File: FAQ

package info (click to toggle)
doona 1.0%2Bgit20190108-2
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, forky, sid, trixie
  • size: 276 kB
  • sloc: perl: 2,287; makefile: 4; sh: 1
file content (55 lines) | stat: -rw-r--r-- 1,627 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55

 [ Frequently Asked Questions ]

 Bruteforce Exploit Detector
 written by mjm ( www.codito.de ) and snakebyte ( www.kryptocrew.de/snakebyte/ )


1.) Why test at all?

    Security is necessary, I think we agree on that.
    Due to the fact that there are other programs,
    and ways to test software ( see question 2 ),
    I think this one is the easiest. Simply sending
    the stuff to a server, which is known to
    cause problems. Verification of wheter a test failed
    or not is also pretty simple.
    So this collection of scripts does not verify that your
    code has no problems at all, but it can make sure, that
    you made your way around the most common ones.


2.) Which other tools exists for security testing?

    Splint ( www.splint.org )
      checks the source code of a program for problems

    BFBTester ( bfbtester.sourceforge.net )
      checks command line and environment problems of binaries

    l0phtwatch ( www.l0pht.com )
      detects temp file problems

    screamingcobra ( www.dachb0den.com )
      checks php and perl scripts for problems, wich can lead to acces files on the server

    wpoison ( wpoison.sourceforge.net )
      checks websites for SQL injection problems

    webtest ( martynov.org/webtest/ )
      tests scripts on your website 

    ...or you could hire a bunch of programmers, which check the code
    manually :)


3.) What is ''XAXAX''?

    XAXAX is the result of Snakebyte drinking beer and thinking about
    a good place-holder. XAXAX is replaced by the exploit string while
    testing.


4.) How can i write a plugin ?

	Check 'dummy.pm' for details..