exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 69 of 69 RSS Feed

Files from Andrea Barisani

Email addressandrea at inversepath.com
First Active2001-07-11
Last Active2023-06-09
Tenshi Log Monitoring Program
Posted Jun 27, 2006
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Fixed buggy noprefix queue implementation.
tags | system logging
systems | unix
SHA-256 | 0e6f89b84502a73f16d77fc0c4b09d2e8e9ecef8b20022a765731499fd7d9457
Tenshi Log Monitoring Program
Posted Jun 26, 2006
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Improved sanity checks, Added debug levels, level 2 enables Net::SMTP debug messages, Replaced Getopt::Std with Getopt::Long, and various other additions and tweaks.
tags | system logging
systems | unix
SHA-256 | 6271be61735f69bb62e593a63e93e09b8041860f9375d8738dc55129f5a9741d
ftester-1.0.tar.gz
Posted Feb 14, 2006
Authored by Andrea Barisani

The Firewall Tester consists of two perl scripts, the client part (ftest) and the listening sniffer (ftestd). The client injects custom marked packets, while the sniffer listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall. An IDS (Intrusion Detection System) testing feature is also available and snort rule definition file can parsed instead of the standard configuration syntax, ftest can also use common IDS evasion techniques. Stateful inspection firewall and IDS can be tested with the 'connection spoofing' option. Requires: Net::RawIP, Net::PcapUtils, NetPacket.

Changes: Various enhancements.
tags | tool, perl, spoof, firewall
systems | unix
SHA-256 | 7bb10d10913187e33af8be3d17c0d4ad5d0b8aa5af18242332787150eabd2f6f
Tenshi Log Monitoring Program
Posted Jan 5, 2006
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added uid, gid options for setting effective UID, GID / added colourization of debug messages / added filter, filterargs options for report pre-processing / added pager, and mailto syntax for sending pager friendly reports / added mailtimeout option / fixed tail, tailargs incorrectly being treated as dynamic options.
tags | system logging
systems | unix
SHA-256 | 2df0bd4a7f9ae0815a3ca28b808da02c73269e918925e3b1fc136e2e884ad8f5
Tenshi Log Monitoring Program
Posted Jun 17, 2005
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added include, includedir options for parsing external configuration files, added multiple queues feature, fixed missing USR1 signal handler, added filetest pragma for proper perms check when using POSIX ACL, added a Debian init file.
tags | system logging
systems | unix
SHA-256 | 3b3b3706a8066f701b2e2a17d8a3e0fd0096a28389ae67df0414a5a3cf875215
Tenshi Log Monitoring Program
Posted Mar 22, 2005
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Fixed whitespaces only lines handling in configuration file, added configuration check mode and checkconfig target in init scripts.
tags | system logging
systems | unix
SHA-256 | 85bbb5384f314f1326bb3aa5d7c2532903781c593606a941c95238ae5e163a2b
Tenshi Log Monitoring Program
Posted Nov 13, 2004
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added X-tenshi-version, X-tenshi-hostname, X-tenshi-report-start headers, various bug fixes and enhancements.
tags | system logging
systems | unix
SHA-256 | e2f26f3846de20178516424d49eb1349c6e9cf88956b078515ebd781394c5fa9
Tenshi Log Monitoring Program
Posted Jul 21, 2004
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added set tailargs option, fixed buggy logprefix implementation, fixed buggy cron implementation, fixed broken cron specs examples, see the Changelog for full details.
tags | system logging
systems | unix
SHA-256 | 98d195eff8e0a76a2a9a5c188dd3cd2054a2036fdd56667c46f82a523c574a49
Tenshi Log Monitoring Program
Posted Jul 16, 2004
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Changed name from wasabi due to trademark issues, added skip groups to speed parsing, added cron-style specs instead of time periods, added logprefix option for non-syslog logs, see the Changelog for full details.
tags | system logging
systems | unix
SHA-256 | bc7a7e134c35bd3aea3c6fe92c3d44b6cc0d62f964345f46925b5d30825f780a
wasabi-0.2.tgz
Posted Jun 22, 2004
Authored by Andrea Barisani | Site gentoo.org

Wasabi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added multiple files support, big performance improvements, better signal handling, new smtp code, see the Changelog for full details.
tags | system logging
systems | unix
SHA-256 | 2dc461abd6fca9f0892cd556b8e002aed7647d73572150960e754c28c150de68
wasabi-0.1.tgz
Posted Jun 9, 2004
Authored by Andrea Barisani | Site gentoo.org

Wasabi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

tags | system logging
systems | unix
SHA-256 | 83b46cd69f9179ecf6a4e47a75e804d5c3b2fd12912f8bda4c2b48d0ed94ca38
ftester-0.9.tar.gz
Posted Jun 21, 2003
Authored by Andrea Barisani

The Firewall Tester consists of two perl scripts, the client part (ftest) and the listening sniffer (ftestd). The client injects custom marked packets, while the sniffer listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall. An IDS (Intrusion Detection System) testing feature is also available and snort rule definition file can parsed instead of the standard configuration syntax, ftest can also use common IDS evasion techniques. Stateful inspection firewall and IDS can be tested with the 'connection spoofing' option. Requires: Net::RawIP, Net::PcapUtils, NetPacket.

Changes: Added support for CIDR notation, added pseudo fragments reassembly in ftestd, minor code rewrites and cleanup.
tags | tool, perl, spoof, firewall
systems | unix
SHA-256 | c48c80e3066209b78c7fbc41f645fb86367300c006054db11014fedf633d98d3
ftester-0.8.tar.gz
Posted Jan 17, 2003
Authored by Andrea Barisani

The Firewall Tester consists of two perl scripts, the client part (ftest) and the listening sniffer (ftestd). The client injects custom marked packets, while the sniffer listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall. An IDS (Intrusion Detection System) testing feature is also available and snort rule definition file can parsed instead of the standard configuration syntax, ftest can also use common IDS evasion techniques. Stateful inspection firewall and IDS can be tested with the 'connection spoofing' option. Requires: Net::RawIP, Net::PcapUtils, NetPacket.

Changes: Compatible with Perl 5.8.0, documentation updates, and bug fixes.
tags | tool, perl, spoof, firewall
systems | unix
SHA-256 | 08e23fb3f81a0f5e56e26fb66adb5aa3465c45be2fa414aac201805baa767518
ftester-0.7.tar.gz
Posted Jun 3, 2002
Authored by Andrea Barisani

The Firewall Tester consists of two perl scripts, the client part (ftest) and the listening sniffer (ftestd). The client injects custom marked packets, while the sniffer listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall. An IDS (Intrusion Detection System) testing feature is also available and snort rule definition file can parsed instead of the standard configuration syntax, ftest can also use common IDS evasion techniques. Stateful inspection firewall and IDS can be handled by the 'connection spoofing' option. CHANGES: Added fragmentation option, added option for specifying IP fragments and TCP segments numbers and size, added fragmentation related evasion techniques, extended syntax now works also for connection spoofing modes, various bugfixes, see Changelog for details. Requires: Net::RawIP, Net::PcapUtils, NetPacket.

tags | tool, perl, spoof, tcp, firewall
systems | unix
SHA-256 | b2e9999f056aca95a6a0edfcd1725b49f7add378b94d6548842ebf084f419695
ftester-0.6.tar.gz
Posted Apr 11, 2002
Authored by Andrea Barisani

The Firewall Tester consists of two perl scripts, the client part (ftest) and the listening sniffer (ftestd). The client injects custom marked packets, while the sniffer listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall. An IDS (Intrusion Detection System) testing feature is also available and snort rule definition file can parsed instead of the standard configuration syntax, ftest can also use common IDS evasion techniques. Stateful inspection firewall and IDS can be handled by the 'connection spoofing' option. Requires: Net::RawIP, Net::PcapUtils, Net::Packet.

Changes: Added the IDS testing option, added the ability to read snort rule definition files, added the ability of using common IDS evasion techniques, consult Changelog for details.
tags | tool, perl, spoof, firewall
systems | unix
SHA-256 | d39186c256dabcb09d9cd1b8421b0520a52fc1c0e2215856e19eea91a5412c06
ftester-0.5.tar.gz
Posted Mar 6, 2002
Authored by Andrea Barisani

The Firewall Tester consists of two simple perl scripts, the client part (ftest) and the listening "daemon" (ftestd). The client injects custom marked packets, while the daemon listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall.

Changes: Code cleanup and bugfixes, now all script are under 'strict', added man page ftester.8. Requires: Net::RawIP, Net::PcapUtils, Net::Packet.
tags | tool, perl, firewall
systems | unix
SHA-256 | 9b1a25935ccf8849377822d71eccbd50bd942cab050caf6dd2fef312f5e288d9
ftester-0.4.tar.gz
Posted Dec 21, 2001
Authored by Andrea Barisani

The Firewall Tester consists of two simple perl scripts, the client part (ftest.pl) and the listening "daemon" (ftestd.pl). The client injects custom marked packets, while the daemon listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall.

Changes: Added command line packet injection option, packets are now tracked also with IP ID field, added freport for automatically parse ftest and ftestd log files. Requires: Net::RawIP, Net::PcapUtils, Net::Packet.
tags | tool, perl, firewall
systems | unix
SHA-256 | 53aba6a00e93b66c9d0092c9704525d2851c6e2f20d70e521e5046590cf7376d
ftester-0.3.tar.gz
Posted Nov 6, 2001
Authored by Andrea Barisani

The Firewall Tester consists of two simple perl scripts, the client part (ftest.pl) and the listening "daemon" (ftestd.pl). The client injects custom marked packets, while the daemon listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall.

Changes: added the ability of spoofing real connections for stateful inspection firewalls testing, added custom TOS and checksum settings, verbose flags. Requires: Net::RawIP, Net::PcapUtils, Net::Packet.
tags | tool, perl, firewall
systems | unix
SHA-256 | 19387661c89041849369c4ecd4045d750ecfdf4e449cd3b7f4df259233febdf6
ftester-0.1.tar.gz
Posted Jul 11, 2001
Authored by Andrea Barisani

Firewall Tester v0.1 consists of two simple perl scripts, the client part (ftest.pl) and the listening "daemon" (ftestd.pl). The client injects custom packets with a signature in the data part while the daemon listens for such marked packets. Requires Net::RawIP, Net:PcapUtils, and Net::Packet.

tags | tool, perl, firewall
systems | unix
SHA-256 | b2d084cb97e57d877312862c2a15d12a330a9e005401c04c1c23373f57edf56f
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close