what you don't know can hurt you
Showing 576 - 600 of 791 RSS Feed

Intrusion Detection Files

icmpinfo-1.11.tar.gz
Posted Aug 17, 1999

Tracks ICMP packets, allowing you to proactively watch for suspicious behaviour, mainly ICMP unreachables.

tags | tool, intrusion detection
systems | unix
MD5 | 65c3acdf2f87f9ab9aa1a055d76f8976
unix.zip
Posted Aug 17, 1999

unix.zip

tags | tool, intrusion detection
systems | unix
MD5 | 602820f7be369655bb30e58b50337e63
bgcheck-0.5.tar.gz
Posted Aug 17, 1999
Authored by blue

bgcheck 0.5 - bgcheck is a process monitor for Linux written in perl that can be used by administrators to limit the number of background processes that each user can run.

Changes: added support for long usernames, fixed ftpd spawn detection to work with proftpd, possibly others.
tags | tool, perl, intrusion detection
systems | linux, unix
MD5 | a9f62bd27c830d84b9d7d2c4665f6f2a
ctm-1.2.tar.gz
Posted Aug 17, 1999
Authored by Lars Fenneberg

ctm 1.2 - CTM is an SNMP interface statistics gatherer which works as a daemon and polls SNMP capable routers in regular intervals and puts the gathered information into a database. Information gathered includes operational status of the interface, octets and packets sent and received, line errors, and queue discards, but CTM can easily be changed to log any interface specific SNMP variable. CTM comes with an example report script which gives traffic and line error summaries for certain periods of time.

Changes: Version 1.2 corrects delta counters accordingly when the router is rebooted.
tags | tool, intrusion detection
systems | unix
MD5 | 31d9138ff9dc261b78c50092649863e1
decfingerd-0.6.tar.gz
Posted Aug 17, 1999
Authored by Jon Beaton

dfingerd v0.6 takes the place of your original finger service, providing totally false information to clients. This can be useful to catch people trying to crack your server, or to just really confuse them. You can define output for individual users, empty requests, and forward requests to another system.

tags | tool, intrusion detection
systems | unix
MD5 | def43c1a780975756a13905667886685
gogmagog-4.tar.gz
Posted Aug 17, 1999
Authored by C. Parisel

gogmagog 4 - GogMagog is a multiplatform sysadmin tool for monitoring the integrity of networkwide systems. Communication between the Magog server (ideally a PC running Linux) and the Gog hosts relies on FTP only, so it is relatively network architecture independent. Sysadmins monitor their machines at a glance, through a very simple WWW graphical interface (named GogView) on the server. GogMagog works on Linux, AIX, HP-UX and Solaris.

Changes: encrypted profiles, security improvements.
tags | tool, intrusion detection
systems | linux, unix, solaris, aix, hpux
MD5 | 973b264138f4cc0f732242cd96f7d54c
lslk_1.25_W.tar.gz
Posted Aug 17, 1999

lslk_1.25_W.tar.gz

tags | tool, intrusion detection
systems | unix
MD5 | 89818f576e10d560f8f806ea8894ff8f
lsof_4.43_W.tar.gz
Posted Aug 17, 1999
Authored by Vic Abell

lsof 4.43 - Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system.

Changes: Too many changes and bugfixes to mention here - read the 00DIST file for details.
tags | tool, intrusion detection
systems | unix
MD5 | 4d5263b853c882a33f626be0a47c937d
lsof_4.45_W.tar.gz
Posted Aug 17, 1999
Authored by Vic Abell

lsof 4.45 - Lsof is a Unix-specific diagnostic t ool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system.

Changes: Too many changes and bugfixes to mention here - read the 00DIST file for details.
tags | tool, intrusion detection
systems | unix
MD5 | b795ce87f74578139aef66594308c236
slocate-1.6.tar.gz
Posted Aug 17, 1999
Authored by Kevin Lindsay

Secure Locate 1.6 - Secure locate provides a secure way to index and quickly search for files on your system. It uses incremental encoding just like GNU locate to compress its database to make searching faster, but it will also store file permissions and ownership so that users will not see files they do not have access to. It is a bit slower than the GNU locate, but thats the price for security.

Changes: Optimized some code to make updating the database much faster, patched to allow smoother installation on FreeBSD, and some other minor bug fixes.
tags | tool, intrusion detection
systems | unix
MD5 | 6096f7b0e4c4761bb2257dd83405bdb9
swatch-3.0b1.tar.gz
Posted Aug 17, 1999
Authored by Todd Atkins | Site stanford.edu

Swatch, the Simple Watch Daemon is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.

Changes: Fixed a big bug involving key value assignment when throttling.
tags | tool, intrusion detection
systems | unix
MD5 | 5969ec109979acd91b743815dda20a18
sxid_4.0.0.tar.gz
Posted Aug 17, 1999
Authored by Ben Collins

sXid 4.0.0 - sXid is an all in one suid/sgid monitoring program designed to be run from cron on a regular basis. Basically it tracks any changes in your s[ug]id files and folders. If there are any new ones, ones that aren't set any more, or they have changed bits or other modes then it reports the changes in an easy to read format via email or on the command line.

Changes: numerous - see the changelog file.
tags | tool, intrusion detection
systems | unix
MD5 | f6a48e33024abc347df8606cc45fdd24
wsm-0.9.5.tgz
Posted Aug 17, 1999
Authored by Dirk G.K. Mueller

WSM: Web based System Monitor v0.9.5 is a Web accessible System Monitor for Linux featuring: Kernel (uname,lsmod,cpuinfo,free), Syslog (syslog, messages), Users (who), Jobs (ps -axjf), Disks (mount, df), Network (netstat -n), Routes (route -n), ISDN (imontty), VBox (vboxadm), IP Accounting (acct).

tags | tool, web, kernel, intrusion detection
systems | linux, unix
MD5 | 451cbd6769df7dc06fbe7f5e7c7924a0
bgcheck-0.4.tar.gz
Posted Aug 17, 1999
Authored by blue

bgcheck 0.4 - bgcheck is a process monitor for Linux written in perl that can be used by administrators to limit the number of background processes that each user can run.

Changes: Fixed major problems handling ftp processes and added exception list for programs.
tags | tool, perl, intrusion detection
systems | linux, unix
MD5 | 914c853198372275c51a07f8ba80f883
ctm-1.0.tar.gz
Posted Aug 17, 1999
Authored by CTM web site

CTM 1.0 is your basic SNMP Traffic Monitor.

tags | tool, intrusion detection
systems | unix
MD5 | 1ca5b5279411facaddef1fd5d002fdfe
ctm-1.1.tar.gz
Posted Aug 17, 1999
Authored by CTM web site

CTM 1.1 is your basic SNMP Traffic Monitor.

tags | tool, intrusion detection
systems | unix
MD5 | 8904a579f247d4ee16a172c387e7d2c6
emonitor-v-0.6.tar.gz
Posted Aug 17, 1999

emonitor 0.6 is a notification, action-based system for network, system and application monitoring. emonitor includes the following tools: emsrvmsg (Event Monitor Server Message), emsrvcmd (Event Monitor Server Command), emtlog (Event Monitor Transaction Logger), emconsole (Event Monitor Console), emputcmd (Event Monitor Put Command), emputmsg (Event Monitor Put message). The Event Monitor Project

tags | tool, intrusion detection
systems | unix
MD5 | 419b432a7d2d4ccf09d4b5754602378c
emonitor.lsm
Posted Aug 17, 1999

emonitor description.

tags | tool, intrusion detection
systems | unix
MD5 | 2c54f5fb7b13c0c24b5c4057c44a11f6
logwatch-1.6.6.tar.gz
Posted Aug 17, 1999
Authored by Kirk Bauer

LogWatch 1.6.6 is a customizable, pluggable log-monitoring system that analyzes and reports on system logs. It will go through your logs for a given period of time and make a report in the areas that you wish with the detail that you wish. Easy to use - works right out of the package on almost all systems. Now analyzes samba logs.

Changes: fewer unmatched entries in 'secure' service, ftp-messages module prettier, name-lookups now optional for named module, added and improved ProFTPd module, much more.
tags | tool, intrusion detection
systems | unix
MD5 | e9c686de214ded15c89216fae1c21094
mon-0.38.12.tar.gz
Posted Aug 17, 1999
Authored by Jim Trocki

mon 0.38pre12 - "mon" is an extensible fault detection package which can be used to monitor network and system resources. It is most useful for system and network administrators who are responsible for maintaining the operation of networks of hundreds or possibly thousands of nodes.

Changes: Too many new feature, additions, code cleanups, and bugfixes to list; see the CHANGES file. mon-0.38.12.tar.gz.sign.
tags | tool, intrusion detection
systems | unix
MD5 | ad40b05fb571ef4e4442aae3a0edbbaa
mon-0.38.12.tar.gz.sign
Posted Aug 17, 1999

No information is available for this file.

tags | tool, intrusion detection
systems | unix
MD5 | ad94b4ce8e010a8c818e5ceb65fe5281
portsentry-0.90.tar.gz
Posted Aug 17, 1999
Authored by Craig Rowland

PortSentry 0.90 - PortSentry is part of the Abacus Project suite of security tools. It is a program designed to detect and respond to port scans against a target host in real-time. It runs on TCP and UDP sockets and works on most UNIX systems. Advanced stealth detection modes are available under Linux only and detect SYN, FIN, NULL, XMAS, and Oddball packet scans. All modes support real-time blocking and reporting of violations.

Changes: Renamed from Abacus Sentry to PortSentry, lots of internal code clean up and optimizations, Docs updated and it now works under Solaris, Linux, BSD variants and others. portsentry.sample.txt.
tags | tool, udp, tcp, intrusion detection
systems | linux, unix
MD5 | 80eead64b3d6efb10748b80ecec0f54a
portsentry.sample.txt
Posted Aug 17, 1999

No information is available for this file.

tags | tool, intrusion detection
systems | unix
MD5 | 6ecd6e85e507606a05d23cec2d3686c8
thor1.0.tar.gz
Posted Aug 17, 1999
Authored by Jerry Kilpatrick

thor.pl 1.0 - thor.pl keeps tabs on suid and sgid files on your file system. It also keeps track of the checksums of your binaries and the root accounts on the system as well as a few other things. It's a handy script that helps you find possible security risks, or breakins.

tags | tool, root, intrusion detection
systems | unix
MD5 | d25bf542ae37a2fadc15d28b5f92faab
ViperDB-0.7.tar.gz
Posted Aug 17, 1999
Authored by J-Dog

ViperDB 0.7 - ViperDB was created as a smaller and faster option to Tripwire. ViperDB does not use a fancy all-in-one database to keep records. Instead it uses a plaintext db which is stored in each "watched" directory. By using this there is no real one attack point for an attacker to focus his attention on. This coupled with the running of ViperDB every 5 minutes (via cron root job) decreases the likelihood that an attacker will be able to modify your "watched" filesystem while ViperDB is monitoring your system.

Changes: Now logs to a standard logging facility instead of an individual file. Added '-checkstrict' functionality which changes permissions/owner/group back to what they were before the change was made to the file. Added exception(s) to '-checkstrict' which removes all permissions from the changed file if the file originally was SUID/GUID. Changed way filesystem changes are seen by admin, now a change only sends an alert to the logs once instead of repeatedly.
tags | tool, root, intrusion detection
systems | unix
MD5 | 1809efd2508e5987e6a8d98139bf7e07
Page 24 of 32
Back2223242526Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    11 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close