overview 2 Clarification on the vulnerability applicability 2 Recommended
Consolidate by Migrating Your Databases to Oracle Database 11g. Fred Louis Enterprise Architect
Consolidate by Migrating Your Databases to Oracle Database 11g Fred Louis Enterprise Architect Agenda Why migrate to Oracle What is migration? What can you migrate to Oracle? SQL Developer Migration Workbench
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
DBX. SQL database extension for Splunk. Siegfried Puchbauer
DBX SQL database extension for Splunk Siegfried Puchbauer Agenda Features Architecture Supported platforms Supported databases Roadmap Features Database connection management SQL database input (content
Lumension Guide to Patch Management Best Practices
Lumension Guide to Patch Management Best Practices With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security
How To Test For Performance
: Roles, Activities, and QA Inclusion Michael Lawler NueVista Group 1 Today s Agenda Outline the components of a performance test and considerations Discuss various roles, tasks, and activities Review
IBM MobileFirst Hands-on Labs environment with Linux on z Systems and z/os
IBM MobileFirst Hands-on Labs environment with Linux on z Systems and z/os Session Nr: 16772 + 16773 Wilhelm Mild Executive IT Architect [email protected] Erich Amrehn Distinguished Engineer [email protected]
Secunia Vulnerability Intelligence Manager (VIM) 4.0
Secunia Vulnerability Intelligence Manager (VIM) 4.0 In depth Real-time vulnerability intelligence brought to you on time, every time, by Secunia s renowned research team Introduction Secunia is the world-leading
PAKITI Patching Status System
PAKITI Patching Status System EGI-InSPIRE A Race for Security: Identifying Vulnerabilities on 50 000 Hosts Faster then Attackers Michal Procházka 1, Daniel Kouřil 1, Romain Wartel 2, Christos Kanellopoulos
Oracle WebLogic Server: Remote Monitoring and Management
October 13, 2015 Oracle WebLogic Server: Remote Monitoring and Management Raastech, Inc. 2201 Cooperative Way, Suite 600 Herndon, VA 20171 +1-703-884-2223 [email protected] About Us Ahmed Aboulnaga @Ahmed_Aboulnaga
2. Highlights and Updates: ITSM for Databases
IBM Tivoli Storage Manager Data Protection for Oracle Neil Rasmussen Software Development for Tivoli Data Protection Tivoli Software, IBM SWG [email protected] Agenda 1. Overview: Tivoli Storage Manager
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase
============================================================= =============================================================
Stephan Lantos Subject: FW: @RISK: The Consensus Security Vulnerability Alert: Vol. 13, Num. 23 In partnership with SANS and Sourcefire, Qualys is pleased to provide you with the @RISK Newsletter. This
Software Requirements Specification
Software Requirements Specification Version 1.1 March 7, 2013 Prepared by Group Name: The Constructors Alex Hamstra 4506291 [email protected] Jared Roesch 4826574 [email protected] Kyle Jorgensen
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
ios SDK possibilities & limitations
ios SDK possibilities & limitations Licensing Licensing Registered as an Apple Developer (free) Access to XCode3 and ios SDK ios, Mac and Safari Dev Center Resources No possibility of distribution of developed
YOUR APP. OUR CLOUD.
YOUR APP. OUR CLOUD. The Original Mobile APP! Copyright cloudbase.io 2013 2 THE MARKET Mobile cloud market in billions of $ $ 16 $ 14 $ 12 $ 10 $14.5bn The size of the mobile cloud market in 2015 $ 8 $
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS /ABOUT/ME Thomas Chopitea - Incident handler @CertSG Digital forensics & incident response (#DFIR), malware analysis,
Cyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
EAS-SEC Project: Securing Enterprise Business Applications
EAS-SEC Project: Securing Enterprise Business Applications SESSION ID: SEC-W06 Alexander Polyakov CTO ERPScan @Twitter sh2kerr Alexander Polyakov CTO of the ERPScan inc EAS-SEC.org President Business application
Using the Juliet Test Suite to compare Static Security Scanners
Using the Juliet Test Suite to compare Static Security Scanners Andreas Wagner 1, Johannes Sametinger 2 1 GAM Project, IT Solutions, Schwertberg, Austria 2 Dept. of Information Systems Software Engineering,
The Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs
FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs Where we have been 1 st Security Automation Workshop nearly 20 people in a small room for the day
How To Use Open Source Software In Government
Open Source Software Options for Government February 2011 Aim 1. This document presents options for Open Source Software for use in Government. 2. It is presented in recognition that open source software
How To Use Qqsguard At The University Of Minneapolis
Qualys is a vulnerability scanner that is used for critical servers and servers subject to compliance reporting. This scanner is not generally to be used for desktop or laptop scanning. OIT has purchased
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Electronic Commerce Engineering
219322 Electronic Commerce Engineering Lecture 4 Laudon & Traver: Chapter 4 Building an E-commerce Web Site Copyright 2007 Pearson Education, Inc. Slide 4-1 Building an E-commerce Site: A Systematic Approach
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
SD Elements: A Tool for Secure Application Development Management
SD Elements: A Tool for Secure Application Development Management Golnaz Elahi 1, Tom Aratyn 2, Ramanan Sivaranjan 2, Rohit Sethi 2, and Eric Yu 3 1 Department of Computer Science, University of Toronto,
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
