what you don't know can hurt you
Showing 1 - 17 of 17 RSS Feed

Files from JD Glaser

Email addressjd.glaser at foundstone.com
First Active1999-08-17
Last Active2003-07-07
fport.zip
Posted Jul 7, 2003
Authored by JD Glaser | Site foundstone.com

Fport v2.0 is powerful windows tool which reports all open TCP/IP and UDP ports and maps them to the owning application. This is the same information you would see using the 'netstat -an' command, but it also maps those ports to running processes with the PID, process name and path. Fport can be used to quickly identify unknown open ports and their associated applications. Supports Windows NT4, Windows 2000 and Windows XP.

tags | udp, tcp
systems | windows, 2k, xp
MD5 | 66c742a94e4f1f3881b0cd9d84727e4e
Blast20.zip
Posted Dec 15, 2000
Authored by JD Glaser | Site foundstone.com

Blast v2.0 - A small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers.

tags | tcp
MD5 | 23782dce17859e49f01fb6ecd52477d3
NTOMax20.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

NTOMax v2.0 - A scriptable, server stress testing tool.This tool takes a text file as input and runs a server through a series of tests based on the input. The purpose of this tool is to find buffer overflows and DOS points in a server.

tags | overflow
MD5 | 6928a8bfb0d42e926b563f6dfa88740f
ForensicToolkit20.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

Forensic Toolkit v2.0 is a file properties analyzer designed to examine the files on a disk drive for unauthorized activity. Lists files by their last access time, search for access times between certain time frames, and scan the disk for hidden files and data streams.

MD5 | 2f6f81a9bd0dcd266f6901961e3baa4f
NTLast30.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

NTLast v3.0 is a security audit tool for Windows NT. It can help identify and track who has gained access to your system, and document the details. Includes raw time output for Excel analysis and additional features for Webmasters.

systems | windows, nt
MD5 | 6f46575a1866d7ccd6967e16a210d62c
NTOMax10.zip
Posted Feb 11, 2000
Authored by JD Glaser | Site ntobjectives.com

NTOMax v1.0 - A scriptable, server stress testing tool.This tool takes a text file as input and runs a server through a series of tests based on the input. The purpose of this tool is to find buffer overflows and DOS points in a server.

Changes: Trial parameter lets you view the buffer to be sent w/o sending it, verbose toggle, norecv parameter, and reopen parameter. This version fixes many timeout errors users were getting.
tags | overflow
MD5 | a45e3ca1b8084be01110cb923d92e219
ntattack.zip
Posted Jan 2, 2000
Authored by JD Glaser | Site ntobjectives.com

Paper detailing a successful attack against a NT server running the avirt mail service. In powerpoint, html, and text format.

tags | paper
MD5 | 61a925ecb37fa72c1c76aac9c3717f76
blast-1.1.zip
Posted Dec 23, 1999
Authored by JD Glaser | Site ntobjectives.com

Blast - a small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers.

tags | tcp
MD5 | ce5ee9e7d9539b6b850c615917fa6463
ntotoolsSD.zip
Posted Oct 21, 1999
Authored by JD Glaser | Site ntobjectives.com

NT OBJECTives, Inc. Presents - Seek and Destroy Network Tools. NTO Tools includes four new tools: Lservers[tm], NTOLog[tm] and NPList[tm] and NTODrv[tm]. NTOLog[tm] is a Powerful, network wide backup/clear utility for NT logs.i LServers[tm] is a NetBIOS name dumper. NPList[tm] is a NT network process dumper. NTODrv[tm] is a NT network driver/service dumper. Download NTO Seek/Destroy Tools[tm].

MD5 | 07d2c994139b595e5747a7ff4595303b
Packetx1.zip
Posted Oct 15, 1999
Authored by JD Glaser

PacketX 1.0 is a native Windows NT firewall testing tool that allows for complete TCP/IP packet creation. It creates packets to be 'fired' at a firewall in validation tests so that firewall rules can be confirmed. PacketX[tm] contains complete TCP/IP packet spoofing technology in order to verify the approval/denial of internet domain address against firewall ACL's. Freeware version.

tags | spoof, tcp
systems | windows, nt
MD5 | 62f7fb47d7b1f7a9decd3f5b7555c712
SANS99wedUPDATE.PPT
Posted Oct 14, 1999
Authored by JD Glaser

Updated paper on Intrusion Detection under Windows NT. This should make things a bit clearer. Microsoft Powerpoint presentation.

tags | paper
systems | windows, nt
MD5 | a6b974d58cccac1795f348a9b20fca96
NTOtools2.zip
Posted Oct 14, 1999
Authored by JD Glaser

3 NT tools - lservers is a NetBIOS name dumper that quickly lists names of PDC's, BDC's, NT boxes, etc. NTOLog backs up or copies NT log files. Can use stdin or input from lservers. NPList can dump all processes on the network. Example: lservers \\HOSTX XDOMAIN /nt | nplist | grep l0phtcrack.

MD5 | 1f83531dab5627d5ad25b549496a9c3c
ntotoolsPress2.zip
Posted Oct 14, 1999
Authored by JD Glaser

Documentation for NTOtools2.

MD5 | 9965df34fc2a33aed3558077e6d469a5
Defeating_PGP_with_LanMan.doc
Posted Oct 12, 1999
Authored by JD Glaser

A word document discussing the possibilities of defeating encryption programs such as PGP using LanMan under NT.

tags | paper
MD5 | 7e9dbe2845fc9b7ae0269427cd491b5a
SANS99wed.zip
Posted Oct 12, 1999
Authored by JD Glaser

Intrusion Auditing Under Windows NT. Microsoft PowerPoint presentation.

tags | paper
systems | windows, nt
MD5 | 23c6e8f8800427ce328732b27ccbf496
Ntlast16.zip
Posted Oct 5, 1999
Authored by JD Glaser

NTLast 1.6 is a security audit tool for Windows NT. It's a Win32 command line utility with several switches that search the event log for Interactive/Remote/Failed logon stats. In it's simplist form, it reports the last ten successful logons at your computer. NTLast does two significant things that event viewer does not. It can distinguish remote/interactive logons and it matches logon times with logoff times. NTLast is designed to assist your efforts in tracking down logon/logoff data.

tags | remote
systems | windows, nt, 32
MD5 | ef5ec812f815b6b4ae27ad9af9bbaaa6
null.sessions.html
Posted Aug 17, 1999
Authored by JD Glaser

Excellent detailed explanation describing how to programmatically connect to NT Server NULL Sessions and extract the name of the true administrator account.

MD5 | bf3d4acfb8f2c81c1646bd4e1ec7fecd
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close