(Page 3 of 4)   < Prev  1 2 3 4  Next >

Category: Auditing » Backdoors

CompaqInsightManager Check & DoS
Added 2001-10-22
by Gert Fokkema
Checks for the compaqInsightManager webserver which runs on port 2301. -Shows info of the host running the CIM. -Tries to get the 'SAM._' backup-file. -Got a 'DenialOfService' option. Source available in PERL-script. Ported to Win32executable by perl2exe.

rkscan
Added 2001-10-22
by Hervé Schauer Consultants, secretariat@hsc.fr
rkscan is a small kernel-based module rootkit scanner to help sysadmins detect infected computers.

EkoBackdoor
Added 2001-10-22
by ca0s
This program installs multiples backdoors in Linux platforms, in an easy way, enjoy it! :)

The Cleaner
Added 2001-10-22
by MooSoft Development, cleanerhelp@moosoft.com
The Cleaner is a trojan scan engine for Windows 95/98/NT/2000 and removes them from your system. The Cleaner uses an original process to uniquely identify files, therefore it can detect trojans which have changed their filename or file size or have attached themselves to other files.

Solaris Integrated Trojan Facility
Added 2001-10-22
by Plasmoid/THC, plasmoid@pimmel.com
This a publicly released Solaris Loadable Kernel Module backdoor from The Hacker's Choice. Features include: - File hiding - File content and directory hiding - Switch to toggle file content and directory hiding - Process hiding (structured proc) - Promiscous flag hiding - Converting magic uid to root uid - Execution redirecting

Windows NT Rootkit 0.31a
Added 2001-10-22
by Rootkit Developers
Rootkits are based on the violation of system integrity. Research like NTRoot is vital to understanding the scope of integrity-violations. NTRoot is an open-source project, but for every line of code here, you can bet that hostile governments, militaries, and corporations have their own rootkits. Hopefully this project will help increase the awareness and evolution of data-integrity science.

Knark 0.59
Added 2001-10-22
by Creed, creed@sekure.net
Knark is a kernel-based rootkit for Linux 2.2. The heart of the package, knark.c, is a Linux lkm (loadable kernel-module).

Rkdet
Added 2001-10-22
by Andrew Daviel, andrew@vancouver-webpages.com
This program is a daemon intended to catch someone installing a rootkit or running a packet sniffer. It is designed to run continually with a small footprint under an innocuous name. When triggered, it sends email, appends to a logfile, and disables networking or halts the system. it is designed to install with the minimum of disruption to a normal multiuser system, and should not require rebuilding with each kernel change or system upgrade.

BFBTester
Added 2001-10-22
by Mike Heffner
BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tempfile creation activity to alert the user of any programs using unsafe tempfile names. While BFBTester cannot test all overflows in software, it is useful for detecting initial mistakes that can red flag dangerous software.

AckCmd
Added 2001-10-22
by Arne Vidstrom
AckCmd is a special kind of remote Command Prompt for Windows 2000. It communicates using only TCP ACK segments. This way the client component is able to directly contact the server component through a firewall in some cases.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus