Mantra – Security Framework Free and Open Source Browser based Security Framework.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING.
Advertisements

PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Rowan County Public Library. What Is a Web Browser? A web browser is a software application that allows you to browse the internet, provided that you.
Client and Server-Side Vulnerabilities Stephen Reese.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
PREVIOUS GNEWS. 13 Patches – 5 Critical Affecting Windows (pretty much all of them) Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS
Telerik Software Academy HTML Basics.
Computer Security and Penetration Testing
Penetration testing – W3AF Tool
Browser Exploitation Framework (BeEF) Lab
What is OWASP OWASP Live CD Live Demo Omar Sherin-OWASP Egypt.
The Business of Penetration Testing
Penetration Testing.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
Security Scanning OWASP Education Nishi Kumar Computer based training
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
What’s New and Hot In Free Software. Kingsoft Office Suite Does not use Java Free version has Microsoft 2003 interface – Paid versions can switch between.
You’re in good company if you use WordPress to publish on the web. Many famous blogs, news outlets, music sites, Fortune 500 companies and celebrities.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Build a Free Website1 Build A Website For Free 2 ND Edition By Mark Bell.
Bao Nguyen. Invention of the Web Browser World Wide Web, : Tim Berners-Lee & Robert Cailliau. Not very popular. Netscape Browser, :
CakePHP is an open source web development framework. It follows Model-View- Controller and is developed using PHP. IT is the basic for user to create.
Access Code Registration Portals for
Internet Vocabulary CTE Intro. URL  The “address” of a website. Entering this address in the Address Bar will take you directly to a particular website.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Adobe Certified Associate Objectives 2 Planning site design and page layout objectives.
Module 3 – Information Gathering  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Welcome UNICollaboration, the home of online intercultural exchange for university classrooms!
The tools we need Learning & Development Team Telerik Software Academy.
Browser Wars (Click on the logo to see the performance)
Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
The OWASP Foundation OWASP Mantra - An Introduction Prepared By -Team Mantra-
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Module 6 – Penetration  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration.
Browser Wars By: Jesse Arredondo
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
#1 Firefox - Pros Fast Browsing Addons Saving Tabs/Automatic Session Restore Security Customisable Spell Checker Parental Control Saving Videos Download.
Access Code Registration Portals for
JMU GenCyber Boot Camp Summer, “Canned” Exploits For many known vulnerabilities attackers do not have to write their own exploit code Many repositories.
Searching Dr.Kannika Chukiatmun DDS.,MD.,MsIT 20 Feb 09 For KM in Clinical Dentistry _2.
Creating Your Social Media Team Search Engine Optimization KCTCS Tweets Online Marketing.
Joomla Bird ! Joomla Bird is a Web Design, Consultancy and Software Development Company catering to the wide range of clients globally.
Exploitation Development and Implementation PRESENTER: BRADLEY GREEN.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Click to edit Master text styles Simple Steps To Register On The New Microsoft Educator Platform.
Browsing Tips Mozilla Firefox. About Firefox Available at Available at Maintained.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Learn Selenium Online – Selenium Automation Testing.
What is it all about? .NET MeetUp in Prague, CZ (2017/7/19)
Support For Internet Explorer
Topic 5 Penetration Testing 滲透測試
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Access Code Registration Portals for
Exploring the world of text to speech readers
Cert Store Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
Alice Asleson & Lindsay Braddy Skokie Public Library
HTML Level II (CyberAdvantage)
Apple Safari Customer Support. Apple Safari is well known based on free internet network web browser that was launched by apple inc. it gives a higher.
Microsoft Edge Support
Internet Basics.
Access Code Registration Portals for
Use an Internet Browser
Access Code Registration Portals for
Presentation transcript:

Mantra – Security Framework Free and Open Source Browser based Security Framework

Netscape Navigator

Internet Explorer Microsoft came up with IE

Then it was time of Opera Even though it was paid software at that time

Then Firefox came With lots of bells and whistles

Google Chrome Google’s own web browser

Mantra Hack3r’s browser.!!!

W5HW5H What, Where, When, Why, Who and How

W5HW5H

What? What is Mantra? What is the use? What Mantra is NOT?

What is Mantra ? Collection of hacking tools / add-ons

What is Mantra ? A security framework that can aid in exploit development – Security toolkit as of now

What is Mantra ? Its built on top of browser

What is Mantra ? Cross platform and flexible

What is Mantra ? Free as in “Free Beer” and “Free Speech” Open Source

What is the use? All the five phases of attacks – Reconnaissance – Scanning and enumeration – Gaining access – Escalation of privileges – Maintaining access and – Covering tracks

What Mantra is NOT? Not a one click Pwnage tool Not mature enough to suit a particular need – Don’t uninstall your Metasploit and W3af Not a replacement for your normal browser Not completely integrated

W5H What, Where, When, Why, Who and How

Why ? Why Mantra

Why Mantra? Plenty of extensions available officially and un- officially Analyzing each and every extension is tedious task Many extensions going unnoticed Security researchers should know the power of browser platform

W5H What, Where, When, Why, Who and How

When ? When you will be needing Mantra?

TIME – Life is all about timing

W5H What, Where, When, Why, Who and How

Where? Where you can find it – Website getmantra.com owasp.org/index.php/OWASP_Mantra_- _Security_Framework code.google.com/p/getmantra sourceforge.net/projects/getmantra/ – Forums getmantra.com/forums/ – Social Network twitter.com/getmantra facebook.com/getmantra

W5H What, Where, When, Why, Who and How

Who? Who all needs it? Who all are behind it?

Who all needs it? If you are into – Auditing – Penetration testing – Vulnerability Assessment – Training

Who all needs it? If you are a – Black Hat – White Hat and/or – Grey Hat

Who all are behind it? Core Team – Sheeba V Sudevan – Shahin R Krishna – Gokul C Gopinath – Abhi M Balakrishnan – Yashartha Chaturvedi Testers – HackIT Team

W5H What, Where, When, Why, Who and How

How? How I can contribute How it works, look etc.

How I can contribute? Become part of the community Code | Modify --> Extensions | Framework Design – Themes – Artworks

How it works, looks ? Let me show you a demo /

THANK YOU.!!! So long and thanks for all the attention Team Mantra Mail :