Recent Articles | A Recent Security Horror Story This will teach folks to put out help wanted ads, seems a receptionist in Florida read a help wanted ad that her employer put on, and thought that she was going to be replaced. Rather than asking, and thinking that her...
The Un-Server: Using A MacBook I started following through with some of my 2008 resolutions. First thing was to finally take the time to program our thermostat. I set it to 59 degrees at 10:00 PM, then to turn up to 64 at 7:00 AM, down to 62...
2007's Biggest Problem - The Trusted Insider This has not been a banner year for insider hacks, and insider data loss across the board. In many ways we can most likely call this the year of the insider. Either through actual hacking, or through actual not...
Security Around Social Initiatives Read Write Web has a great digest of the entire last round of social applications, from open social to Facebook, android, Bebo and box.net. Understanding these applications from a security viewpoint is...
Red Hat, Where's The Love For Hyperic? Matt Aslett at The 451 Group reports: "Red Hat and GroundWork Open Source announced an interesting expansion of their partnership today that sees Red...
|
| | 02.11.08 Net Stalker's N-Stealth
By Dan Morrill
If you need yet another tool in your tool box, and you want a good web site application level scanner, then you might want to check out N-Stealth from Net Stalker.
Nstealth is a small footprint scanner that in the free edition can find a lot of interesting things about your web site, from cross site scripting issues, through foot printing and fingerprinting of your system. The free ware version used below is one that is ok, costs no money, and can identify most of the issues with your web server.
The video above shows you how to use the tool, and how to verifiy the output from the tool. As with all tools, it can find a number of false positives, and it is always a good idea to test the tools findings, to make sure if there really is an issue.
Tools used in this episode - Nstalker's Nstealth which you can find here.
Comments
About the Author: Dan Morrill has been in the information security field for 18 years, both civilian and military, and is currently working on his Doctor of Management. Dan shares his insights on the important security issues of today through his blog, Managing Intellectual Property & IT Security, and is an active participant in the ITtoolbox blogging community. |
0 comments:
Post a Comment