what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 601 - 625 of 907 RSS Feed

Intrusion Detection Files

Adwids0.8b1
Posted Oct 7, 2000
Authored by Defense Worx | Site defenseworx.com

The Defense Worx Network Intrusion Detection System is a linux based IDS which performs high-speed traffic analysis of a network packet to detect unauthorized traffic in real-time. Includes a Java based consile to display alerts.

Changes: Now decodes DNS, has open source signatures, detects port scans and sweeps, and contains performance improvements.
tags | tool, java, intrusion detection
systems | linux, unix
SHA-256 | 8c8c0dc8c0ecb2d7b168c0b9689384b31c0528488993d812d6a741ea2a889048
Samhain File Integrity Checker
Posted Oct 6, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Bug fix release which fixes problems with IP address caching and null characters in passwords.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 05bcb5c628550e899a35271dbf30846efc2a0a63a58ff46493819bb6fc95698c
claymore.tar.gz
Posted Oct 3, 2000
Authored by Sam Carter | Site linux.rice.edu

Claymore v0.3 is an intrusion detection and integrity monitoring system. To accomplish its task, it runs from cron and reads in a list of files stored in flat ASCII, and uses md5sum to check their integrity against that recorded earlier in a database. If the database is placed on a read-only medium such as a write-protected floppy, then it should provide an infallible record against remotely installed trojan horses.

Changes: This release adds ownership / permission tracking and switches to the Digest::MD5 instead of md5sum.
tags | tool, trojan, intrusion detection
systems | unix
SHA-256 | 06701ba8c09c935d0edafbc748a756d38164c63e1a93ae9b4b8fbc2a558da32b
filewatch-0.09.tar.gz
Posted Oct 1, 2000
Authored by Lasse Kaislaniemi | Site sourceforge.net

Filewatch is a perl script which watches the CTIME of your files and alerts you to any changes.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | e9b0b9efd07c128e57f46f40b0b2e0a783de6b4293eef730676aacb551c53e92
lsof_4.51_W.tar.gz
Posted Sep 13, 2000
Authored by Vic Abell

Lsof is an extremely powerfiul unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It easily pinpoints which process is using each network connection / open port.

Changes: Support for Solaris 9 (SunOS 2.9) and Linux 2.4, and bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | dbf618652685f94befe85ab1fcbe56c7cc178f174f75e966f269a3b022932bf9
nabou-1.5.tar.gz
Posted Sep 12, 2000
Authored by Thomas Linden | Site 0x49.org

nabou is a Perl script which can be used to monitor changes to your system. It provides file integrity checking, and can also watch crontabs, suid files and user accounts for changes. It stores all data in standard dbm databases.

Changes: This release includes many bugfixes, database encryption support, process monitoring capabilities, and some more output options.
tags | tool, perl, intrusion detection
systems | unix
SHA-256 | d25efdc2feef00c7f9b17bccb9501ea7f991488871a532aec5de224094d535cd
fileutils-4.0-lm.tar.gz
Posted Sep 6, 2000
Authored by Sean Trifero | Site innu.org

Landmine Fileutils is a modified fileutils package for Linux which logs the arguments used for execution to syslog. Includes patched copies of chmod, chgrp, chown, cp, dir, ln, ls, mkdir, mv, rm, rmdir, and touch.

tags | tool, intrusion detection
systems | linux, unix
SHA-256 | 9f11e852afc06b51af7fb9e02d8233d8d7e2f5dd98943dca6282d871e28eaa70
sf-0.1b.tgz
Posted Aug 29, 2000
Authored by venomous | Site rdcrew.com.ar

Secure Files 0.1b is a security tool that checks system integrity by comparing the MD5 checksums of flagged files against their earlier recorded checksums.

tags | tool, intrusion detection
systems | unix
SHA-256 | caad669b0b465c73e0613d69b59ad4a8753e02d3a078318bc637439fcf97fe34
nabou-1.4.tar.gz
Posted Aug 17, 2000
Authored by Thomas Linden | Site 0x49.org

nabou is a Perl script which can be used to monitor changes to your system. It provides file integrity checking, and can also watch crontabs, suid files and user accounts for changes. It stores all data in standard dbm databases.

Changes: Many bugs were fixed. Some new commandline flags were added: --quiet (report only changes) and --update (update a database record for a file). It can now check the disk usage of a directory, and you can now define your own checks using inline Perl scriptlets.
tags | tool, perl, intrusion detection
systems | unix
SHA-256 | bccef5c80d698caf2fa933ba5e6b844e5c373fe98a6d87327521a73e86cb632a
nabou-1.2.tar.gz
Posted Aug 7, 2000
Authored by Thomas Linden | Site 0x49.org

nabou is a Perl script which can be used to monitor changes to your system. It provides file integrity checking, and can also watch crontabs, suid files and user accounts for changes. It stores all data in standard dbm databases.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 514d306db836a86d3801aa340487882f8feb7be7f580769d2729832e7c3731c5
Samhain File Integrity Checker
Posted Jul 15, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Downloading database and configuration files from the server has been enabled, the client/server communication protocol has been revised, obsolete funtionality has been removed, the 'stealth' mode has been improved, and nested conditionals are possible now in the configuration file. An extensive manual has been added.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 53da78706a18ff4dce9b0ee37a60fe8df981b1076074833d5e55def8f98a32c2
libnids-1.14.tar.gz
Posted Jul 12, 2000
Authored by Nergal | Site packetfactory.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit (quite a bit ;)), and provides convinient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you don't have to build low-level network code. If you decide to use libnids, you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: Added support to capture packets on all interfaces, including loopback, added ability to refrain from setting promisc flag, added ability to disable tcp processing, libc5 support, alpha platform support, and bug fixes.
tags | tool, local, intrusion detection
systems | unix
SHA-256 | 8bce851ef10447e005e43e980935808d2de410a94b8e95667bb174cddd7b0c79
lsof_4.50_W.tar.gz
Posted Jun 29, 2000
Authored by Vic Abell

Lsof is an extremely powerfiul unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It easily pinpoints which process is using each network connection / open port.

Changes: NetBSD Alpha added, Solaris kernel address filtering added, fixes for /dev/kmem-based Linux, Solaris, BSDI, FreeBSD, NeXTSTEP, OpenBSD, and OpenStep. Added 64 bit file size and offset support for BSDI, FreeBSD, NetBSD, and OpenBSD.
tags | tool, intrusion detection
systems | unix
SHA-256 | cba979b649e12b0f5b3b05c196e31d6ea1f8a43d81ac109c8be92cc7e1977e16
whowatch-1.4.tar.gz
Posted Jun 13, 2000
Authored by Michal Suszycki | Site wizard.ae.krakow.pl

Whowatch is an interactive utility that displays information about the users currently on the machine in real time. Besides standard information (login name, tty, host, user's process) you can see the connection type (ie. telnet or ssh). You can also watch the process tree, navigate it, and send INT and KILL signals. Ncurses ascii graphics.

Changes: Average load information and new keys for navigation were added, in addition to OpenBSD and FreeBSD support. Also bug fixes and major code optimalization changes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 221564dbdf503990e6e14803a1df0c735c61fa6069ebc56a57a8fba9ac22e4f4
audit.tgz
Posted Jun 6, 2000
Authored by Digs | Site console-newsletter.hypermart.net

Audit is a script which will record any changes to files on your machine by generating a checksum for each file in the directories scanned. It was built with simplicity and ease of use in mind, comes with a GUI, and has a reasonable set of defaults in place out of the box.

tags | tool, intrusion detection
systems | unix
SHA-256 | 60b0c2023ee26f7321e8195b81af3670fbe5aa6f69ef6161898daf59b61fb8c5
passfing.tar.gz
Posted May 16, 2000
Authored by Craig Smith

A perl script that passively fingerprints OSes based on signatures.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 442d7be25254eff7136ab3b7b09ea398f149d705e590c03f1095017b55f1771c
AIDE 0.7
Posted May 9, 2000
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Bug fixes, support for compressed database using zlib, and updated Mhash support along with linkname checking.
tags | tool, intrusion detection
systems | unix
SHA-256 | 610841fb570d981144819861826946c135519cacd58d9a663cca8b9cccf9b0d9
trappa.tar.gz
Posted May 7, 2000
Authored by Narrow | Site b0f.com

Trappa detects a CGI scan and sends an alert message to syslog with the attackers IP+Web Browser. Works by installing decoy CGI scripts in the cgi-bin directory.

tags | tool, web, cgi, intrusion detection
systems | unix
SHA-256 | c5c64cf21cb54d301d687c4e4ae90ee357c72612a0dca2803565578308d4a6ee
secureworx0_7-B1.sh
Posted May 2, 2000
Authored by Secure Worx | Site secureworx.homestead.com

Secure Worx (TM) Network Intrusion Detection System - The intrusion detection system is a network based system that performs high-speed traffic analysis of the content and context of a network packet to detect unauthorized traffic in real-time. It has inexpensive hardware and OS requirements. The intrusion detection system runs on a Intel Pentium class compatible processor with a 10/100 Ethernet card running the Linux OS with kernel 2.2 and above with a configured TCP/IP stack. The installation process involves running an installation script that asks a few simple questions. It is then a simple matter of starting the software and your network is then searched for anomalous activity.

tags | tool, kernel, tcp, intrusion detection
systems | linux, unix
SHA-256 | faea89ee797f3f11988cce474a14e1abb795054d5e4a03ec5804ff43884cdee8
sentinel-0.8.tar.gz
Posted Apr 23, 2000
Authored by Bind | Site subterrain.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now threaded!
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 2707d108aa34be6d15b939d6e07fd00586e3b50f6bcb2e2ddeecb06a9e8e9ab4
sentinel-0.6.tar.gz
Posted Apr 20, 2000
Authored by Bind | Site subterrain.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Minor code changes and cleanups, thanks to vacuum for his contributions.
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 02e142e7a8a5cfef8d6e749c0d6701a73239b098fd104c2605164562580266ef
sentinel-0.5.tar.gz
Posted Apr 12, 2000
Authored by Bind | Site packetfactory.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now works correctly under linux.
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 6d5ba58d987fc714aa42799e13604eb61ef54d01b82002d7c9878e095880635b
FCheck_2.07.51.tar.gz
Posted Apr 11, 2000
Authored by Mike Gumienny | Site sites.netscape.net

FCHECK is a very stable PERL script written to generate and comparatively monitor a UNIX system against its baseline for any file alterations and report them through syslog, console, or any log monitoring interface. Monitoring events can be done in as little as one minute intervals if a system's drive space is small enough, making it very difficult to circumvent. This is a freely-available open-source alternative to 'tripwire' that is time tested, and is easier to configure and use.

Changes: Fixes for the configuration files trailing space bug (fixed security hole), major bug fixes.
tags | tool, perl, intrusion detection
systems | unix
SHA-256 | fb3737c1c6d920726f78f8eb8ca0423876e061872907a6ac44797d57c526954d
sentinel-0.09.tar.gz
Posted Apr 6, 2000
Authored by Bind | Site packetfactory.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 18806ab69e48a986029b36c10e8f6b0206d3907890b5838438dfe6f443e204f2
seclogv03.tar.gz
Posted Apr 4, 2000
Authored by Dilusi0n | Site gotr00t.com

Seclog (security logger) is a log auditing tool written in Perl. It will watch /var/log/messages for suspicious information and notify you via email.

Changes: Major rewrite, all system calls have been removed, works much faster now, more secure, saves backups of the reports/mails it creates.
tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 409e621c83ac8b2026f4e2d0140e0b0918baa58a851e5bcce19f32ce0b1942dd
Page 25 of 37
Back2324252627Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close