(Page 7 of 14)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Platform: AIX

fsh
Added 2001-12-27
by Per Cederqvist
fsh uses lsh or ssh to establish a secure tunnel to the remote system. This takes as long as a normal connection establishment, but once the tunnel is established, fsh can reuse it to start new sessions on the remote system almost instantaneously. You get the security of ssh and the speed of rsh.

squidGuard
Added 2001-12-19
by Pål Baltzersen, pal.baltzersen@ost.eltele.no
squidGuard is a combined filter, redirector and access controller plugin for Squid.

NOCOL
Added 2001-12-10
by Vikas Aggarwal
NOCOL (Network Operation Center On-Line) is a network monitoring package that runs on Unix platforms. It can monitor various network variables such as ICMP or RPC reachability, nameservers, ethernet load, port reachability, host performance, SNMP traps, modem line usage, appletalk & novell routes and services, BGP peers, etc. The software is extensible and new monitors can be added easily.

Modular Syslog
Added 2001-12-05
by Alejo
The modular syslog allows for an easy implementation of input and output modules. The modules that mantain compatibility with its precursor are included in the standard distribution along with four modules: om_peo (an implementation of PEO-1 and L-PEO, two algorithmic protocols for integrity checking), om_mysql and om_pgsql (modules that sends output to a mysql and postgresql database, respectively) and om_regex (a module that allows output redirection using regular expressions).

Tacacs+
Added 2001-11-29
by Devrim SERAL
The Tacacs+ daemon from Cisco Systems is used in conjunction with Cisco routers for authorization, authentication, and accounting services.

Cgi Scanner
Added 2001-11-05
by m3hm3t
Multi threaded cgi scanner. It has rulesets and more than 2500 cgi script checks.

Anger
Added 2001-10-24
by Aleph One
This program implements: a) A PPTP challenge/response sniffer. These c/r can be input into L0phtcrack to obtain the password, and b) An active attack on PPTP logons via the MS-CHAP vulnerability to obtain the users password hashes. Notice that this also generates the password hashes of the new password the user wanted to use. These can be input into L0phtcrack to get password, into a modified smbclient to logon onto a SMB sever, or into a modified PPP client for use with the Linux PPTP client.

LibNet
Added 2001-10-22
by route
Libnet is an API to help with the construction and handling of network packets. It provides a portable framework for low-level network packet writing and handling (use libnet in conjunction with libpcap and you can write some really cool stuff). Libnet includes packet creation at the IP layer and at the link layer as well as a host of supplementary and complementary functionality. Still in it's infancy however, the library is evolving quite a bit. It is mainly useful for quick and simple packet assembly and related applications (Traceroute and ping were easily rewritten using libnet). See the manpage and sample test code for more detailed information.

TCP Wrappers
Added 2001-10-22
by Wietse Venema
The tcp_wrapper package by Wietse Venema. Formerly called log_tcp. Allows monitoring and control over who connects to a hosts TFTP, EXEC, FTP, RSH, TELNET, RLOGIN, FINGER, and SYSTAT ports. Also includes a library so that other programs can be controlled and monitored in the same fashion.

Libpcap
Added 2001-10-22
by Van Jacobson,Craig Leres and Steven McCanne, all of the Lawrence Berkeley National Laboratory
This is a handy little library which provides a packet filtering mechanism based on the BSD packet filter (BPF). Most notably, tcpdump needs this to work, and there is also a perl module (still in beta) which can use this as well. In plain english, if you want to write your own network traffic analyzer, this is the place to start.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus