lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 31 Mar 2015 18:06:23 +0100
From: Antonio Quina <antonio.quina@...force.com>
To: fulldisclosure@...lists.org
Subject: Re: [FD] [Tool] SPARTA 1.0 BETA

We have released SPARTA 1.0.2 BETA with some bug fixes and new features.

Read about it:
http://sparta.secforce.com/2015/03/sparta-1-0-2-beta-released/

Download:
https://github.com/SECFORCE/sparta

On 09/01/15 11:21, Antonio Quina wrote:
> SPARTA is a python GUI application which simplifies network
> infrastructure penetration testing by aiding the penetration tester in
> the scanning and enumeration phase. It allows the tester to save time by
> having point-and-click access to his toolkit and by displaying all tool
> output in a convenient way. If little time is spent setting up commands
> and tools, more time can be spent focusing on analysing results.
> 
> Features:
> – Run nmap from SPARTA or import nmap XML output.
> – Transparent staged nmap: get results quickly and achieve thorough
> coverage.
> – Configurable context menu for each service. You can configure what to
> run on discovered services. Any tool that can be run from a terminal,
> can be run from SPARTA.
> – You can run any script or tool on a service across all the hosts in
> scope, just with a click of the mouse.
> – Define automated tasks for services (ie. Run nikto on every HTTP
> service, or sslscan on every ssl service).
> – Default credentials check for most common services. Of course, this
> can also be configured to run automatically.
> – Identify password reuse on the tested infrastructure. If any
> usernames/passwords are found by Hydra they are stored in internal
> wordlists which can then be used on other targets in the same network
> (breaking news: sysadmins reuse passwords).
> – Ability to mark hosts that you have already worked on so that you
> don’t waste time looking at them again.
> – Website screenshot taker so that you don’t waste time on less
> interesting web servers.
> 
> 
> For more info: http://sparta.secforce.com
> 

-- 
Antonio Quina
Security Consultant

SECFORCE
Aegon House, Lanark Square, Canary Wharf
E14 9QD London

Tel: +44 (0) 84 5056 8694
Mob: +44 (0) 75 8263 1888
http://www.secforce.com

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ