(Page 7 of 9)   < Prev  2 3 4 5 6 7 8 9  Next >

Category: Auditing » File Integrity

Claymore
Added 2001-10-22
by Sam Carter, redirect@www.glacier.rice.edu
Claymore is an intrusion detection and integrity monitoring system. To accomplish its task, it reads in a list of files stored in flat ASCII and uses Digest::MD5 to check their integrity against that recorded earlier in a database. If the database is placed on a read-only medium such as a write-protected floppy, it should provide a record against remotely-installed trojan horses.

FreeVeracity
Added 2001-10-22
by Rocksoft Pty Ltd
FreeVeracity is a general-purpose data integrity tool for free platforms (e.g. GNU/Linux, FreeBSD, NetBSD, OpenBSD) that uses cryptographic hashes to detect changes in files. FreeVeracity can be deployed in a wide variety of applications including network intrusion detection and firewall monitoring. By installing FreeVeracity integrity servers on your computers, you can actively monitor the integrity of your entire network.

Secure Files (SF)
Added 2001-10-22
by vENOMOUS, venomous@rdcrew.com.ar
Secure Files 0.1b is a security tool that checks system integrity by comparing the MD5 checksums of flagged files against their earlier recorded checksums.

CrucialADS
Added 2001-10-22
by Crucial Security
CrucialADS is a GUI based Alternate Data Stream scanning tool. CrucialADS is designed to quickly and easily detect the presence of Alternate Data Streams in NTFS files and directories.

Thor
Added 2001-10-22
by Jerry Kilpatrick, jerry@linuxscripts.com
thor.pl keeps tabs on suid and sgid files on your file system. It also keeps track of the checksums of your binaries and the root accounts on the system as well as a few other things. It's a handy script that helps you find possible security risks, or breakins.

Notify
Added 2001-10-22
by Jem Berkes, jberkes@pc-tools.net
Runs hidden in the background until it detects any kind of change in a directory it has been told to monitor. When a change occurs (e.g. create, delete, modify a file) it visually alerts the user. Can be used, for example, to detect incoming information over a network or to detect tampering of files. Uses very little memory and practically no CPU time.

Secure Portal
Added 2001-10-22
by Rodrigo Alvaro Diaz Leven, bruj0@phreaker.net
This program is made for people that need to know what is going on in their system. What it does is keeps an eye on the files that you select, for certain "hot words," and it is all done through a graphical interface. You never have to touch a config file. There is no limit as to how many "hot words" you can set or how many files you want to monitor.

Versioner
Added 2001-10-22
by Vacuum, vacuum@technotronic.com
Versioner is a graphical utility that traverses directories gathering extended file information and properties. Versioner's output is in comma seperated values format and automatically launches the program associated with the .csv extension (Usually MS-Excel) or .txt (Usually notepad). This data can also be imported into MS-Access. Uses: Can be used to determine "What has changed?" on a given host. This can be useful post-software installation, or post intrustion incident as a way of checking file integrity. Versioner can also be used to compare data on multiple machines to determine "What is different?".

Triplight
Added 2001-10-22
by Sam Carter
Triplight is an intrusion detection, and integrity monitor system. This release is rather unpolished (you need to hack up a crontab file, and to set a file path in the perl source), but fully functional. To accomplish its design goals, it reads in a list of files stored in flat ASCII, and uses md5sum to check their integrity against that recorded earlier in a database. If the database is placed on a read-only medium such as a write-protected floppy, then it should provide an infallible record against remotely installed trojan horses. Thus by monitoring the integrity of the system, triplight will serve as an aid in intrusion detection.

FileTraq
Added 2001-10-22
by Jeremy Weatherford, xidus@xidus.net
FileTraq is designed to be run periodically from the root crontab. Each time, it compares a list of system files with the copies that it keeps. Any changes are reported in diff or patchfile style, and dated backup copies are kept. It's designed to be an easy way to ensure that no system files are changed without your knowledge. If you're worried about people breaking in and changing things without you noticing, or just worried about the other guy with root on the box changing things and forgetting to tell you, it's a good way to keep tabs on configuration files.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus