(Page 16 of 17)   < Prev  7 8 9 10 11 12 13 14 15 16 17  Next >

Category: Auditing » Host

L0pht Watch
Added 2001-10-22
by Mudge
One of the most overlooked areas of exploit attention seems to be the use of public holding or scratch areas. This tool allows : The white-hat: to monitor various directories and optionally log upon seeing suspicious activity. The grey-hat: to run and collect the information to find system state and information about user trends or new suspicious programs The black hat: to ease copying of sensitive, potentially transient, data and to aid in locating exploitable programs and creating said exploits

Crash Me
Added 2001-10-22
by George Carrette
The purpose of the crashme program is to cause instruction faults that would otherwise be only rarely seen in the normal operation of a system . Normal includes conditions of user programs with bugs in them and also includes executable code corruption due to memory, disk, and network problems.

COPS - Perl
Added 2001-10-22
by Steve Romig
This is a perl version of Dan's version of Bob Baldwin's Kuang program, which was originally written as shell scripts and C programs. Features including Caches passwd/group file entries in an associative array for faster lookups. This is particularly helpful on insecure systems using YP where password and group lookups are slow and frequent. User can specify target (uid or gid) on command line. can use -l option to generate PAT for a goal. User can use -f to preload file owner, group and mode info, which is helpful in terms of speed and avoiding file system 'shadows'.

Secure Sun
Added 2001-10-22
by David Safford
This program checks for 14 common SunOS configuration security loopholes. It has been tested only on SunOS4.0.3 on Sun4, Sun3, and Sun386i machines. Each test reports its findings, and offers to fix any discovered problems. The program must be run as root to fix any of the problems but, it can be run from any account by replying \'n\' to any fix requests.

SPI (Security Profile Inspector)
Added 2001-10-22
by Computer Security Technology Center
SPI provides a suite of security inspections for most Unix systems at the touch of a button. The SPI software product is available free of charge to all DOE and DoD organizations. Sponsoring agencies may define redistribution policies within their own respective user communities.

Added 2001-10-22
by Texas A&M University
An ongoing project to further develop the Tiger UNIX security tool developed at Texas A&M. This checks the security configuration and integrity on a UNIX system at regularly scheduled intervals.

Added 2001-10-22
by Bruce Barnett
Trojan.pl is a trojan horse checking program. It examines the search path and looks at all of the executables in the search path for people who can create a trojan horse that root can execute.

Forensic Toolkit
Added 2001-10-22
by NT Objectives
The Forensic ToolKit contains several Win32 Command line tools that can help you examine the files on a NTFS disk partition for unauthorized activity. List files by their last access time, search for access times between certain time frames, scan the disk for hidden files, data streams. Dump file and security attributes. Report on audited files. Discover altered ACL's. See if a server reveals too much info via NULL sessions.

Security Auditor's Research Assistant (SARA)
Added 2001-10-22
by Advanced Research Corporation
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins. Changes: Fixed FrontPage test, Added more rpc program checking, Added test for tacacs server, Added test for Sub 7 backdoor, Added test for JetAdmin directory traversal, Added test for QPOP 3.53 vulnerability, Added test for Cisco Catalyst Vulnerability, Added test for Suse imap server, and bug fixes and performance updates. Incorporated SANS recommended additions to SANS/SARA Top 10, test for vulnerability in wu-ftpd 2.6.0, bug fixes. Improved smb.sara, added network.vbs test, fixed a problem in ftp.sara to eliminate false negatives, and updated to the latest perl.

Added 2001-10-22
by !Hispahack
Utility to scan lists of IPs in search of machines that share resources by samba/netbios, also allows cracking (using brute force) passwords of these resources.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus