(Page 1 of 2)   1 2  Next >

Category: Access Control » ACLs

srgn-ciscoconf
Added 2006-06-06
by SuRGeoN
Download cisco configuration file. Bypassing the SNMP access-list (ip spoof).

Windows Permission Identifier
Added 2006-01-18
by Nathan House
This tool enables administrators and penetration testers to review and audit the permissions of users on a windows machine. Windows Permission Identifier can check; File ACLs Folder ACLs Registry ACLs Services Permissions Shares Installation rights Internet Access and so on. The GUI enables the administrator to create policies that can be saved in XML format. The windows machines permissions are then checked against this policy. This enables administrators to run checks against existing organisational windows security baseline documents. Policies can be saved in XML format and all results can be exported for further use. WARNING: The policy that is included is a sample of the functionality of the tool. It is not a security policy that should be followed. Report Bugs & send your own policy files : nhouse[at]stationx.net It would be very useful to the community if you send me any policies you create. For example, Web server, desktop, domain controller or what ever you create. I will upload your policy files to the site and credit you.

EagleEyeOS Professional
Added 2006-01-13
by EagleEyeOS Llc.
This file and data security software provides solutions for the problems that occupy every IT security specialists on the world caused by development of the data transmission and increasing size of the built-in memories in data storage devices. The software blocks data larcenies with determining the access rights, prohibiting the unauthorized access and identifies the entitled person, who abuses the sensitive and/or classified information.

WiFiManager
Added 2005-08-17
by AdventNet
Integrated wlan security and Management tool. Identifies the vulnerabilities in the wlan, the intrusion attempts and mitigates wlan attacks. Helps in configuring the Access Points and in firmware upgrade.

Profense
Added 2005-08-12
by Armorlogic ApS
Profense is an application firewall that provides true proactive protection of web servers and web applications by implementing a positive security model.

SafeSystem
Added 2005-02-09
by GemiScorp Software Solutions
SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy

Pixilate
Added 2003-10-22
by Kirby Kuehl
Pixilate is a packet generation tool based off of Libnet 1.1.0 (Older Libnet 1.0.x versions will not work). Pixilate generates packets by parsing a file that contains ACLs in either Cisco IOS format (using the -r option) or in Cisco PIX 6.2x format. Currently TCP, UDP, IGMP, and various types of ICMP packets are built with the appropriate source and destination for each rule. "any" as a source generates a random source address and "any" as a destination will send the packet to the user supplied destination (-d option). For more information, see the pixilate manpage.

PipeACL tools
Added 2003-10-22
by Bindview
The PipeACL tools package contains two separate tools for viewing and configuring Win32 named pipe ACLs (Access Control Lists). The pipeacl untility allows you to dump various settings of a named pipe, including the Owner, Group, Sacls (System access control lists), and Dacls (Discretionary access control lists). The pipeaclui untility allows you to view and apply permissions to a specified named pipe. These changes are made in the Dacls of the named pipe itself.

IP Blocker
Added 2002-11-07
by Rob Patrick
IP Blocker is an incident response tool for network admins that automatically updates access control lists (ACL) on Cisco routers and other devices. Web and CLI are both supported. Logging, email notification, and automatic expiration of blocks using policy-based TTL values are all supported.

DeviceLock Millennium Edition
Added 2002-03-27
by SmartLine, Inc.
DeviceLock Me gives network administrators control over which users can access what removable devices (floppies, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. Once DeviceLock Me is installed, administrators can control access to floppies, CD-ROMs or any other device, depending on the time of day and day of the week. DeviceLock Me enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock Me to flush a storage device's buffers. Remote control is also available.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus