(Page 6 of 9)   < Prev  1 2 3 4 5 6 7 8 9  Next >

Category: Authentication » User Authentication

Horatio: Authenticated Network Access
Added 2002-04-15
by Tommy McGuire
The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. When a legitimate user connects his or her host, it is assigned an address by a DHCP server (such as dhcpd), but is unable to contact anything outside the untrusted network. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password. Once the username and password have been validated, the firewall rules are modified to allow the host access to the rest of the network.

Added 2002-04-10
by Erik Andersen, andersen@lineo.com
TinyLogin is a suite of tiny UNIX utilities for handling logins, user authentication, changing passwords, and otherwise maintaining users and groups on an embedded system. It also provides shadow password support to enhance system security. TinyLogin is, as the name implies, very small, and makes an excellent addition to an embedded system. Several buffer overflow security fixes and other bugfixes.

Added 2002-03-29
by VAB
CKS is an openPGP (RFC2440) compliant public key server. It is currently under development. It is written in C, and runs on Linux. It uses PostgreSQL for key storage, and supports the hkp protocol (it can interface with GnuPG and NAI PGP). The keyserver is mostly functional, and there is a link to a running copy on the homepage.

Added 2002-03-12
by Brent N. Chun
authd is a software package for obtaining and verifying user credentials which contain cryptographic signatures based on RSA public key cryptography. It includes (i) a server (authd) for authenticating local users through UNIX domain sockets and processing credentials and (ii) a client library (libauth.a) for requesting new credentials and verifying credentials signed by the server.

Added 2002-01-29
by urity@www.securityfriday.com
ScoopLm captures LM/NTLM authentication information (LanManager and Windows NT challenge/response) on the network.

Perl SecurePages
Added 2002-01-18
by Jonathan Furrer
Perl SecurePages is a session-based authentication script for Perl CGI. It was written to authenticate users on a session basis as a means of securing CGI applications written in Perl.

German Medical Card Reader
Added 2001-12-28
by Matthias Kranz
German Medical Card Reader reads the contents of smartcards with any card terminal that supports the CTAPI (for example, any Tokowito chip drives). The latest version also demonstrates how to programm ctapi compliant chipdrives according to ISO 7816.

Added 2001-12-13
by Giuseppe Tanzilli
mod_auth_pgsql is a module that allows user authentication (and can log authethication requests) against information stored in a PostgreSQL database.

Added 2001-11-29
by Patrik Karlsson
SMBProxy is a "Passing The Hash" tool that works as a proxy. It makes it possible to authenticate to a Windows NT4/2000 server by only knowing the md4 hash. It also makes it possible to mount shares, access the registry and anything else you could do with that particular users privileges.

Added 2001-10-31
by Fyodor Yarochkin , Ofir Arkin
X is a logic developed from the various Active Operating System Fingerprinting methods discovered during the "ICMP Usage In Scanning" research project. Xprobe is a tool automating the X logic.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus