(Page 10 of 17)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >

Category: Auditing » Host

NetMonitor
Added 2001-10-22
by Neill Jordan, neill@leechsoftware.com
NetMonitor is small program which monitors TCP/IP connections to your machine. Meant for systems administrators who wish to keep track of access to a machine, it can also be useful in network programming or troubleshooting. Basically a graphical version of netstat.exe' which ships with win95/98/nt, it has the added advantages of constantly refreshing it's display as well as logging capabilities.

open_constrained()
Added 2001-10-22
by Autonomasia, ant@notatla.demon.co.uk
open_constrained() Code for opening a file and checking that it is only writable by users you intend. It checks ancestor directories and is careful about race conditions and transient errors.

XploiterStat Lite
Added 2001-10-22
by Simon Steed
XploiterStat Lite is a freeware network management tool in a similar vein to the dos program 'Netstat.exe' - i.e. shows all the connections to your machine, listening ports (identifying trojans) etc. allowing you the user to see TCP/UDP & ICMP connections are present on your machine. This is the latest release of the program formerly known as Totostat Enhanced. It can be used by networking professionals to determine what connections are on the machine at any time along with all the ports that may be listening (i.e. services, trojan horses etc.).

Null.pl
Added 2001-10-22
by H.Carvey
This script attempts to make a null session connection to an NT system, and enumerates information from it, such as transports, domain account policy, groups and users, etc. The script uses the Win32::Lanman module, and provides an excellent demonstration of many of the methods available in the module.

rvscan (remote vulnerability scanner)
Added 2001-10-22
by ben-z
scans a unix system for just about every remote vulnerability currently being used by hackers.

DumpSec
Added 2001-10-22
by SomarSoft
SomarSoft has granted SystemTools.com distribution rights for SomarSoft's DumpSec (formerly known as DumpAcl), DumpReg, and DumpEvt programs. DumpSec is a security auditing program for Microsoft® Windows NT?. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable listbox format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information. DumpSec is a must-have product for Windows NT systems administrators and computer security auditors.

DumpEvt
Added 2001-10-22
by SomarSoft
DumpEVT is a Windows NT program to dump the event log, in a format suitable for importing into a database. Used as basis for eventlog managment system, for long-term tracking of security violations, etc. There is also a DLL version of DumpEvt, which allows you to read the formatted event log from Visual Basic.

NT Group Monitor
Added 2001-10-22
by David Leblanc
Utility for monitoring malicious group creation by end users.

Wfile
Added 2001-10-22
by Hale
Wfile is a utility that searches through a directory structure for writeable files and directories. You can specify a local drive or UNC as the target location. Requires that the winperl files be on the path.

NewSID
Added 2001-10-22
by Mark Russinovich and Bryce Cogswell
NewSID is a program we developed that changes a computer's SID. It is free, comes with full source, and is a Win32 program, meaning that it can easily be run on systems that have been previously cloned. Please read this entire article before you use this program. This articles is available in the zip file of this download.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus