(Page 6 of 9)   < Prev  1 2 3 4 5 6 7 8 9  Next >

Category: Authentication » User Authentication

Horatio: Authenticated Network Access
Added 2002-04-15
by Tommy McGuire
The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. When a legitimate user connects his or her host, it is assigned an address by a DHCP server (such as dhcpd), but is unable to contact anything outside the untrusted network. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password. Once the username and password have been validated, the firewall rules are modified to allow the host access to the rest of the network.

TinyLogin
Added 2002-04-10
by Erik Andersen, andersen@lineo.com
TinyLogin is a suite of tiny UNIX utilities for handling logins, user authentication, changing passwords, and otherwise maintaining users and groups on an embedded system. It also provides shadow password support to enhance system security. TinyLogin is, as the name implies, very small, and makes an excellent addition to an embedded system. Several buffer overflow security fixes and other bugfixes.

CryptNET_Keyserver
Added 2002-03-29
by VAB
CKS is an openPGP (RFC2440) compliant public key server. It is currently under development. It is written in C, and runs on Linux. It uses PostgreSQL for key storage, and supports the hkp protocol (it can interface with GnuPG and NAI PGP). The keyserver is mostly functional, and there is a link to a running copy on the homepage.

authd
Added 2002-03-12
by Brent N. Chun
authd is a software package for obtaining and verifying user credentials which contain cryptographic signatures based on RSA public key cryptography. It includes (i) a server (authd) for authenticating local users through UNIX domain sockets and processing credentials and (ii) a client library (libauth.a) for requesting new credentials and verifying credentials signed by the server.

ScoopLm
Added 2002-01-29
by urity@www.securityfriday.com
ScoopLm captures LM/NTLM authentication information (LanManager and Windows NT challenge/response) on the network.

Perl SecurePages
Added 2002-01-18
by Jonathan Furrer
Perl SecurePages is a session-based authentication script for Perl CGI. It was written to authenticate users on a session basis as a means of securing CGI applications written in Perl.

German Medical Card Reader
Added 2001-12-28
by Matthias Kranz
German Medical Card Reader reads the contents of smartcards with any card terminal that supports the CTAPI (for example, any Tokowito chip drives). The latest version also demonstrates how to programm ctapi compliant chipdrives according to ISO 7816.

mod_auth_pgsql
Added 2001-12-13
by Giuseppe Tanzilli
mod_auth_pgsql is a module that allows user authentication (and can log authethication requests) against information stored in a PostgreSQL database.

SMBProxy
Added 2001-11-29
by Patrik Karlsson
SMBProxy is a "Passing The Hash" tool that works as a proxy. It makes it possible to authenticate to a Windows NT4/2000 server by only knowing the md4 hash. It also makes it possible to mount shares, access the registry and anything else you could do with that particular users privileges.

xprobe
Added 2001-10-31
by Fyodor Yarochkin , Ofir Arkin
X is a logic developed from the various Active Operating System Fingerprinting methods discovered during the "ICMP Usage In Scanning" research project. Xprobe is a tool automating the X logic.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus