what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 626 - 650 of 907 RSS Feed

Intrusion Detection Files

seclog
Posted Mar 23, 2000
Authored by Dilusi0n | Site gotr00t.com

Seclog (security logger) is a log auditing tool written in Perl. It will watch /var/log/messages for suspicious information, and notify you via email.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 6ff068dc2ca20eeab510ba95aa37deebc0a7a6e10fec81337af9483f9213d07e
Samhain File Integrity Checker
Posted Mar 7, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: A module to watch for login/logout events has been added, deleted files are recognized now, a race condition has been fixed, write permission to critical files is checked more strictly, logging thresholds have a more syslogish syntax, messages are queued for delivery during temporary mail delivery failures and log server downtimes, some minor bugs have been fixed, and a test script has been added for better testing. New DB format.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | c4bec6eae7b835c7924032b004d61e27b74c80010826672f9a8458c4206485d7
stjude-0.4.tgz
Posted Mar 6, 2000
Authored by Tim Lawless

StJude is an attempt to monitor the flow of privilege in my Solaris boxes. It tries to detect privilege violations or improper transitions (ie stack smashing, or other local root exploits) by watching audit trails.

tags | tool, local, root, intrusion detection
systems | unix, solaris
SHA-256 | dc6a5beb02c0c8dca44693e6f1c02adb9803e196194e4af0c5cf6345de7cddae
slipwire-1.4.tar.gz
Posted Mar 3, 2000
Authored by James Quinby | Site packet.node.to

slipwire.pl is a filesystem integrity checker. It compares the SHA-1 hashes of files to an initial state and alerts the user of any changes. slipwire also records extensive file information such as inode number, last-modified date, filesize, uid, gid, etc, and can also report changes in any of these.

Changes: SHA hash of file database is returned when database is created, Quiet output by default, md5's are in the readme.
tags | tool, intrusion detection
systems | unix
SHA-256 | f5f0f6425b0170f2559bfbf787e7c68ef407709a2317154c9d078f67b06f59e6
whowatch-1.3.1.tar.gz
Posted Feb 29, 2000
Authored by Michal Suszycki | Site wizard.ae.krakow.pl

Whowatch is an interactive utility that displays information about the users currently on the machine in real time. Besides standard information (login name, tty, host, user's process) you can see the connection type (ie. telnet or ssh). You can also watch the process tree, navigate it, and send INT and KILL signals. Ncurses ascii graphics.

Changes: Man page update, rpm package available, small bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 5250b61c95f715683cfa8b22cf987f0542a924c43c7c721bcc9186a9dd1a294f
slipwire.1-3.tar.gz
Posted Feb 23, 2000
Authored by James Quinby | Site packet.node.to

slipwire.pl is a filesystem integrity checker. It compares the SHA-1 hashes of files to an initial state and alerts the user of any changes. slipwire also records extensive file information such as inode number, last-modified date, filesize, uid, gid, etc, and can also report changes in any of these.

Changes: Extension of information gathered on indexed files, comparisons made to inode, last-modified, etc in addition to SHA signatures, tightening up of the Perl code, and elimination of calls to the shell.
tags | tool, intrusion detection
systems | unix
SHA-256 | ec9858bdaf36e5e60ef17b7ed94935257559bad4767aa8e9115fdc554b149fce
Gbs.c
Posted Feb 22, 2000
Authored by W. ter Maat

Grazer1's Bait System opens a specific port and logs connections to it. Simple and ghetto way to log Netbus requests.

tags | tool, intrusion detection
systems | unix
SHA-256 | 4d1c34d8c7e1d3019ddb12e8da599860277edd1654a3828364909bb64b8eec09
viperdb_v0.9.1.pl.txt
Posted Feb 22, 2000
Authored by J-Dog | Site resentment.org

ViperDB was created as a smaller and faster option to Tripwire. ViperDB does not use a fancy all-in-one database to keep records. Instead it uses a plaintext db which is stored in each "watched" directory. By using this there is no real one attack point for an attacker to focus his attention on. This coupled with the running of ViperDB every 5 minutes (via cron root job) decreases that likelihood that an attacker will be able to modify your "watched" filesystem while ViperDB is monitoring your system.

Changes: Ignore file functionality which allows user to specify files to ignore added. Updated code works better on solaris, updated ls options to lAcr for solaris instead of standard laAs. Splitting permissions code cleaned out into owner, group, all perms.
tags | tool, root, intrusion detection
systems | unix
SHA-256 | 488a3842de04fb92480a0e20d15a8bdd4795feaa15e66dc9d2a2d1c80a92712b
slipwire
Posted Feb 18, 2000
Authored by James Quinby, Google Security Research | Site packet.node.to

slipwire.pl v1.1 is the first iteration of a filesystem integrity checker. It compares the MD5 hashes of files to an initial state and alerts the user of any changes.

Changes: The dependency on the md5 command has been removed by using the Digest:: modules for Perl, and SHA-1 hashes are now used instead of MD5.
tags | tool, intrusion detection
systems | unix
SHA-256 | dc845bdc2c286c64e4e25ef76ed2d31d286b284b13dafc146ad73c3ba66ee6e6
slipwire.1-2.tar.gz
Posted Feb 18, 2000
Authored by James Quinby | Site packet.node.to

slipwire.pl is a simple filesystem integrity checker. It compares the SHA-1 hashes of files to an initial state and alerts the user of any changes.

Changes: A fix for a bug in the iteration count when comparing files to hashes, a quick reader script for dumping the contents of the DBM file, an example file list, and a tidied-up README.
tags | tool, intrusion detection
systems | unix
SHA-256 | daaae031940c7c22dd5e6516ffd418ec4e9210a88aa495f534346ff76d915c43
md5-tool.tgz
Posted Feb 17, 2000
Authored by Simple Nomad | Site razor.bindview.com

If you have an md5 checksumming utility on your system, you can use these scripts for a "poor man's tripwire". These do several quick checks for archiving and security purposes.

tags | tool, intrusion detection
systems | unix
SHA-256 | 5105f0110153435688b633709392243a2b67d2f33b49e68780fa2df4ee6e043e
lsof_4.48_W.tar.gz
Posted Feb 15, 2000
Authored by Vic Abell

Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It is the single most powerful utility for inspecting running processes and determining which process is listening to which ports.

Changes: IPV4/IPV6 fixes, adjustments to Linux /proc-based processing of the TCP and UDP /proc/net files, compile and bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | d60225fa124cdd5e89f69db74cb7a17ebebd9b8d0ebcca6988944be43f78512c
rkdet-0.51.tar.gz
Posted Feb 15, 2000
Authored by Andrew Daviel | Site vancouver-webpages.com

Rkdet is a small daemon intended to catch someone installing a rootkit or running a packet sniffer.

tags | tool, intrusion detection
systems | unix
SHA-256 | e8008ba28d4ac255b65b7ab99b581481df201d52e1578be0620312907e2fe7a3
watchfile-1.0.tgz
Posted Feb 9, 2000
Authored by Nick 'Zaf' Clifford | Site nrc.co.nz

Watchfile will display a list of specified files on the screen, and continually update their stats. The stats displayed (i.e. file size, modified time, owner, etc.) can be configured on the command-line along with the update frequency.

Changes: Finally out of beta. The ability to change the order of columns displayed has been added. Many bugs fixed.
tags | tool, intrusion detection
systems | unix
SHA-256 | a8ea9b641881807d8cdb00fbf65fb3f4b9658dd6106ec58aab8f0feea7de233c
AIDE 0.6
Posted Feb 8, 2000
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: A lot of bug fixes. MD-sums were again broken; please update.
tags | tool, intrusion detection
systems | unix
SHA-256 | 77e4b8084e2fccdce1f43a5b385cf99c249900d85677dc057eadaca54b1d0caf
sherpa-0.1.4.tar.gz
Posted Feb 3, 2000
Authored by Rick Crelia | Site sherpa.lavamonkeys.com

sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time sherpa is run. Also, sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system.

Changes: Sherpa now checks for shadow passwords, parses inetd.conf to look for use of tcp_wrappers, and verifies perms.lst for RedHat 6.1.
tags | tool, local, perl, intrusion detection
systems | unix
SHA-256 | e515798bcd47e9b8b914d18cfb02dc464c8dcb97b3c6caff53e10bd472187c68
libnids-1.13.tar.gz
Posted Jan 28, 2000
Authored by Nergal | Site packetfactory.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit (quite a bit ;)), and provides convinient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you don't have to build low-level network code. If you decide to use libnids, you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: GNU autoconf support, code cleanup and new libnids(3) manpage, pcap_filter field in nids_params, bugfix in ip_check_ext(), Solaris support.
tags | tool, local, intrusion detection
systems | unix
SHA-256 | 40a23d3e2bde94319ee12c160a56e1a67b8e69592cc10b92a4660d697a9a0749
swatch-3.0b4.tar.gz
Posted Jan 26, 2000
Authored by Todd Atkins

Swatch ("Simple WATCHdog") is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.

Changes: Fixed the examine switch, added continue and quit actions, Fixed parsing of "throttle" setting, bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | c4ff2006f2a9142b2de844df66a0a81cd02b462916db92ee088ec284570352c9
tripwall.tar.gz
Posted Jan 26, 2000
Authored by Colin Lee | Site homepages.hack-net.com

Tripwall is a Tripwire clone developed for use with the Linux Router Project.

tags | tool, intrusion detection
systems | linux, unix
SHA-256 | 8374e6dcde17b2a0fbbfb92e565552fe840c028047f48853f965ccf757f89d4e
sentinel-1.2.0.tar.gz
Posted Jan 25, 2000
Site zurk.netpedia.net

Sentinel is a fast file/drive scanning utility similar to the Tripwire and Viper.pl utilities available. It uses a database similar to Tripwire, but uses a RIPEMD-160bit MAC checksumming algorithm (no patents) which is more secure than the patented MD5 128 bit checksum. It should run on most unixes (tested on redhat linux v6.0 & v5.2, slackware linux v3.x & 4.xb and IRIX (v5.2 and v6.x). Several other utilities which are used for Sentinel development are also posted here. Most utilities are included with the sentinel tarball. gSentinel is a graphical front-end to sentinel. Newbies should download gSentinel as it comes with a very simple rpm based installation and offers a friendly interface. Beware that gSentinel is currently under development and may be fairly crude compared to most GUI packages.

tags | tool, intrusion detection
systems | linux, redhat, unix, irix, slackware
SHA-256 | 9f6315a4b007336f2bc225ce16208ad6f75590dbbc6f0a043a40652e4ee1b013
triplight.tar.gz
Posted Jan 22, 2000
Authored by Snupe | Site linux.rice.edu

Triplight 0.01 - Triplight is an intrusion detection, and integrity monitor system. It is a simpler version of tripwire, developed in perl. This release is rather unpolished (you need to hack up a crontab file, and to set a file path in the perl source), but fully functional. To accomplish it's design goals, it reads in a list of files stored in flat ASCII, and uses md5sum to check their integrity against that recorded earlier in a database. If the database is placed on a read-only medium such as a write-protected floppy, then it should provide an infallible record against remotely installed trojan horses. Thus by monitoring the integrity of the system, triplight will serve as an aid in intrusion detection.

tags | tool, trojan, perl, intrusion detection
systems | unix
SHA-256 | baa51be89fc7c72738e393cfffa962c00a3b094149ca05f7e7fc58cf820b6ea7
watchfile-0.9.tgz
Posted Jan 11, 2000
Authored by Nick 'Zaf' Clifford | Site nrc.co.nz

Watchfile will display a list of specified files on the screen, and continually update their stats. The stats displayed (i.e. file size, modified time, owner, etc.) can be configured on the command-line along with the update frequency.

tags | tool, intrusion detection
systems | unix
SHA-256 | ba0fd45f64df9c7832434769f98fae5f6cc552866915de5efc17504ab8d8b22c
checksums-1.0.tar.gz
Posted Jan 10, 2000
Authored by Mike

Checksums takes a file of predetermined MD5 checksums and compares with the current sum. It can be installed as a command line tool, or as a CGI which will allow you to upload the sums file remotely. In either case it is a useful tool to detect changes in your system files, such as a trojan.

tags | tool, cgi, trojan, intrusion detection
systems | unix
SHA-256 | 96a42c4516d93a85f9e64561995083aa0404bd3dd489339bcc99aca203398fbe
filetraq-0.2.tgz
Posted Jan 4, 2000
Authored by Jeremy Weatherford | Site filetraq.xidus.net

FileTraq is a shell script designed to be run periodically from the root crontab. Each time, it compares a list of system files with the copies that it keeps. Any changes are reported in diff or patchfile style, and dated backup copies are kept. It lets you keep an eye on intruders who might change system files, or other sysadmins who don't tell you about changes. It even helps you keep track of your own changes, along with dated backups.

Changes: Comment lines are now permitted in the config file, wildcard matches are now possible, and entire directories can be checked.
tags | tool, shell, root, intrusion detection
systems | unix
SHA-256 | f2a386b43c40c22d8549ec75a5d54013afc7341827cc5f1f0b0db2eb6989ed99
AIDE 0.5
Posted Jan 2, 2000
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: MD5 sums are now correct. Users must update their databases; they have false sums. With hash library support, you can have many more hash algorithms, and many bugfixes have been made. Note that the author's PGP keys have changed.
tags | tool, intrusion detection
systems | unix
SHA-256 | af2ff14b1282eb4eec684527efc80a5eed6d6aa593bc1deaf750c53c7e858ecf
Page 26 of 37
Back2425262728Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close