< Prev 1 2 3 4 5 6 7 8 9 Next >
Category: Authentication » User Authentication
Horatio: Authenticated Network Access
The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. When a legitimate user connects his or her host, it is assigned an address by a DHCP server (such as dhcpd), but is unable to contact anything outside the untrusted network. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password. Once the username and password have been validated, the firewall rules are modified to allow the host access to the rest of the network.
TinyLogin is a suite of tiny UNIX utilities for handling logins, user authentication, changing passwords, and otherwise maintaining users and groups on an embedded system. It also provides shadow password support to enhance system security. TinyLogin is, as the name implies, very small, and makes an excellent addition to an embedded system. Several buffer overflow security fixes and other bugfixes.
CKS is an openPGP (RFC2440) compliant public key server. It is currently under development. It is written in C, and runs on Linux. It uses PostgreSQL for key storage, and supports the hkp protocol (it can interface with GnuPG and NAI PGP). The keyserver is mostly functional, and there is a link to a running copy on the homepage.
authd is a software package for obtaining and verifying user credentials which contain cryptographic signatures based on RSA public key cryptography. It includes (i) a server (authd) for authenticating local users through UNIX domain sockets and processing credentials and (ii) a client library (libauth.a) for requesting new credentials and verifying credentials signed by the server.
ScoopLm captures LM/NTLM authentication information (LanManager and Windows NT challenge/response) on the network.
Perl SecurePages is a session-based authentication script for Perl CGI. It was written to authenticate users on a session basis as a means of securing CGI applications written in Perl.
German Medical Card Reader
German Medical Card Reader reads the contents of smartcards with any card terminal that supports the CTAPI (for example, any Tokowito chip drives). The latest version also demonstrates how to programm ctapi compliant chipdrives according to ISO 7816.
mod_auth_pgsql is a module that allows user authentication (and can log authethication requests) against information stored in a PostgreSQL database.
SMBProxy is a "Passing The Hash" tool that works as a proxy. It makes it possible to authenticate to a Windows NT4/2000 server by only knowing the md4 hash. It also makes it possible to mount shares, access the registry and anything else you could do with that particular users privileges.
X is a logic developed from the various Active Operating System Fingerprinting methods discovered during the "ICMP Usage In Scanning" research project. Xprobe is a tool automating the X logic.
Browse by category