what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2001-08-04

knocker-0.4.0.tar.gz
Posted Aug 4, 2001
Site knocker.sourceforge.net

Knocker is a simple and easy-to-use TCP security port scanner written in C. It is able to analyze hosts and the network services which are running on them. Knocker it is available for Linux and Unix platforms. Both a console version and a GTK+ version are available.

Changes: The output has been colored.
tags | tool, scanner, tcp
systems | linux, unix
SHA-256 | d2e3d1b4d90ccaf372a0de8f3f594485a6ff88a92d9cab840c1f8f665714aafa
acid-0.9.6b12.tar.gz
Posted Aug 4, 2001
Site acidlab.sourceforge.net

The Analysis Console for Intrusion Databases (ACID) is a PHP-based analysis engine to search and process a database of incidents generated by security software such as IDS's and firewalls (e.g., Snort or ipchains). It provides a search interface for finding alerts matching practically any criteria, including arrival time, signature time, source/dest address/port, flags, payload, etc. ACID also provides the ability to annotate and logically group related events, delete false positives, or archive alerts among databases. A variety of statistics and graphs can be generated based on time, IP address, ports, alert classification, and sensor.

tags | tool, php, intrusion detection
systems | unix
SHA-256 | e08027b7d330a234c53242f9b733a6fe8846e0ef01641717de2b9f123754d1c6
psad-0.9.0.tar.gz
Posted Aug 4, 2001
Site cipherdyne.com

Port Scan Attack Detector (psad) is a perl program that is designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options (Linux 2.4.x kernels only), email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap.

Changes: Support has been added for UDP scan detection along with a few UDP scan signatures, a new verbose mode is included in install.pl, improved check_flags() for better TCP flag recognition (nmap NULL scans are supported), and a fix for psadwatchd not parsing ps output correctly.
tags | kernel, perl, tcp
systems | linux
SHA-256 | 2f7e9560ac335e6c47ef89a251f91e52277345d0d07943009c5784111dd63444
nessus-1.0.8.tar.gz
Posted Aug 4, 2001
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 531 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: More then 650 security checks are performed, and minor bugfixes have been added.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 26dc74d0229e21fbafb5803f964aa05667fe8d8ac3ad2db2fa55534c3d3beda2
Samhain File Integrity Checker
Posted Aug 4, 2001
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain (stable branch) is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: New files in monitored directories are now automatically included in the monitoring. More info and examples for paging is included in the manual. Several minor bugs have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 65f57e2ad7b7c22483a3f42e9807ae6c22bd831ac181beed6eacdac7a7fdd282
tcptraceroute-1.2.tar.gz
Posted Aug 4, 2001
Site michael.toren.net

Tcptraceroute is an implementation of traceroute which uses TCP SYN packets, instead of the more traditional UDP or ICMP ECHO packets. In doing so, it is able to trace through many common firewall filters.

Changes: Lots of new features, including the ability to send more than one probe to each hop, to send probes with the ECN bits set, to send probes of an arbitrary length, and many more.
tags | udp, tcp
systems | unix
SHA-256 | f3c821f8831df5825e51a252de008e75a7c13f3ac0b88c080818c68b2dc1509a
stunnel-3.18.tar.gz
Posted Aug 4, 2001
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: More transfer() bugs fixed. -I option to bind a static local IP address have been added. Debug output of info_callback was redesigned.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | aaf0f934ea4a2833ca6354c5c90c8a0b0d6ab2ca96d1a8d673f23b26801f65d6
sneaky.tar.gz
Posted Aug 4, 2001
Site bigredrockeater.com

Sneaky Pete is a java program which lets you input an alphabetic passphrase into a computer without using a keyboard, thus foiling keylogging software/hardware. It also incorporates anti-TEMPEST fonts to make it harder for monitor-scanners to see what letters are on your display.

tags | java
SHA-256 | 93beb1efc57a9397ed67dd64e1510987e1481359afba0055c83617c4bbb54338
etherape-0.8.0.tar.gz
Posted Aug 4, 2001
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman / interman / tcpman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based. It supports Ethernet, FDDI, Token Ring, PPP, and SLIP.

tags | tool, sniffer
SHA-256 | 8c2fdbf0569d78b65a8824229f81223894e622d48ec5b66907ebcb789ea23acf
medusa-0.8.1-alpha.tar.gz
Posted Aug 4, 2001
Authored by Marek Zelem, Martin Ockajak | Site medusa.fornax.sk

Medusa DS9 is used to increase Linux's security. It consists of two major parts, Linux kernel changes and the user-space daemon. Kernel changes do the monitoring of syscalls, filesystem actions, and processes, and they implement the communication protocol. The security daemon communicates with the kernel using the character device to send and receive packets.

Changes: Improved code that handles privilege elevation during execve(), added several missing permission checks to System V IPC code, fixed some missing dputs() in VFS code, and included alpha support for 2.4.x kernels.
tags | kernel, protocol
systems | linux
SHA-256 | a599cf59ec5f974bc6bdb81af28463f1d93848ef143510e461f2499973dc8f2d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close