(Page 5 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: Network Utilities » Tunneling

Xgate 0.0.0
Added 2001-10-22
by Gilbert Ramirez, gram@verdict.uthscsa.edu
Xgate is a client/server pair of programs that creates a single TCP connection acting as a gateway between remote X11 clients and your local X11 server. If you need to use X11, but you can only make a one-way connection through a firewall, than Xgate is for you.

Photuris
Added 2001-10-22
by Niels Provos, provos@physnet.uni-hamburg.de
In order to transmit encrypted or authenticated data between two hosts, those two hosts have to agree on session keys which are used as input for the encryption and authentication functions. The Photuris protocol exchanges keys in such a way that no eavesdropper will have knowledge of the session keys. It also allows for frequent changes of the session keys, forward secrecy and party privacy protection.

SRS (Secure Remote Streaming)
Added 2001-10-22
by Matt Conover and Mark Zielinski
SRS is a program that streams a copy of a client's logs as specified by the syslog.conf file to a trusted server on a remote site. It provides strong authentication and secure communications between the client and the server through an SSL tunnel. It is intended as a replacement for syslogd. This and syslogd may NOT be running at the same time. Features include: - Secure logging. All communications are automatically and transparently encrypted. SSL (Secure Socket Layer) v3.0 is used for the authentication and encryption. A conventional cipher (3DES, RC4, etc.) for encrypting the session. Encryption is started before SRS authentication, and no data is streamed or transmitted in the clear - No special configuration of syslogd is needed - Never trusts the network. Minimal trust on the remote side of the connection. Minimal trust on domain name servers. Pure SSL authentication never trusts anything but the private key. - The client SSL authenticates the server machine in the beginning of every connection to prevent trojan horses (by routing or DNS spoofing) and man-in-the-middle attacks, and the server SSL authenticates the client machine before accepting any commands or requests from the client. On top of this, SRS will send its own challenge cookie - Client and server keys are generated by RepSec, Inc. Each client and server is provided a unique key

httptunnel
Added 2001-10-22
by Lars Brinkhoff, lars@nocrew.org
httptunnel creates a bidirectional data channel through an HTTP proxy, from your isolated computer behind a restrictive firewall, to a system on the Internet you have access to.

J/SSL
Added 2001-10-22
by Baltimore, info@baltimore.com
J/SSL is a full strength secure communications toolkit written in 100% pure Java and built using Baltimore Technologies award-winning J/CRYPTO cryptographic toolkit. J/SSL is a full implementation of SSL 3.0 and TLS 1.0. J/SSL provides unlimited encryption key length with no restriction on the strength of security.

Fortify for Netscape
Added 2001-10-22
by Farrell McKay, fbm@jolt.mpx.com.au
This is Fortify for Netscape, a program that provides world-wide, unconditional, full strength 128-bit cryptography to users of Netscape Navigator (v3 and v4) and Communicator (v4).

ECLiPt SSH Shell
Added 2001-10-22
by Martin Preishuber, Martin.Preishuber@stuco.uni-klu.ac.at
ECLiPt SSH Shell is a little graphical tool to startup SSH with certain usernames & hosts.

MailTunnel
Added 2001-10-22
by Magnus Lundström, logic@nocrew.org
MailTunnel creates a bidirectional virtual data path tunnelled in E-Mail messages. This can be useful for users behind restrictive firewalls that only allow Mail-Access (usually through a central mailhub). In a situation like the above, it's possible to use mailtunnel to tunnel anything from simple telnet sessions to SSH-PPP VPNs (practically anything that can be tunneled over TCP/IP) to a non-blocked system on the internet

icmptunnel
Added 2001-10-22
by Magnus Lundström, logic@nocrew.org
icmptunnel encapsulates data in ICMP frames. The usual mode of operation is tcp/ip forwarding, one icmptunnel will be set up on a blocked machine (behind a firewall) listening on TCP/IP port X. The other icmptunnel will be set up on a nonblocked machine (somewhere on the internet) connected to a local service (such as port 23, telnet). Data received on the blocked machine's tcp/ip socket will be encapsulated in an ICMP packet of users choice (ICMP_ECHO, ICMP_ECHOREPLY, ICMP_TIMESTAMP, etc..) and sent to the nonblocked machine. This machine will identify the packet as encapsulated data, decapsulate the data and forward it on to its tcp/ip socket connected to the telnet daemon. The telnet daemon responds with some data, icmptunnel on the nonblocked machine encapses the packet and sends it back to the blocked machine (ICMP type still user definable).

SSH for BeOS
Added 2001-10-22
by Andreas F. Bobak, bobak@abstrakt.ch
Source code of the Secure Shell client for BeOS.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus