(Page 9 of 62)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Category: Network Utilities

Rogue Network Tools
Added 2005-12-06
by H D Moore
The Rogue Network Tools allow you to perform active discovery of unauthorized network links.

Trojan Scan
Added 2005-11-30
by
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.

SwitchSniffer
Added 2005-11-30
by Gordon Ahn
1. Overview SwitchSniffer is a program that can scan your switched LAN for up hosts and can reroute and collect all packets without the target users' recognition. It can also detect the ‘arpspoofer’ program running on the network and block user definable sessions like firewall. If you use this program in tandem with any sniffer program, you can capture and see the users’ IDs and passwords on a switched network. 1.1 features: -. It can pull and collect all the packets on the LAN. -. It can scan and show the active hosts on the LAN within a very short time. -. While spoofing ARP tables, it can act as another gateway (or ip-forwarder) without other users' recognition on the LAN. -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in a little time (about 30 seconds). But, this program can keep spoofing continuously with a periodic time. -. Although one or more network interface cards are installed on a computer, this program can scan and spoof by selecting one of NICs. -. It can get traffic information about the amount of data transferred to and from the internet including I session information. -. It can detect which computer is running an arpspoofer program on the local network. -. It can scan all hosts automatically on the network. -. It has a feature which filters or blocks sessions, local hosts and remote hosts. -. No more installation of winpcap driver. 1.2 Benefits: -. It can find out the hidden hosts on local area network. -. It can check out if abnormal hosts are connected on the wireless network. -. It protect your network from abnormal users. -. It can check out if there are abnormal packets on the local network. -. It can view users/passwords, chat sessions and web sessions etc., on the switch network by other application. 2. System Requirement 2.1 Local : Windows nt4/2000/xp/2003, 25MB free main memory, Network adapter which supports promiscuous mode. Remote : All computers including network devices must support Ethernet 3. Reference http://www.nextsecurity.net/

e-Surveiller
Added 2005-11-23
by SurveilleTech, LLC.
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time. It stealthily records all keystrokes, Web site visits, all AOL, AIM, ICQ, MSN and Yahoo chat conversations, all windows, applications, file changes etc. User-activity logs are periodically transferred, uploaded or emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer.

Collapse Web Application Scanner
Added 2005-11-23
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes several user-requested enhancements as well as some bugfixes.

SwitchSniffer
Added 2005-11-08
by Gordon Ahn
1. Overview SwitchSniffer is a program that can scan computers alive and can pull, collect all packets and can route them without other users' recognition on the LAN. It can also detect arpspoofer program running on the network and block sessions like firewall. If you run this program and any sniffer program, you can even get and see all user ids/passwords on the switch network. 1.1 Features -. It can pull and collect all the packets on the LAN. -. It can scan and show the active hosts on the LAN within a very short time. -. While spoofing ARP tables, it can act as another gateway (or ip-forwarder) without other users' recognition on the LAN. -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in a little time (about 30 seconds). But, this program can keep spoofing continuously with a periodic time. -. Although one or more network interface cards are installed on a computer, this program can scan and spoof by selecting one of NICs. -. It can get traffic information about the amount of data transferred to and from the internet including I session information. -. It can detect which computer is running an arpspoofer program on the local network. -. It can scan all hosts automatically on the network. -. It has a feature which filters or blocks sessions, local hosts and remote hosts. -. No more installation of winpcap driver. 1.2 Benefits: -. It can find out the hidden hosts on local area network. -. It can check out if abnormal hosts are connected on the wireless network. -. It protect your network from abnormal users. -. It can check out if there are abnormal packets on the local network. -. It can view users/passwords, chat sessions and web sessions etc., on the switch network by other application. 2. System Requirement Local : Windows nt4/2000/xp/2003, 25MB free main memory, Standard network adapter, LAN Connection (adapters supporting promiscuous mode) Remote : All computers including network devices

Coarse PortKnocking
Added 2005-11-03
by Andre Luiz Rodrigues Ferreira
This is a simple implementation of Port Knocking techniques. This sniffs network packets with determined keys and executes commands like firewall to open and close ports. In the client mode injects packets with key to server.

LiLith
Added 2005-11-03
by Michael Hendrickx, CISSP
LiLith is a tool written in Perl to audit web applications. This tool analyses webpages and looks for html <form> tags , which often refer to dynamic pages that might be subject to sql injection or other flaws.

pmacct
Added 2005-10-22
by Paolo Lucente
pmacct is a small set of passive network monitoring tools to measure, account and aggregate IPv4 and IPv6 traffic; aggregation revolves around the key concept of primitives (VLAN id, source and destination MAC addresses, hosts, networks, ports, AS numbers, IP protocol and ToS/DSCP field are supported) which may be arbitrarily combined to build custom aggregation methods; support for historical data breakdown, triggers and packet tagging, filtering, sampling. Aggregates can be stored into memory tables, SQL databases (MySQL or PostgreSQL) or simply pushed to stdout. Data is collected from the network either using libpcap (and optionally promiscuous mode) or reading Netflow v1/v5/v7/v8/v9 and sFlow v2/v4/v5 datagrams.

Yersinia
Added 2005-10-20
by Alfredo Andres and David Barroso
Yersinia is a network tool designed to take advantage of some weakeness in different layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus