(Page 12 of 17)   < Prev  7 8 9 10 11 12 13 14 15 16 17  Next >

Category: Auditing » Host

ProtectX
Added 2001-10-22
by Plasmatek Software, general@plasmateksoftware.com
This program will protect you from intruders and malicious users whilst on the net so if anyone attempts to connect to your PC then their IP will be logged and an alarm will sound.

SmurfLog 1.0
Added 2001-10-22
by Bug Lord, buglord@sy.net
This program is designed to log smurf attacks and the broadcasts used. Essentially it is an icmp echo reply logger with the following twists: - Logging only begins after passing a certain threshold rate of packets/sec and kilobytes/sec. This prevents the logging of innocent ping replies. - Only the /24 is logged, and it is only logged once per attack.

TCP Listen 1.5
Added 2001-10-22
by Marcelo Gornstein, mgornstein@usa.net
TCP Listen is complimentary to the program 'Send Packet' by the same author. Based on tcpdump, it will report all the data of any tcp/udp/icmp/ip incoming packet in one terminal line (80 chars) or so. Can fork, and report on the tty and/or via syslog.

Titan 3.2.2
Added 2001-10-22
by Brad M. Powell, Dan Farmer, and Matthew Archibald
Titan is a collection of programs, each of which either fixes or tightens one or more potential security problems with a particular aspect in the setup or configuration of a Unix system. Conceived and created by Brad Powell, it was written in Bourne shell, and its simple modular design makes it trivial for anyone who can write a shell script or program to add to it, as well completely understand the internal workings of the system. Titan does not replace other security tools, but when used in combination with them it can help make the transformation of a new, out of the box system into a firewall or security concious system into a significantly easier task. In a nutshell, it attempts to help improve the security of the system it runs on.

Fork Bomb Defuser
Added 2001-10-22
by Rohit Singh, rohit_singh@hotmail.com
Fork Bomb Defuser (rexFBD) is a loadable kernel module for Linux which detects and disables 'fork bombs.' rexFBD allows you to configure the max_forks_per_second and max_tasks_per_user parameters, at the time of loading the module. Any possible Fork Bomb is detected using these parameters and is defused (deactivated) in real time. The uid of the user who started it, as well as the time it was started is logged in /var/log/messages for the system administrator to take action.

Find Distributed Denial of Service (find_ddos)
Added 2001-10-22
by National Infrastructure Proctection Center
In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the National Infrastructure Proctection Center (NIPC) Special Technology Applications Unit (STAU) has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The distributed denial-of-service tools that are detected by the tool are: - stacheldraht client - stacheldraht daemon - stacheldraht master - tfn-rush client - tfn client - tfn daemon - tfn2k client - tfn2k daemon - trinoo daemon - trinoo master

Find Distributed Denial of Service (find_ddos)
Added 2001-10-22
by National Infrastructure Proctection Center
In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the National Infrastructure Proctection Center (NIPC) Special Technology Applications Unit (STAU) has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The distributed denial-of-service tools that are detected by the tool are: - stacheldraht client - stacheldraht daemon - stacheldraht master - tfn-rush client - tfn client - tfn daemon - tfn2k client - tfn2k daemon - trinoo daemon - trinoo master

Sherpa
Added 2001-10-22
by Rick Crelia, rick@nbank.net
Sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time sherpa is run. Also, sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system.

Check
Added 2001-10-22
by David Allen, s2mdalle@titan.vcu.edu
Check.pl runs through all of the files and directories that it is given as arguments and determines the permissions. It then sends a list of "dangerous" files to stdout which can be redirected to a file. This program should be run as a regular user to check for writeable directories, suid, guid, and writeable files. Helps administrators sniff out files that have incorrect permissions.

Traceroute Detector 0.2
Added 2001-10-22
by Vadim Kolontsov, sb@123.org
tdetect is a daemon that detects all traceroute attempts to/from your network (both from Unix and Windows machines) and logs it using syslog().

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus