(Page 9 of 14)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Platform: AIX

Imapd Vulnerability Scanner
Added 2001-10-22
by TNT
This Imapd scanner searches for and exploits hosts which are vulnerable to the imapd buffer overflow vulnerability. In particular the imapd vulnerability which was posted to the Bugtraq mailing list on July 17, 1998 by Anonymous (nobody@REPLAY.COM). A vulnerability exists in certain imapd implementations that allow an attacker to execute arbitrary code remotely. In certain instances, the code to be executed will be run with root privilege. Imap supports a command 'AUTHENTICATE' which specifies the type of authentication mechanism to be used to open a mailbox. The value passed to the authenticate command is copied into a buffer of size 1024. The maximum size of this value, however, it 8192 characters. A failure to bound the read value to 1024 results in a buffer overflow. This particular tool is built to exploit Linux X86 platforms.

Added 2001-10-22
by TCFS Group - University of Salerno
TCFS is a Transparent Cryptographic File System that is a suitable solution to the problem of privacy for distributed file system. By a deeper integration between the encryption service and the file system, it results in a complete trasparency of use to the user applications. Files are stored in encrypted form and are decrypted before they are read. The encryption/decryption process takes place on the client machine and thus the encryption/decryption key never travels on the network.

Added 2001-10-22
by Bronc Buster
cgiscan.c is another simple program which facilitates the scanning of hosts on a network for known cgi vulnerabilities. It let's the user know whether or not a given cgi was found on the host.

Added 2001-10-22
by David Lyer
Checker will scan a set of IP addresses for a configurable set of ports, and generate a report detailing what is and is not running properly. The output is highly configurable, and allows for the mailing of the results to a specifiable address.

Added 2001-10-22
by Paul McGinnis
findomains.c is a simple program to find the names associated with a class C worth of IP's.

Added 2001-10-22
by ben-z
rvscan is a remote vulnerability scanner. It checks for a number of recent remote vulnerabilities in a variety of Unixes. Unlike most commercial scanners, it uses real exploits to check for the vulnerabilities.

Added 2001-10-22
by Corey Satten
Subinfo is a shell script which utilizes nslookup to dump all information about a domain, and its subdomains.

Added 2001-10-22
by Marvin J. Christensen
Courtney is a "ids" system, which monitors for SATAN probes and attacks. It receives its input from tcpdump, counting the number of new services a machine originates within a time window. If the threshold is exceeded by a host, it is flagged as a potential SATAN host.

Added 2001-10-22
by Christoph Schuba/Gene Spafford
Scan-detector is a simple detector for automated scans of TCP/ UDP ports on a host. It works by opening a socket on specified ports, and watches for a connection. When a connection is established, the host name, source port, destination host, destination port, and a number of other pieces of information are logged.

Flog ftpd log analyzer
Added 2001-10-22
by Ani Joshi
Flog is a simple ftpd log file analysis tool. It generates basic statistics about traffic and server utilization, which it outputs to a file.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus