(Page 15 of 17)   < Prev  7 8 9 10 11 12 13 14 15 16 17  Next >

Category: Auditing » Host

Rhino9 Linux Security Script
Added 2001-10-22
by Module
The Rhino9 Linux Security Script is a script which can be used to audit the security of a Linux host. It has a series of tests for both the most current version of things like the kernel, as well as checking for known or potential vulnerabilities. A good first step in securing any Linux host.

Added 2001-10-22
Merlin is a tool which was written to correlate and manage the output from other security tools. It is written in perl, and is easily configurable to add tools, and modify its reporting formats.

Added 2001-10-22
Lsekure is a localhost security scanner for Linux. It covers a large portion of the local exploits found under Linux in the last year or so.

Added 2001-10-22
by Fresh Software
Antigen is a program to automatically detect, clean and destroy the BOserver (Back Orifice Server) program for your Win95 machine. Antigen will only clean and detect Back Orifice and BO2k on Win95 and Win98 machines.

Added 2001-10-22
by Duncan Simpson
GNU autoconf macros to test for various common secure holes at configure time.These autoconf macros test for common security holes and bad simulations of good functions (e.g. snprintf "implementations" which ignore n, symlink to rhosts potential and so forth). They were extracted from the checkps special macros and previously posted to bugtraq.

Added 2001-10-22
by Shabbir Safdar
chkacct was designed to complement tools like COPS and Tiger. Instead of checking for configuration problems in the entire system, it is designed to check the settings and security of the current user's account. It then prints explanatory messages to the user about how to fix the problems. It may be preferable to have a security administrator ask problem users to run chkacct rather than directly alter files in their home directories.

Added 2001-10-22
Chklastlog read all the entries from the file /var/adm/wtmp and checks for every user found on this file whether there is an entry in the file /var/adm/lastlog, too. The program will complain about userids with logins but no lastlogin information.

Added 2001-10-22
Chkwtmp examins the file /var/adm/wtmp for entries with no information (containing only null-bytes). If such entries are found the program prints the time window for the original entry. This is done by displaying the timestamps of the wtmp-entry before and after the deleted entry.

Added 2001-10-22
by Brad M. Powell, Dan Farmer, and Matthew Archibald
Titan is a collection of programs, each of which either fixes or tightens one or more potential security problems with a particular aspect in the setup or configuration of a Unix system. Conceived and created by Brad Powell, it was written in Bourne shell, and its simple modular design makes it trivial for anyone who can write a shell script or program to add to it, as well completely understand the internal workings of the system.

Added 2001-10-22
by Dan Farmer
COPS (Computer Oracle and Password System.) is a collection of security tools that are designed specifically to aid the typical UNIX systems administrator, programmer, operator, or consultant in the oft neglected area of computer security. The package can be broken down into three key parts. The first is the actual set of programs that attempt to automate security checks that are often performed manually (or perhaps with self written short shell scripts or programs) by a systems administrator. The second part is the documentation, which details how to set up, operate, and to interpret any results given by the programs. Finally, COPS is an evolving beast. It includes a list of possible extensions that might appear in future releases, as well as pointers to other works in UNIX security that could not be included at this time, due to space or other restrictions.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus