exploit the possibilities
Showing 651 - 675 of 791 RSS Feed

Intrusion Detection Files

dirwatch101.c
Posted Aug 17, 1999
Authored by Ajax

dirwatch101 monitors a directory and all the files in it for any changes, any files that have new data added to them, that data logged to a file.

tags | tool, intrusion detection
systems | unix
MD5 | 169413ea791c3b169daba6b03e99bcea
lsof_4.40_W.tar.gz
Posted Aug 17, 1999
Authored by Vic Abell

Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system.

Changes: Corrected problems with large device number handling for 64 bit Solaris 7, added more /dev/kmem-based Linux glibc evasions and some bugs have been fixed.
tags | tool, intrusion detection
systems | unix
MD5 | 01cc0f15f47481fa7e247486a730f5ff
nettest0.8.tar.gz
Posted Aug 17, 1999
Authored by Rene Chaddock

nettest v0.8 - Nettest is a program that monitors a network connection, and takes some action (either email, audible notification, syslog entries, or all of the above) if/when the connection goes down. 14k.

tags | tool, intrusion detection
systems | unix
MD5 | ad45289c085069ac61134c81d7d235cd
nettest0.81.tar.gz
Posted Aug 17, 1999
Authored by Rene Chaddock

nettest v0.81 - Nettest is a program that monitors a network connection, and takes some action (either email, audible notification, syslog entries, or all of the above) if/when the connection goes down.

tags | tool, intrusion detection
systems | unix
MD5 | 235ad0c2475342fffb59015b8388f28c
tmp-audit.tar.gz
Posted Aug 17, 1999
Authored by Proof Of Concept

tmp-audit is a tool designed to log directory changes (i.e /tmp). This release includes a signal-oriented interface instead sleep().

tags | tool, intrusion detection
systems | unix
MD5 | 4c8e94167bb2a9c5d2716be718c3dee8
traffic-vis-0.30.tar.gz
Posted Aug 17, 1999
Authored by Damien Miller

traffic-vis v0.30 - traffic-vis is a network monitoring/auditing tool that can plot communications between hosts on a TCP/IP network, and quickly answer questions such as Who is saturating your Internet link. This version is a major rewrite, splitting the program up into several smaller tools. 40k.

tags | tool, tcp, intrusion detection
systems | unix
MD5 | ded93d0ff3b59bf70abac936e748e45e
traffic-vis-0.31.tar.gz
Posted Aug 17, 1999

traffic-vis-0.31.tar.gz

tags | tool, intrusion detection
systems | unix
MD5 | b2f08d0c0bc2a3009e598e5fa190cbd0
traffic-vis-0.32.tar.gz
Posted Aug 17, 1999
Authored by Damien Miller

traffic-vis is a network monitoring/auditing tool that can plot communications between hosts on a TCP/IP network, and quickly answer questions such as Who is saturating your Internet link. This version is a major rewrite, splitting the program up into several smaller tools. 40k.

tags | tool, tcp, intrusion detection
systems | unix
MD5 | aef963ed47a5fb803dcf64a5ddcca87d
watchdog-4.3.tar.gz
Posted Aug 17, 1999
Authored by Michael Meskes

watchdog is a daemon that monitors systems processes and loads, and will automatically reboot a server if the load rises above a defined level. Very useful tool. 98k.

tags | tool, intrusion detection
systems | unix
MD5 | 026e5294b17146023cf11b168d437e9f
icmpmon.c
Posted Aug 17, 1999
Authored by CyberPsychotic

icmpmon will show you all ICMP packets reaching your box, which could be useful in detecting attacks/portscans sometimes.

tags | tool, intrusion detection
systems | unix
MD5 | d5afe56be732dcec59d8890f134620f6
instmon-1.4.tar.gz
Posted Aug 17, 1999
Authored by Vasilis Vasaitis

instmon v1.4 - instmon is a shell script that monitors installations and detects the files that were added or modified.

tags | tool, shell, intrusion detection
systems | unix
MD5 | 4d34efd29c813828f938a771eacd8a1b
logwatch-1.6.1.tar.gz
Posted Aug 17, 1999
Authored by Kirk Bauer

logwatch v1.6.1 - Analysis of and report on system logs - LogWatch is a customizable, pluggable log-monitoring system. It will go through your logs for a given period of time and make a report in the areas that you wish with the detail that you wish. Easy to use - works right out of the package on almost all systems. Now analyzes samba logs!

tags | tool, intrusion detection
systems | unix
MD5 | 6b08bbbe752310b702d3cd8e97ed8800
logwatch-1.6.3.tar.gz
Posted Aug 17, 1999

LogWatch is a customizable, pluggable log-monitoring system. Easy to use and highly configurable. Now analyzes samba logs!

tags | tool, intrusion detection
systems | unix
MD5 | 471214d809eeccee70f4515e70e593fe
logwatch-1.6.4.tar.gz
Posted Aug 17, 1999

LogWatch is a customizable, pluggable log-monitoring system. Easy to use and highly configurable. Now analyzes samba logs!

tags | tool, intrusion detection
systems | unix
MD5 | efba2db1b27075be80395858ce1ea883
mat-0.18.tar.gz
Posted Aug 17, 1999
Authored by S. Mark Black

MAT v0.18 - MAT is a distributed monitoring and management tool for Linux, SGI, SunOS, and Solaris machines. The tool provides an easy to use GUI interface from which the sysadmin, or designated user can administer many of the common UNIX configuration files. MAT can monitor many system parameters, producing usage graphs, and triggering alarms. The current release of the tool can add modify and delete: Users, Hosts, Groups, Mounts, Motd, DNS client config, Services, Aliases, Cron jobs, Syslog config, NFS exports, DNS records, and NIS maps. Monitoring functions allow you to inspect: Syslog files, Routing tables, disk space, exports and processes. MATd is a GUI configurable system monitoring daemon. It currently can monitor: Disk use, Network connectivity, CPU use, Run-queue, Logins, SMTP daemons, FTP servers and Required processes. On Linux machines it also produces graphs of memory and swap use. New to this release is the ability to discover all the parameters, memory, cpu, swap etc automatically. MATd can also run user provided scripts if a threshold is exceeded, notifing the administrator of potential problems. Key features: control many hosts from a single console, ability to deligate responsibility to others, monitor several system parameters for trend analysis, DNS, and NIS servers are easliy managed. New this release: hooks to allow users to extend the program, automatic discovery of parameters it can monitor, bug fixes, much more. 1727k.

tags | tool, intrusion detection
systems | linux, unix, solaris
MD5 | 62f3a9d2e292bcf3ec689085e276b40c
netbusd.c
Posted Aug 17, 1999
Authored by BigDawg

A UNIX clone of Netbuster for Windows 95. Logs people attempting to exploit netbus.

tags | tool, intrusion detection
systems | windows, 9x, unix
MD5 | bd0bce4c55db3aeec2f2e0f404f5d2e7
autobuse-snap915639608.tar.gz
Posted Aug 17, 1999
Authored by Grant Taylor

Autobuse is Perl daemon which identifies probes and the like in logfiles and automatically reports them via email. Supports monitoring of Linux 2.0 ipfw and Apache logfiles.

tags | tool, perl, intrusion detection
systems | linux, unix
MD5 | e72e0946d4b61ee6000fec331c5a17b3
ears-0.7.tar.gz
Posted Aug 17, 1999
Authored by Tishina Syndicate

EARS (Emergency Audit Response System) v0.7 - EARS is a console tool designed to detect, monitor and respond to annomalies (such as intrusions) in real time. It offers complete control of the process table, filesystem(s) and network interface(s) maintained by the operating system. Autonomous functionality is optional as a separate module.

tags | tool, intrusion detection
systems | unix
MD5 | b930fa48b3ad122aeb0b95a61563e2a7
qps-1.6.tar.gz
Posted Aug 17, 1999
Authored by Mattias Engdegard

Qps is a visual process manager, an X11 version of "top" or "ps" that displays processes in a window and lets you sort and manipulate them. Qps can: change nice value of a process, alter the scheduling policy and soft realtime priority of a process, display the TCP/UDP sockets used by a process, and names of the connected hosts, display the memory mappings of the process (which files and shared libraries are loaded where), display the open files of a process, kill or send any other signal to selected processes, display the load average as a graph, and use this as its icon when iconified, show (as graph or numbers) current CPU, memory and swap usage, sort the process table on any attribute (size, cpu usage, owner etc), and does much, much more. UNIX domain sockets are visible in the Files table, SMP support. Very nice GUI. Requires Qt library 1.40 or later and Linux 2.0 or later, or Solaris 2.5.x.

tags | tool, udp, tcp, intrusion detection
systems | linux, unix, solaris
MD5 | 9055eb67beeb4f26cd185755617be642
dtk-1999-01-07.tar
Posted Aug 17, 1999
Authored by Fred Cohen and Associates

Deception Toolkit v1999-01-07 - DTK simply listens for inputs and provides responses that seem normal (i.e., full of bugs). In the process, it logs what is being done, provides sensible (if not quite perfect) answers, and lulls the attacker into a false sense of (your) insecurity. Has too many great features to list here, so check out The Deception Toolkit Home Page. DTK v1999-01-07 makes several minor improvements and contains some minor bugfixes.

tags | tool, intrusion detection
systems | unix
MD5 | 4c0030b526823e9c992114353551fb32
step.htm
Posted Aug 17, 1999

Eight Steps to A Working Intrusion Detection System - The SANS Institute. Preface and instructions for STEP package below.

tags | tool, intrusion detection
systems | unix
MD5 | c880c48f3099b3cb999cf34e2e224ffd
watchdog-4.2.tar.gz
Posted Aug 17, 1999
Authored by Michael Meskes

watchdog is a daemon that monitors systems processes and loads, and will automatically reboot a server if the load rises above a defined level. Very useful tool. 98k.

tags | tool, intrusion detection
systems | unix
MD5 | 2b8061871a0f1dbd24967c975b66b8ff
clobberd-4.3-1.tar.bz2
Posted Aug 17, 1999
Authored by Jason Nunn

User/Resource Monitor. Used to keep tabs on users.

tags | tool, intrusion detection
systems | unix
MD5 | 042a2b284c49537a75b6fa2d1d7e32a0
dtk-0.9.tar
Posted Aug 17, 1999
Authored by Fred Cohen and Associates

The Deception ToolKit (DTK) is a toolkit designed to give defenders a couple of orders of magnitude advantage over attackers. We use deception to counter attacks. In the case of DTK, the deception is intended to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities. DTK's deception is programmable, but it is typically limited to producing output in response to attacker input in such a way as to simulate the behavior of a system which is vulnerable to the attackers method. V0.9 introduces the fake operating system name to the configure file and appropriate changes to deceptions to include this deception throughout the distribution. It also does automatic configuration of the secure Web server (thttpd) and generic.c and support for SCO Unix. 1.1MB.

tags | tool, web, vulnerability, intrusion detection
systems | unix
MD5 | f10ae74d52935f3aec9f9e30a8aff8f0
instmon-1.3.tar.gz
Posted Aug 17, 1999
Authored by Vasilis Vasaitis

instmon v1.3 - instmon is a shell script that monitors installations and detects the files that were added or modified.

tags | tool, shell, intrusion detection
systems | unix
MD5 | 0b27b1ae6f11656b9332449453696aca
Page 27 of 32
Back2526272829Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    2 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    16 Files
  • 13
    Feb 13th
    19 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    33 Files
  • 21
    Feb 21st
    4 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close