(Page 2 of 5)   < Prev  1 2 3 4 5  Next >

Category: Access Control » File System

tomas - too many secrets
Added 2002-04-29
by Michael Thumann
A comandline tool to crack the enable secret passwords on Cisco routers. You need the md5 password hash from the config to run this tool. It contents dictionary and brute force attacks and a nice feature to combine brute forcing with a partial known password string. I wrote this tool while doing pen-tests on cisco routers.

NetBiosSpy
Added 2002-04-22
by Vianney RUY
NetBiosSpy is NetBios scanner freeware. But you can do more than a classic NetBios Scanner. You can see open files remotely and do what you want on it : open, edit, deconnect etc...

Remote Access Session
Added 2002-03-12
by Angel Ramos
Remote Access Session is a security tool to analyze the integrity of systems. The program tries to gain access to a system using the most advanced techniques of remote intrusion. It can either work in normal mode (which is fast) or hard mode (which is more intensive). There is a big difference between Remote Access Session and other remote security audit tools. If Remote Access Session finds a remote vulnerability that gives user account or root, it will try to exploit it and it will return a shell. This allows a network administrator to discard false positives regarding remote vulnerabilities. It also includes all of the information from service banners in its output. It performs vendor and version detection on Web servers and other common servers, and also attempts remote OS identification.

FileManager
Added 2002-01-18
by horsburgh
FileManager is a secure (SSL), multi-user, and web- based program for file, directory, and remote command management. It is written in Perl, for Linux and Unix-like operating systems. It displays full directory information; allows file viewing, deleting, renaming, uploading, downloading, etc.; assists in directory navigation; and can execute any command for which the user account has privilege. FileManager also comes with a built-in text editor for quick editing and file updates.

ClusterNFS
Added 2001-11-26
by Greg Warnes
ClusterNFS is a set of patches for the "Universal NFS Daemon" (UNFSD) to allow multiple clients to nfs mount the same root filesystem by providing "tagged" filenames. When a client requests the file "/path/filename", the ClusterNFS server checks for the existence of files of the form "/path/filename$$TAG=value$$". If such a file exists and the client has a matching value for KEY, this file is returned. If the client does not have a matching value or no such file exists, the file request proceeds as normal. Currently supported keys include HOST (hostname), IP (IP number), CLIENT (matches any nfs client) and CREATE (for "tagged" creation of files).

Linux Trustees
Added 2001-11-09
by Vyacheslav L. Zavadsky
The main goal of the Linux Trustees project is to create an advanced permission management system for Linux. The solution proposed is mainly inspired by the approach taken by Novell Netware and the Java security API. Special objects (called trustees) can be bound to every file or directory. The trustee object can be used to ensure that access to a file, directory, or directory with subdirectories is granted (or denied) to a certain user or group (or all except user or group). Trustees are like POSIX ACLs, but trustee objects can affect entire subdirectory trees, while ACLs a single file.

fs-spider
Added 2001-10-22
by lamagra, access-granted@geocities.com
fs-spider is a multi-threaded bad permissions finder (user defined).

StegFS Kernel Patch
Added 2001-10-22
by Andrew McDonald, andrew@mcdonald.org.uk
StegFS is a Steganographic File System for Linux. Not only does it encrypt data, it also hides it such that it cannot be proved to be there. Note that this is still 'under development'. It is not bug-free yet. There may be possibly serious problems. In short, if it destroys your computer or your data or causes a minor nuclear holocaust don't blame the programmers. Feel free to try it, but don't get too upset if you have problems. There are still bugs/misfeatures that want fixing. However, it should be stable enough for use. You will need to know how to patch and compile a kernel. It is strongly recommended that you read "StegFS: A Steganographic File System for Linux" before attempting to use this file system. StegFS is distributed as a kernel patch and a tarball containing a set of utilities. You need both to be able to use StegFS. This package is the kernel patch

StegFS tools
Added 2001-10-22
by Andrew McDonald, andrew@mcdonald.org.uk
StegFS is a Steganographic File System for Linux. Not only does it encrypt data, it also hides it such that it cannot be proved to be there. Note that this is still 'under development'. It is not bug-free yet. There may be possibly serious problems. In short, if it destroys your computer or your data or causes a minor nuclear holocaust don't blame the programmers. Feel free to try it, but don't get too upset if you have problems. There are still bugs/misfeatures that want fixing. However, it should be stable enough for use. You will need to know how to patch and compile a kernel. It is strongly recommended that you read "StegFS: A Steganographic File System for Linux" before attempting to use this file system. StegFS is distributed as a kernel patch and a tarball containing a set of utilities. You need both to be able to use StegFS. This package contains the utilities.

File Protector 2000
Added 2001-10-22
by Mikko Adhipurna Jodana, mikkoaj@mikkoaj.hypermart.net
File Protector 2000 is a utility to protect your files and or folders. Protecting can be done in various ways. You can hide them, make them undeleteable, unrenameable, unreadable, unmodifiable, unexecutable, just make them invisible, or just keep their attributes as is (cannot be changed). Both files and folders including the subdirectories inside them can be protected. WILD CARDS are allowed. With the wild cards feature, you can protect, for example all EXE or DLL files to be unmodifiable. And you may also set all files to have their attributes unmodifiable, so keeping read only files remain read only, hidden files remain hidden. Or for certain files or folders you want them to be unseen, as if they didn't exist, you can do it too! File Protector 2000 works silently in background.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus