11 security audit essentials

3/12

2. FOCA

Our second recommendation for IT security audit tools is the reconnaissance-based framework known as FOCA. This network infrastructure mapping tool can extract extremely sensitive information from the target. FOCA analyzes metadata from various file formats, including Microsoft Word and PDF files. It can also enumerate files, folders, software used to create the file, and also the operating systems. Small wonder then that one often hears the phrase, “Fear the FOCA!”

You can download this tool here.

View All Photo Stories

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close