< Prev 6 7 8 9 10 11 12 13 14 15 16 Next >
ttmap passively analyzes values of TCP Timestamps in captured IP packets. After collecting enough data, it computes characteristic remote machine parameters. These values let it guess remote operating systems and identify unique machines behind a single IP address. For example, it can analyze remote IP load-balanced clusters.
Freeware scanner for local networks. It displays active computers with user login names (NetBIOS names), MAC and IP addresses, resolves HTTP (WEB) servers on remote computers (80, 8080 ports are default). Administrators and advanced users are able to specify IP range to scan and timeout to resolve a remote computer.
Version Capsa5.5 Expert network diagnosis module Filter table to share packet filter across projects Graphic packet filter interface Auto save captured packets to one or more packet files Find items in the explorer windows and almost all list views Sub views in the endpoints view and protocols view displaying related packets Identifiable protocol: IGAP, RGMP and PPPoE Protocol decoder: NetBIOS, DHCP, BOOTP, SMB, CIFS, SMTP, POP3, FTP and PPPoE Project setting options: save setting as default, custom port, statistics settings Global options: keep recent file, disable smooth scrolling Import wizard with range options Export process window Hot keys in the packets view Warning notice for project setting Import/export feature in the name table Layout options for protocol filter
Oedipus is an open source web application security analysis and testing suite written in Ruby by Penetration Testers for Penetration Testers. It is capable of parsing different types of log files off-line and identifying security vulnerabilities. Using the analyzed information, Oedipus can dynamically test web sites for application and web server vulnerabilities. Some plug-ins include: SQL Injection, XSS, OS Command Injection, etc.
Tool written in Python that is designed to enumerate virtual hosts for a given IP address with very less false positive.
FireMon, is an Enterprise Security Management application that provides visibility to and control of network changes, configurations, and performance. Designed as a security tool, FireMon monitors configurations, evaluates configuration effectiveness, and alerts administrators to changes in configurations. FireMon controls devices by implementing intelligent device information processing and combining it with input from technical experts and customer requirements. FireMon meets key needs of security professionals, particularly security managers, auditors, security administrators, and network professionals with security concerns.
A GUI for nmap, written in Cocoa
Collapse Web Application Scanner
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes new references for more than 3000 web vulnerabilities
Network Equipment Performance Monitor
NEPM is a very general, highly configurable, two part software system that monitors any type of logged data from IP networked equipment and reports it via E-mail and web pages. Current conditions and history from systems based on Windows NT/2000 and UNIX can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. Many networks behind separate firewalls can be reported on at one central site, and hard-to-reach isolated nets can be accessed. NEPM itself is system independent and can be hosted on either a UNIX or WinNT system or a combination of these with equal ease. NEPM monitors and reports uptime, critical events such as intrusion attempts, access rates, bytes-transferred rates, and error rates of network nodes. Unique precursor event links drill down instantly to the causes of downtime, intrusion events, etc. Performance graphs highlight element throughput and error rate. Hardware and software sub-systems within nodes are tracked and reported separately but in a common format that makes possible direct comparison. True hardware uptime is reported so that hardware and software performance can be separated from that of the communications links and from each other. Summary reports and alerts aggregate a view of an entire network's status onto a single page. Reports are provided via web pages posted to a web server for instant access to results. E-mailed text alerts provide prompt notification of dangerous conditions. NEPM is managed via a browser interface, providing full local or remote control from anywhere on the network. Use NEPM to increase your network uptime, increase network security, monitor QOS and SLA's, and evaluate new equipment. Equipment monitored can be Windows or Linux/UNIX/FreeBSD servers, or any processor-based system that logs events to non-volatile storage and has a telnet/rlogin/ssh/IP stream-mode interface
MSN Protocol Analyzer
1. Overview MSNProtocol Analyzer(MSNPAnalyzer) is a network utility that can monitor (or capture, monitor) the sessions of MSN Protocol. If you use this program in conbination with SwitchSniffer program, you can capture and see all the MSNP sessions including conversations and MSN commands. >>>Benefits and Features: -. MSNPAnalyzer can monitor 2 NICs or more at once. -. MSNPAnalyzer can show MSN commands and the procedures of connection. -. MSNPAnalyzer enables you to see all the conversions on the network. -. If MSNPAnalyzer is used in conbination with SwitchSniffer program, You can capture all see all the MSN protocols and conversations. -. It is very easy to make MSNPAnalyzer to work. Just run MSNPAnalyzer on any computer on your network, and start to monitor. -. MSNPAnalyzer parses, decodes, analyzing MSN protocol in real-time. -. MSNPAnalyzer enables you to viewing the contents, commands and sessions of MSN protocol on-the-fly. >>> Who use it? [Developers] 　 want to see the MSN protocol including MSN commands to develope the products related to MSN. [Parents] 　 Want to know what their children are most concerned? [Company Managers] 　 Supervise your employees' chating at work, and conversation for reference later. 2. Getting Started 1) Install this program (MSN Protocol Analyzer). 2) Select Start->Programs->MSN Protocol Analyzer->MSN Protocol Analyzer 3) Just click "Start" button. 4) Looking at the main screen of MSNPAnalyzer.
Browse by category