Paros 3.2.4 release

From: contact@parosproxy.org
Date: Sat Aug 13 2005 - 07:34:33 EDT


('binary' encoding is not supported, stored as-is) Paros 3.2.4 is released. This is a maintenance release with essential bug fixes and some user suggested enhancement. We recommend all users perform upgrade. In the meantime we are looking into
other user suggestions as well.

The new verison is available at http://www.parosproxy.org.

Queries, bug reports and comments on Paros can be sent to [contact at parosproxy org]. Please feel free to send any comments to us!

[Installation]

If you have installed the old version, you should uninstall it first.

The default installation used 96M VM. For large site testing, you may adjust it depending on your need
and the memory you have (eg 128M)

[introduction]

Paros is a man-in-the-middle proxy and application vulnerability scanner. It allows
users to intercept, modify and debug HTTP and HTTPS data on-the-fly between web
server and client browser. It also supports spidering, proxy-chaining, filtering
and application vulnerability scanning.

[License] - Clarified Artistic License (open source and GPL-compatible license)

[Details/new features]

3.2.4
=====

New
- Configuration, log saved into user home directory 'paros'.

Fix
- problem in CRLF injection plugin related to URL encoding introduced since 3.2.0 upgrade. Also with enhanced checks.
- problem in SQL injection plugin related to URL encoding introduced since 3.2.0 upgrade.
- save empty session problem introduced due to hsqldb update in 3.2.3.

------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:45 EDT