(Page 15 of 17)   < Prev  7 8 9 10 11 12 13 14 15 16 17  Next >

Category: Auditing » Host

Rhino9 Linux Security Script
Added 2001-10-22
by Module
The Rhino9 Linux Security Script is a script which can be used to audit the security of a Linux host. It has a series of tests for both the most current version of things like the kernel, as well as checking for known or potential vulnerabilities. A good first step in securing any Linux host.

Merlin
Added 2001-10-22
by
Merlin is a tool which was written to correlate and manage the output from other security tools. It is written in perl, and is easily configurable to add tools, and modify its reporting formats.

lsekure
Added 2001-10-22
by
Lsekure is a localhost security scanner for Linux. It covers a large portion of the local exploits found under Linux in the last year or so.

Antigen
Added 2001-10-22
by Fresh Software
Antigen is a program to automatically detect, clean and destroy the BOserver (Back Orifice Server) program for your Win95 machine. Antigen will only clean and detect Back Orifice and BO2k on Win95 and Win98 machines.

autoconf-sectest
Added 2001-10-22
by Duncan Simpson
GNU autoconf macros to test for various common secure holes at configure time.These autoconf macros test for common security holes and bad simulations of good functions (e.g. snprintf "implementations" which ignore n, symlink to rhosts potential and so forth). They were extracted from the checkps special macros and previously posted to bugtraq.

chkacct
Added 2001-10-22
by Shabbir Safdar
chkacct was designed to complement tools like COPS and Tiger. Instead of checking for configuration problems in the entire system, it is designed to check the settings and security of the current user's account. It then prints explanatory messages to the user about how to fix the problems. It may be preferable to have a security administrator ask problem users to run chkacct rather than directly alter files in their home directories.

chklastlog
Added 2001-10-22
by DNF-CERT
Chklastlog read all the entries from the file /var/adm/wtmp and checks for every user found on this file whether there is an entry in the file /var/adm/lastlog, too. The program will complain about userids with logins but no lastlogin information.

chkwtmp
Added 2001-10-22
by DFN-CERT
Chkwtmp examins the file /var/adm/wtmp for entries with no information (containing only null-bytes). If such entries are found the program prints the time window for the original entry. This is done by displaying the timestamps of the wtmp-entry before and after the deleted entry.

Titan
Added 2001-10-22
by Brad M. Powell, Dan Farmer, and Matthew Archibald
Titan is a collection of programs, each of which either fixes or tightens one or more potential security problems with a particular aspect in the setup or configuration of a Unix system. Conceived and created by Brad Powell, it was written in Bourne shell, and its simple modular design makes it trivial for anyone who can write a shell script or program to add to it, as well completely understand the internal workings of the system.

COPS
Added 2001-10-22
by Dan Farmer
COPS (Computer Oracle and Password System.) is a collection of security tools that are designed specifically to aid the typical UNIX systems administrator, programmer, operator, or consultant in the oft neglected area of computer security. The package can be broken down into three key parts. The first is the actual set of programs that attempt to automate security checks that are often performed manually (or perhaps with self written short shell scripts or programs) by a systems administrator. The second part is the documentation, which details how to set up, operate, and to interpret any results given by the programs. Finally, COPS is an evolving beast. It includes a list of possible extensions that might appear in future releases, as well as pointers to other works in UNIX security that could not be included at this time, due to space or other restrictions.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus