(Page 14 of 17)   < Prev  7 8 9 10 11 12 13 14 15 16 17  Next >

Category: Auditing » Host

Cassandra GOLD
Added 2001-10-22
by Jonathan James
Cassandra GOLD is a free utility that wil detect and remove over 25 Trojan horses.

Tambu UDP Scrambler
Added 2001-10-22
by Simon Steed
This program has two distinct features: - 1.To act as a UDP server that can bind (listen) to any port you choose & inform you of any packets received along with the senders IP Address & the port on their machine that the packet was sent from. 2.The second part is a UDP flooder that is designed to cripple your attackers machine, maybe even requiring them to disconnect from the net. You will notice that upon someone connecting to your machine, a wave file is played as well as a message box appearing & the taskbar icon flashing. The senders details will have been added to the flood part of the program from which you can then pay them back.

cmsdscan
Added 2001-10-22
by vetesgirl@iname.com
A very basic rpc.cmsd scanner.

TotoStat Enhanced 2.0
Added 2001-10-22
by Simon Steed
TotoStat is a program similar in operation to the DOS based utility, Netstat.exe that displays protocol statistics & network activities. It can be used by networking professionals to determine what connections are on the machine at any time along with all the ports that may be listening (i.e. services, trojan horses etc.). This new version, is a major upgrade from the previous incarnations & includes all that was previously available plus many more new & innovative features. Much more efficient & faster code Native SNMP and Multithreading Supports Windows 95, 98 &Windows NT - should work in Windows 2000 although this needs to be confirmed - anyone help here?? NEW - Fast DNS Lookup NEW - Ping Tools NEW - Port Lookup NEW - Autostat - will automatically run when the machine starts up NEW - AutoRefresh - will automatically update the connection information every X minutes NEW - Minimizes to system tray New updated interface Shows TCP and UDP connections Shows established and listening ports. TotoStat is definately the fastest and easiest way to see what exactly is going on over the Internet or your LAN.

Cdgxn-Secure
Added 2001-10-22
by sistym@attrition.org
Cdgxn-Secure is a Local Linux Security Auditing tool that scans for a number of different vulnerabilities a variety of ways. It will also help determine if you've been compomrised already.

Cdgxn-Bsd
Added 2001-10-22
by sistym@attrition.org
Cdgxn-Bsd is a Local Bsd Security Auditer. It is similar to Cdgxn-Secure, tweaked to help secure BSD based systems.

Audit Daemon for Linux
Added 2001-10-22
by Hacker Emergency Response Team
Auditd is part of the linux kernel auditing toolkit. It will capture auditing trails created by the kernel auditing facility from /proc/audit, filter them, and save them in specific log files. For the moment, auditd only supports the -t option, which enables audit trails timestamping. Other command line options will probably be implemented in the next releases to add more flexibility to the package.

Promisc
Added 2001-10-22
by Trevor F. Linton
Created for Linux based loosely upon linux ioctl controls. ioctl() is used to detect different flags set on devices used on your system.

Back Orifice 2000 Server Sniper
Added 2001-10-22
by Diamond Computer Systems
Diamond Computer Systems Pty. Ltd. (http://www.diamondcs.com.au) have released a BO2K scanner as freeware to the global public domain. This scanner uses fairly loose signature definitions, therefore increasing the chance of false alarms, but also increasing the chance of finding the BO2K server should it exist. It recognises BO2K servers (US/International/modified) and plugin DLLs, ASPack and Petite compressed versions of the US servers, and the majority of server variants made from the original source code. As there is no true single signature for BO2K servers due it's open source, traditional virus scanning just isn't the solution. Perhaps here is something that can offer possibly the strongest chance of finding BO2K servers. Requires VB6 runtimes.

LogView Version 1.30
Added 2001-10-22
by Shadow Penguin Security Team
General log wipers such as "zap" write null entries in the logfiles which they edit. With this utility you can check your logs to see if they have been wiped with a tool like 'zap'.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus