Penetration Testing mailing list archives

Re: Achilles proxy for linux


From: Nicolas Montoza <xonico () gmail com>
Date: Wed, 8 Sep 2004 20:19:11 -0300

Burp Proxy
Is a Java application, and runs on any platform for which a Java
Runtime Environment

http://www.portswigger.net/proxy/

--
D. Nicolas Montoza T.
xonico at gmail dot com

On Wed, 8 Sep 2004 12:08:05 -0700, Altheide, Cory B. (IARC)
<altheidec () nv doe gov> wrote:
-----Original Message-----
From: tclahr () br ibm com [mailto:tclahr () br ibm com]
Sent: Wednesday, September 08, 2004 7:23 AM
To: pen-test () securityfocus com
Subject: Achilles proxy for linux

I tried to use Paros 3.1.3 but it just gather
information. I can't change
it and send it out to the server.

Yes, it can.

2. Trap Response

Just turn on the "Trap Response" check box in the "Trap" tag and all
response will then be trapped. You can modify the content in the Header/Body
text area and click "Continue" button to proceed

http://www.proofsecure.com/functions.shtml

Cory Altheide
Senior Network Forensics Specialist
NNSA Information Assurance Response Center (IARC)
altheidec () nv doe gov




------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------



------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


Current thread: