Security Objectives is an elite software security development company focused on application security flaw and fix’s. 

Security is often neglected until the last minute, when the problem is intractable and the decision to enact a realistic model for success, with business context in mind, rarely chooses the hard road.


2 Responses to “About”

  1. Roy Says:

    I was wondering if there was a good starting point, suite, or methodology to circumventing vulnerabilities (0day) found in IPv6. Many of the testing suites such as Metasploit, Backtrack, etc don’t have an extensive library of tools. I’ve been using one IPv6 fuzzer but its very limited.

    Help will be appreciated.

  2. Well, our product will 😉 beta soon, Q4 this year, if you’re interested please email me directly. Our application will conduct comprehensive security assessments on targeted binaries using an intelligent process to connect code and data patterns to understand application behavior automatically. Then conducting pathological input generation based on code execution towards compleation. Being a dynamic tool we do not suffer the fate of static analyzers, essentially there is no halting problem.

    I guess until we release, I know you said you checked for, but here’s a list of resources I pulled from our internal wiki. Common types of software vulnerabilities from OWASP (Open Web Application Security Project) Penetration Testing Framework Penetration Testing Directory Project Information Systems Security Assessment Framework Open Source Security Testing Methodology Manual Web Security Threat Classification from the WASC (Web Application Security Consortium) Security Database Tools Watch BackTrack? Linux LiveCD Focused on Penetration Testing Samurai Web Testing Framework Linux LiveCD Focused on Web App Pen-Testing List of fuzzers from Michael Sutton’s Fuzzing Book Site List of fuzzers from PacketStorm? PythonTestingToolsTaxonomy? – Cheesecake – Trac

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: