From: Prasanna M (PrasannaM@catsglobal.co.in)
Date: Thu Sep 09 2004 - 05:36:00 EDT
burp is rather slow. its pretty decend tho.
I couldn't use Achilles on my windows box though. achilles wouldnt work,
only burp would.
Prasanna
-----Original Message-----
From: Nicolas Montoza
To: pen-test@securityfocus.com
Sent: 9/9/2004 4:49 AM
Subject: Re: Achilles proxy for linux
Burp Proxy
Is a Java application, and runs on any platform for which a Java
Runtime Environment
http://www.portswigger.net/proxy/
-- D. Nicolas Montoza T. xonico at gmail dot com On Wed, 8 Sep 2004 12:08:05 -0700, Altheide, Cory B. (IARC) <altheidec@nv.doe.gov> wrote: > > -----Original Message----- > > From: tclahr@br.ibm.com [mailto:tclahr@br.ibm.com] > > Sent: Wednesday, September 08, 2004 7:23 AM > > To: pen-test@securityfocus.com > > Subject: Achilles proxy for linux > > > > I tried to use Paros 3.1.3 but it just gather > > information. I can't change > > it and send it out to the server. > > Yes, it can. > > 2. Trap Response > > Just turn on the "Trap Response" check box in the "Trap" tag and all > response will then be trapped. You can modify the content in the Header/Body > text area and click "Continue" button to proceed > > http://www.proofsecure.com/functions.shtml > > Cory Altheide > Senior Network Forensics Specialist > NNSA Information Assurance Response Center (IARC) > altheidec@nv.doe.gov > > > > > ------------------------------------------------------------------------ ------ > Ethical Hacking at the InfoSec Institute. All of our class sizes are > guaranteed to be 12 students or less to facilitate one-on-one interaction > with one of our expert instructors. Check out our Advanced Hacking course, > learn to write exploits and attack security infrastructure. Attend a course > taught by an expert instructor with years of in-the-field pen testing > experience in our state of the art hacking lab. Master the skills of an > Ethical Hacker to better assess the security of your organization. > > http://www.infosecinstitute.com/courses/ethical_hacking_training.html > ------------------------------------------------------------------------ ------- > > ------------------------------------------------------------------------ ------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ------- ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:04 EDT