OSCAL: the Open Security Controls Assessment Language - OSCAL is a set of formats expressed in XML, JSON, and YAML. These formats provide machine-readable representations of control catalogs, control baselines, system security plans, and assessment plans and results. pages.nist.gov/OSCAL/
πŸ‘︎ 40
πŸ’¬︎
πŸ‘€︎ u/digicat
πŸ“…︎ Jun 15 2021
🚨︎ report
SAP/vulnerability-assessment-tool - Analyses your Java and Python applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy. https://sap.github.io/vulnerability-assessment-tool/ github.com/SAP/vulnerabil…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/LinkDropper
πŸ“…︎ Jan 15 2020
🚨︎ report
Archery - Open Source Vulnerability Assessment and Management Tool for Developers and Pentesters [Updated 28 May] (See Comment) github.com/archerysec/arc…
πŸ‘︎ 8
πŸ’¬︎
πŸ‘€︎ u/TechLord2
πŸ“…︎ May 28 2018
🚨︎ report
Archery - Open Source Vulnerability Assessment and Management Tool

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. Archery uses popular opensource tools to perform comprehensive scanning for web application and network. It also performs web application dynamic authenticated scanning and covers the whole applications by using selenium. The developers can also utilize the tool for implementation of their DevOps CI/CD environment.

Overview of the tool: Perform Web and Network Vulnerability Scanning using opensource tools. Correlates and Collaborate all raw scans data, show them in a consolidated manner. Perform authenticated web scanning. Perform web application scanning using selenium. Vulnerability Managment. Enable REST API's for developers to perform scanning and Vulnerability Managment. Useful for DevOps teams for Vulnerability Managment.

Note: Currently, the project is in a development phase and still lot of work going on.

Web Site: https://archerysec.github.io/archerysec/ GitHub: https://github.com/archerysec/archerysec/

πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/andyxcker
πŸ“…︎ Jan 15 2018
🚨︎ report
IoT/Connected device discovery and vulnerability assessment API (IoTVAS) released with nmap integration example github.com/firmalyzer/iot…
πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/ucbrl
πŸ“…︎ Aug 16 2021
🚨︎ report
I've been asked to perform a vulnerability assessment on a web app for a family friend and need input on what should be included.

This will be a first for me so I'm looking for input on what should be included. A family friend has had a client of their web app request a vulnerability assessment (not pentest, the language of the request made that clear) for their web app hosted on Azure. My assessment of the situation concludes that this is really a box that needs to be checked for contract purposes so I'm thinking a Nessus scan and a well formatted/written report should probably be sufficient. Looking for input/feedback here as to what else you would suggest including?

πŸ‘︎ 29
πŸ’¬︎
πŸ“…︎ Feb 18 2021
🚨︎ report
Resources for Local Power Analysis and Vulnerability Assessment?

I'm a long time SF Bay Area resident recently moved to Lake County bc of the housing crisis. I'm looking for books articles websites resources that will help me research and understand local power structures that underpin class oppression and exploitation as well as ecocide.

I'm aware in CA for example that the state property tax restrictions driven by middle class and upper income homeowners is a key power dynamic in driving fiscal austerity oppression in the state. I'd like to understand better the complete power situation from the ground up with an eye to how democratic socialist politics including electoral strategy could start to make a real impact locally or identify what actors are already making significant impact and need to be strengthened.

I'm familiar with Marxism and dont want a 'it's all capitalist we need an independent working class party' analysis bc I consider this simplistic Left religion ideology. I want to be able to research the actual way that class politics uses local power structures through elections to enforce class dominance on the people who live here.

The agricultural interests here probably play the main role in local politics but we are a Blue region in a Blue state so clearly the dems are using some liberal issues to gain support and cover their class allegiances. I'd love to see a real democratic socialist politics enter electoral contests.

I'm a DSA member since a year ago but have had a very difficult time connecting w the North Bay DSA folks who I imagine would have some really interesting things to say about this.

πŸ‘︎ 17
πŸ’¬︎
πŸ‘€︎ u/RelaxedWanderer
πŸ“…︎ Aug 09 2020
🚨︎ report
risk assessment methodology and vulnerability identification

got this question on cyber q.

"Which of the following steps for risk assessment methodology refers to vulnerability identification? "

possible answers:

  • A. Determines risk probability that vulnerability will be exploited (High, Medium, Low)
  • B. Identifies sources of harm to an IT system (Natural, Human, Environmental)
  • C. Assigns values to risk probabilities; Impact values
  • D. Determines if any flaws exist in systems, policies, or procedures

answer given is D. However I was swaying towards A. Thoughts?

thanks

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/devag1
πŸ“…︎ Nov 15 2020
🚨︎ report
Covid-19: Matrix for assessment of economic vulnerability and healthcare capacity (EU-27, UK, US, Japan, China)
πŸ‘︎ 39
πŸ’¬︎
πŸ‘€︎ u/FDGirl22
πŸ“…︎ Mar 29 2020
🚨︎ report
CISSP Domain 6 Review - Vulnerability Assessment and Penetration Testing

Hey CISSP studiers, I just uploaded a new CISSP Domain 6 review video focused on Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk

The final video for domain 6 should be up in a few days, and I'm working on 6 videos for Domain 7.

Here are the other review / Mind Map videos I have completed so far:

Domain 5

Domain 6

Security Assessment and Testing: https://youtu.be/eDVZvw5NziA

I hope these help you in your studies!

πŸ‘︎ 29
πŸ’¬︎
πŸ‘€︎ u/RWitchest
πŸ“…︎ Apr 24 2020
🚨︎ report
Using PowerShell for Pentesting Tasks and Vulnerability assessments youtube.com/watch?v=4_bqw…
πŸ‘︎ 8
πŸ’¬︎
πŸ‘€︎ u/davidalbertozam
πŸ“…︎ Sep 28 2020
🚨︎ report
Most secure programming languages (Whitesource report based on reported open source vulnerabilities, pdf) content.cdntwrk.com/files…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/random_cynic
πŸ“…︎ Mar 19 2019
🚨︎ report
[FOR HIRE] Web App and Network Penetration Testing, Vulnerability Assessment, System Administration

NAME YOUR PRICE

I'm accepting payments via Paypal because my account in Gcash isn't verified. I do have certifications from eLearnSecurity (eJPT, eWPT, eWPTXv2). I have 2 years of experience on this field and worked as a web developer before for 2 years.

I'm one of the employees that had been laid off due to the pandemic.

πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/jahndoe123
πŸ“…︎ Jul 30 2020
🚨︎ report
H.R. 8045: To require the Department of Homeland Security to develop a threat assessment on the potential homeland security vulnerabilities associated with genome modification and editing, and for other purposes.

Introduced: Sponsor: Rep. John Joyce [R-PA13]

This bill was referred to the House Committee on Energy and Commerce which will consider it before sending it to the House floor for consideration.

Govtrack.us Summary

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/congressbot
πŸ“…︎ Aug 15 2020
🚨︎ report
Zephyr and MCUboot Security Assessment: our research uncovered 25 vulnerabilities affecting the Zephyr RTOS and 1 vulnerability affecting MCUboot. research.nccgroup.com/202…
πŸ‘︎ 18
πŸ’¬︎
πŸ‘€︎ u/digicat
πŸ“…︎ May 26 2020
🚨︎ report
Do you know what’s hidden in your binaries? #BlackBerryJarvis 2.0 can identify software vulnerabilities in just minutes, not months, letting you resolve issues with third-party commercial and open-source software sooner. Request a trial today: https://t.co/CRQdAXgkOu https://t.co/XLvP9iSr8n v.redd.it/sgrn52j33hu71
πŸ‘︎ 42
πŸ’¬︎
πŸ“…︎ Oct 19 2021
🚨︎ report
"Voting machines used by as many as a quarter of American voters heading to the polls in 2012 can be hacked with just $10.50 in parts and an 8th grade science education, according to computer science and security experts at the Vulnerability Assessment Team at Argonne National Laboratory" velvetrevolution.us/newVR…
πŸ‘︎ 1k
πŸ’¬︎
πŸ‘€︎ u/georedd
πŸ“…︎ Apr 24 2012
🚨︎ report
How did the MYP E-Assessments for English Language and Literature and Integrated Humanities go for my Middle Years comrades!!? Easier or harder than expected?
πŸ‘︎ 10
πŸ’¬︎
πŸ‘€︎ u/jacdiepie
πŸ“…︎ May 11 2021
🚨︎ report
Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?

I work for a financial institution and I've been in IT for only like a 1.5 years, so I'm still learning this stuff. We have regular IT audits and such and now that I'm the only IT guy, I got to sit with the auditor and helped him fully scan our environment with Nessus. Results came back for around 150 systems and there was something like 500 vulnerabilities, 80% of which were missing critical Windows OS patches.

 

I was pretty shocked because I always stay on top of monthly Windows updates. The auditor says, "well, it says there's some here from as far back as August of 2016" in a condescending tone. I was pretty pissed but just accepted it and let him finish the scan and then I got the full assessment a few weeks later, which I'm now combing through.

 

So, first of all, I'm wondering.... don't Windows OS updates supersede past updates? --- meaning, if I miss some critical Windows OS updates for a month or two, but then I get all the critical updates for the following months all the way up until current time, then those newer updates take the place of those missing updates, meaning I no longer have to worry about those missed patches, correct? I assume the only thing Nessus is seeing is that those individual KB's are not listed in the Windows registry, and therefore flags them as not installed, despite the fact that it doesn't matter since all updates after those have been faithfully updated.

 

Other than that, I was thinking, we currently don't use WSUS because when I came on my job here, they had a 3rd party patch and software management tool called DesktopCentral by ManageEngine. That's how I do updates now, and I can view all the missing updates for every system and all I see are the missing updates for this month and a few for last month (machines that were turned off for weeks).

 

Additionally, we used to have Kaspersky 8 AV installed which was so unbelievably fucked up... I think it was even managing our Windows updates at one time. Then when I ripped it out of our environment, I had to use their special uninstall tool in safe mode.. so God knows how that messed things up. Some of my servers and computers that used to have Kav can't even run Windows update themselves.

 

Anyway, I'm hoping someone here has had a similar thing happen so you can maybe give some advice... otherwise, I'll just be knee-deep in manually patching super old updates.

πŸ‘︎ 21
πŸ’¬︎
πŸ‘€︎ u/networkasssasssin
πŸ“…︎ Dec 22 2017
🚨︎ report
Best vulnerability assessments Vendor

I am Network engineer in a bank and I want to know Which is best vendor for vulnerability assessments?

Qualys or Tenable or Rapid7 or Frontline or TripWire or BeyondTrust or another one

πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/Karim-1010
πŸ“…︎ Feb 16 2021
🚨︎ report
SD Coding Assessment Language and Tools

I'm taking the skills assessment test tomorrow, and from what I see there will be a proctoring service that will administer the test. Does that mean that the test will be given in only one language, or will it be something like HackerRank where you have an interactive window in which you can change the language?

Also, do you have access to tools like a terminal or anything that you can use for quick a/b testing or man pages and stuff? I basically live in Python Interactive Mode.

πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/iAmMzungu
πŸ“…︎ Apr 26 2021
🚨︎ report
An alternative approach to understand and assess vulnerability of wild fish communities subjected to persistent heavy metal burdens - Vulnerability Assessment for Heavy Metal Bioaccumulation (VAHMB). sciencedirect.com/science…
πŸ‘︎ 21
πŸ’¬︎
πŸ‘€︎ u/koushik_roy
πŸ“…︎ Nov 15 2019
🚨︎ report
What is the difference between a Vulnerability assessment and Risk assessment?

A customer emailed this question to me last week and I thought it was worth sharing the answer, because it can be a bit confusing.

From Emilia: β€œWhat is the difference between a Vulnerability assessment and Risk assessment? Are they considered to be two different documents?”

A vulnerability assessment and a risk assessment are done on different topics (eg. Risk assessment for food safety, vulnerability assessment for food fraud or intentional adulteration). You would not do both a risk assessment and a vulnerability assessment on the same topic. The resulting documents look pretty much the same as far as I am concerned. It’s mostly just about the language/words.

A vulnerability assessment is slightly different to a risk assessment; risk is something that has occurred before and will occur again, it can be quantified using existing data. A vulnerability is a weakness that can be exploited by someone or something who wishes to profit or intends harm. A vulnerability can lead to a risk. Because food fraud is difficult to estimate and quantify, we use the word vulnerability rather than risk. In addition, using the word β€˜vulnerability’ helps to minimise confusion in the food industry where risk assessments for food safety are commonly performed and well understood.

If you want to learn more about vulnerability assessments for food fraud or intentional adulteration, check out this step-by-step guide: https://www.foodfraudadvisors.com/food-vulnerability-assessment-how/

πŸ‘︎ 24
πŸ’¬︎
πŸ‘€︎ u/karenconstable4
πŸ“…︎ Oct 06 2019
🚨︎ report
At first glance, Classical Chinese and Latin seem to have been roughly equivalent in their place in East Asian and Western society. Is this a fair assessment? What role did the two languages have in the history and society of each region?
πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/normie_sama
πŸ“…︎ May 31 2021
🚨︎ report
Curious to know what tool/s people are using these days for PEN testing and vulnerability assessments. Been out of the game for a while and thinking of getting back in.
πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/nelsonserrao
πŸ“…︎ Apr 04 2019
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.