user

USEFUL TOOLS FOR APPLICATION SOURCE CODE REVIEW

Most of the application source vulnerability diagnoses will receive a large number of source files and perform vulnerability diagnostics. Most of them are static diagnosis using a tool for diagnosing source vulnerabilities such as Fortify and dynamic manual diagnosis of a professional consultant. In this situation, it is common to utilize some useful tools because […]

INTRODUCTION OF WiKi-DOCS

OVERVIEW WiKi-Docs is developed for Document Co-Work in the enterprise more features than Google Docs provides. – Support various Kind of Document files – On-line Multi-User Simultaneous Edit : MS-Word, Excel, Powerpoint) & Markdown file – File Sharing for Other kind of Document WHY WiKi-DOCS? What’s your Needs?(Enterprise Model) What’s your Needs?(Cloud Model) Features System Requirement

INTRODUCTION OF WiKi-MONSTER

OVERVIEW WiKi-MONSTER is developed for centralizing, analyzing and intrusion monitoring based on logs and network packets information from network devices, servers, IDS/IPSs, and firewalls with client-server architecture(sensor and server). CORE FEATURES Centralized log management and analysis The WiKi-Monster uses syslog-ng as its primary syslog collector and to send logs to Logstash where they are parsed

INTRODUCTION OF WiKi-OSINT Threat Search

OVERVIEW (WiKi OSINT WebSite) About WiKi OSINT Website.   This website allows anyone to search for blacklist IP addresses without logging in, and currently uses FireHOL’s Database, which provides over 100 million blacklist IP addresses, but plans to add databases such as MISP and Darknet. HOW TO USE Step 1. Enter the IP address you want to

INTRODUCTION OF WiKi-SBOM Scanner

OVERVIEW (WiKi SBOM Scanner WebSite) Roles of Vendor and User in S/W Supply Chain Security.   In the S/W Supply Chain, a management system that divides the roles of S/W Vendors and Users is essential for managing the security and compliance of open source software. The S/W Vendor is responsible for generating the SBOM (Software Billof

INTRODUCTION OF WiKi-WS

OVERVIEW (WiKi WS Scanner Website) This our powerful Web Application Scanner swiftly scans over 50 well-known vulnerabilities and accurately categorizes them into four severity levels: High, Medium, Low, and Information. Each detected vulnerability is analyzed according to OWASP Top10, CWE, and WASC standards, providing detailed causes and remediation steps to enhance security. This scanner is

INTRODUCTION OF WiKi-SHODAN

OVERVIEW (WiKi SHODAN WebSite) WiKi-SHODAN is a security search and monitoring system based on cloud that you can check vulnerable ports at anytime and anywhere the all of your public IP devices in the view point of external attackers. This system consists of scanning database, sensor and dashboard, and three sensors around the world periodically

INTRODUCTION OF WiKi-ARMA

OVERVIEW Defend web services hacking and information leakage with ARAM WAF. ARMA WAF is a web appliance that detects and blocks attacks from external hacking and web application vulnerabilities without degrading performance of each web server. [ARMA Processing Step] [ARMA Architecture] – Network ApplianceThe appliance provides the highest performance and resiliency for performance-critical data center environments.