(Page 9 of 17)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Category: Auditing » Host

Narrow Security Scanner (Windows/Perl)
Added 2001-10-22
by Narr0w, nss@privacyx.com
Narrow Security Scanner 2000 (Windows/Perl) searches for 367 remote vulnerabilities.

Added 2001-10-22
by Microsoft
The IIS Security "What If" tool is a Dynamic HTML (DHTML) utility designed to assist in troubleshooting security issues with IIS.

Added 2001-10-22
by Altus Network Solutions
SPCheck is a command line utility that can be used to check the service pack and hot fixes on any NT Workstation or Server (assuming you have administrative privileges on the machine). SPCheck v.1.4 checks multiple machines and generates a web page or a comma-delimited text file that you can easily import in a spreadsheet or database program. SPCheck v.1.4 is now CGI aware and can be run from the cgi scripts directory on Apache or IIS. It returns SP and hotfix information on the local host only.

Added 2001-10-22
by Pedestal Software LLC
SecurityExpressions automates the process of deploying, assessing, and maintaining consistent security policies on networks of Windows NT and 2000 systems. It helps organizations with security management and large-scale systems lockdown. SecurityExpressions' no-agent technology eliminates the need to install new software on desktops and servers, enabling security managers to quickly assess how well their computers comply with industry-standard or custom lockdown guidelines.

Find Distributed Denial of Service (find_ddos)
Added 2001-10-22
by National Infrastructure Proctection Center
In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the National Infrastructure Proctection Center (NIPC) Special Technology Applications Unit (STAU) has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The distributed denial-of-service tools that are detected by the tool are: - stacheldraht client - stacheldraht daemon - stacheldraht master - tfn-rush client - tfn client - tfn daemon - tfn2k client - tfn2k daemon - trinoo daemon - trinoo master

Added 2001-10-22
by Andrew Daviel, andrew@vancouver-webpages.com
This program is a daemon intended to catch someone installing a rootkit or running a packet sniffer. It is designed to run continually with a small footprint under an innocuous name. When triggered, it sends email, appends to a logfile, and disables networking or halts the system. it is designed to install with the minimum of disruption to a normal multiuser system, and should not require rebuilding with each kernel change or system upgrade.

Added 2001-10-22
by Mike Heffner
BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tempfile creation activity to alert the user of any programs using unsafe tempfile names. While BFBTester cannot test all overflows in software, it is useful for detecting initial mistakes that can red flag dangerous software.

Added 2001-10-22
by spender
An extensive collection of 3 shell scripts used in conjunction with 69 DoS tools to analyze vulnerabilities of a certain system. Options to scan only, log to disk, select port range. Ability to work on a range of IPs, and to loop the script until a weakness is found. Compiled in Linux with sources. Only brief testing done so far on local machine, and only on Linux.

ARPCI (Automated RPCInfo)
Added 2001-10-22
by Presto, presto@regiononline.com
ARPCI automates rpcinfo auditing. It will read a specified host list, log all results, and report on specified string.

Added 2001-10-22
by lamagra, access-granted@geocities.com
fs-spider is a multi-threaded bad permissions finder (user defined).

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus