(Page 13 of 17)   < Prev  7 8 9 10 11 12 13 14 15 16 17  Next >

Category: Auditing » Host

bogtk
Added 2001-10-22
by Kossico, kossico@yahoo.com
bogtk is the first version with a graphical user interface of the Back Orifice unix client. It uses the GTK toolkit and can be compiled with either version 1.0x or 1.1x.

Lsof
Added 2001-10-22
by Vic Abell, abe@purdue.edu
Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system.

Spong
Added 2001-10-22
by Ed Hill, edhill@edsgarage.com
Spong is a simple system-monitoring package. It features client-based monitoring (CPU, disk, processes, logs, etc.), monitoring of network services, grouping of hosts (routers, servers, workstations, and PCs), host-specific contact and downtime information, configuration on a client-by-client basis, results displayed via the Web, history of problems, messaging (via email or pager) when problems occur, and verbose information to help diagnosis problems. It communicates via simple TCP-based messages, and is written in Perl.

DumpBind 1.0
Added 2001-10-22
by Wastelands Technologies
A set of small utilities to poke around inside Netware bindery files.

Bogon
Added 2001-10-22
by Richard W.M. Jones, rjones@orchestream.com
Tests to see if a host is in promiscuous mode. It works as follows: send out a ICMP echo request to the host in question, but wrap the echo request in a bogus ethernet packet. If the host is acting normally, it will ignore the bogus packet. If the host is listening to the network in promiscuous mode, then it will pick up the packet and push it up to the IP layer which will respond to the ping. This is obviously not foolproof, since you could modify your kernel to disallow responses to echo requests.

exscan
Added 2001-10-22
by PolarRoot
exscan is a network/Internet port scanner, that uses the strobe-scan technique of only scanning certain ports, instead of a full blown port scan. The ports which exscan scans can be viewed in the file SERVICES which is distributed with exscan.

FireWall-1 bandwidth utilization report generator
Added 2001-10-22
by Jason R. Rhoads
Firewall-1 bandwidth utilization report generator. This tool, as the name suggests is designed to let Firewall-1 administrators on Solaris 7 boxes track bandwidth usage for their Firewall-1.

Log Check
Added 2001-10-22
by Jason Rhoads
This script checks system log files for unusual activity and emails the result to administrators for review. Any log entry that is not expressly ignored will be reported. Based on logcheck.sh by Craig Rowland .

Windows NT syslog service
Added 2001-10-22
by Jason R. Rhoads
This program runs as a service under Windows NT 4.0. It formats all System, Security, and Application events into a single line and sends them to a syslog(3) host.The syslog host can be specified by domain name (loghost.some.com) or by IP address (10.123.112.1). The types of event log messages sent to the syslog host can be configured by setting the dword value for each of the types of messages. All types with a non-zero value will be processed.

System Check
Added 2001-10-22
by Jason R. Rhoads
This tool is written to perform nightly security checks on Solaris machines. Looks for a series of predefined violations and alerts via syslog or email.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus