what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 701 - 725 of 907 RSS Feed

Intrusion Detection Files

swatch-3.0b1.tar.gz
Posted Aug 17, 1999
Authored by Todd Atkins | Site stanford.edu

Swatch, the Simple Watch Daemon is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.

Changes: Fixed a big bug involving key value assignment when throttling.
tags | tool, intrusion detection
systems | unix
SHA-256 | 4f3ddf8efc4c8d14733cbf56329630704c9634db8183de27fd66a8e745e043a9
sxid_4.0.0.tar.gz
Posted Aug 17, 1999
Authored by Ben Collins

sXid 4.0.0 - sXid is an all in one suid/sgid monitoring program designed to be run from cron on a regular basis. Basically it tracks any changes in your s[ug]id files and folders. If there are any new ones, ones that aren't set any more, or they have changed bits or other modes then it reports the changes in an easy to read format via email or on the command line.

Changes: numerous - see the changelog file.
tags | tool, intrusion detection
systems | unix
SHA-256 | a3f04e067df411fefdaee8387780e06ad8ef04b092c9aceeb3db5593bf7cf9ed
wsm-0.9.5.tgz
Posted Aug 17, 1999
Authored by Dirk G.K. Mueller

WSM: Web based System Monitor v0.9.5 is a Web accessible System Monitor for Linux featuring: Kernel (uname,lsmod,cpuinfo,free), Syslog (syslog, messages), Users (who), Jobs (ps -axjf), Disks (mount, df), Network (netstat -n), Routes (route -n), ISDN (imontty), VBox (vboxadm), IP Accounting (acct).

tags | tool, web, kernel, intrusion detection
systems | linux, unix
SHA-256 | 13c7c87c70c323e967b207179a37f15adab9316838d152758aa007670b14e294
bgcheck-0.4.tar.gz
Posted Aug 17, 1999
Authored by blue

bgcheck 0.4 - bgcheck is a process monitor for Linux written in perl that can be used by administrators to limit the number of background processes that each user can run.

Changes: Fixed major problems handling ftp processes and added exception list for programs.
tags | tool, perl, intrusion detection
systems | linux, unix
SHA-256 | 4ea3fd276015526b4540ed49c613328f3fa64d7c43d1420733bcad9732f258df
ctm-1.0.tar.gz
Posted Aug 17, 1999
Authored by CTM web site

CTM 1.0 is your basic SNMP Traffic Monitor.

tags | tool, intrusion detection
systems | unix
SHA-256 | 7624ca61aba336e49448009450176d30e92f1b403b54f34c850d4ea4d29d119b
ctm-1.1.tar.gz
Posted Aug 17, 1999
Authored by CTM web site

CTM 1.1 is your basic SNMP Traffic Monitor.

tags | tool, intrusion detection
systems | unix
SHA-256 | 44b486ff0504d589ebcc7cbb56ce5f632f965f91fe48544f8ef46e73f7316e6c
emonitor-v-0.6.tar.gz
Posted Aug 17, 1999

emonitor 0.6 is a notification, action-based system for network, system and application monitoring. emonitor includes the following tools: emsrvmsg (Event Monitor Server Message), emsrvcmd (Event Monitor Server Command), emtlog (Event Monitor Transaction Logger), emconsole (Event Monitor Console), emputcmd (Event Monitor Put Command), emputmsg (Event Monitor Put message). The Event Monitor Project

tags | tool, intrusion detection
systems | unix
SHA-256 | 06392e78f87a1200386b6b5070bc3f41658a3f2ba54ea6cb9b36bc987b55d00f
emonitor.lsm
Posted Aug 17, 1999

emonitor description.

tags | tool, intrusion detection
systems | unix
SHA-256 | 15c06ad883c1a0a4141023920aacb71a5605bada59fa44c0f19044cfc9ebde4b
logwatch-1.6.6.tar.gz
Posted Aug 17, 1999
Authored by Kirk Bauer | Site sourceforge.net

LogWatch 1.6.6 is a customizable, pluggable log-monitoring system that analyzes and reports on system logs. It will go through your logs for a given period of time and make a report in the areas that you wish with the detail that you wish. Easy to use - works right out of the package on almost all systems. Now analyzes samba logs.

Changes: fewer unmatched entries in 'secure' service, ftp-messages module prettier, name-lookups now optional for named module, added and improved ProFTPd module, much more.
tags | tool, intrusion detection
systems | unix
SHA-256 | f00e28483aff5ca1d22706f0bceb3feeb0ef9e35859a3d061001a2c506c31ed6
mon-0.38.12.tar.gz
Posted Aug 17, 1999
Authored by Jim Trocki

mon 0.38pre12 - "mon" is an extensible fault detection package which can be used to monitor network and system resources. It is most useful for system and network administrators who are responsible for maintaining the operation of networks of hundreds or possibly thousands of nodes.

Changes: Too many new feature, additions, code cleanups, and bugfixes to list; see the CHANGES file. mon-0.38.12.tar.gz.sign.
tags | tool, intrusion detection
systems | unix
SHA-256 | 293e79531e68e0a3c782899672feea410ac60ef53a32ac25029631884b1ad5d2
mon-0.38.12.tar.gz.sign
Posted Aug 17, 1999

No information is available for this file.

tags | tool, intrusion detection
systems | unix
SHA-256 | 69f1de946740fe97c8b17bc4175cf326b106c3ec9dcc534ba52c3044e1ad3ce0
portsentry-0.90.tar.gz
Posted Aug 17, 1999
Authored by Craig Rowland

PortSentry 0.90 - PortSentry is part of the Abacus Project suite of security tools. It is a program designed to detect and respond to port scans against a target host in real-time. It runs on TCP and UDP sockets and works on most UNIX systems. Advanced stealth detection modes are available under Linux only and detect SYN, FIN, NULL, XMAS, and Oddball packet scans. All modes support real-time blocking and reporting of violations.

Changes: Renamed from Abacus Sentry to PortSentry, lots of internal code clean up and optimizations, Docs updated and it now works under Solaris, Linux, BSD variants and others. portsentry.sample.txt.
tags | tool, udp, tcp, intrusion detection
systems | linux, unix
SHA-256 | 118198b6d7d1b86f9bd19812b5cfc501c83b6dd37fbc16522da713bced76c6f5
portsentry.sample.txt
Posted Aug 17, 1999

No information is available for this file.

tags | tool, intrusion detection
systems | unix
SHA-256 | b6c8bb2fd8500d315b52b37e2521a62a2376b3a64c6e82ed5d924b05206114c5
thor1.0.tar.gz
Posted Aug 17, 1999
Authored by Jerry Kilpatrick

thor.pl 1.0 - thor.pl keeps tabs on suid and sgid files on your file system. It also keeps track of the checksums of your binaries and the root accounts on the system as well as a few other things. It's a handy script that helps you find possible security risks, or breakins.

tags | tool, root, intrusion detection
systems | unix
SHA-256 | 914ebc33c41253d4e3055917392e9096a0c00ba4c74ad1ed38f5da6dc8b910a3
ViperDB-0.7.tar.gz
Posted Aug 17, 1999
Authored by J-Dog

ViperDB 0.7 - ViperDB was created as a smaller and faster option to Tripwire. ViperDB does not use a fancy all-in-one database to keep records. Instead it uses a plaintext db which is stored in each "watched" directory. By using this there is no real one attack point for an attacker to focus his attention on. This coupled with the running of ViperDB every 5 minutes (via cron root job) decreases the likelihood that an attacker will be able to modify your "watched" filesystem while ViperDB is monitoring your system.

Changes: Now logs to a standard logging facility instead of an individual file. Added '-checkstrict' functionality which changes permissions/owner/group back to what they were before the change was made to the file. Added exception(s) to '-checkstrict' which removes all permissions from the changed file if the file originally was SUID/GUID. Changed way filesystem changes are seen by admin, now a change only sends an alert to the logs once instead of repeatedly.
tags | tool, root, intrusion detection
systems | unix
SHA-256 | 20a10dafc49ff9a04a242aa93a489b59045421530611bc2e42c7c17b4c0f2288
lsof_4.43D_W.tar.gz
Posted Aug 17, 1999
Authored by Vic Abell

lsof 4.43 - Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system.

Changes: Corrects a typo in the gcc commentary of 00FAQ, corrects TCP address reporting for Solaris 2.5[.1], enhances Tru64 UNIX IPv6 support, corrects an HP-UX 11 q4 usage error message, fixes a GlibC 2.1 confict in /proc-based Linux lsof, adds f_flag[s] as optional file structure output, improves the HP-UX 11 ipc_s patch test, fixes a real vnode to real inode bug in PTX and adds link count to the output as a filtered option.
tags | tool, intrusion detection
systems | unix
SHA-256 | 75fcdc412d545210ce3ae50293742837a4741cfa9c01b73ac3fc3c8687ab3418
ng.sh
Posted Aug 17, 1999
Authored by Ben-z

ng.sh (netgaurd v1a1) uses tcpdump monitor for common attacks and then activates ipfwadm.

tags | tool, intrusion detection
systems | unix
SHA-256 | 6eec12f70551fb2ed4f635e522c8517f376c837a4ff7f81b587f7fb02a076cf3
slocate-1.5.tar.gz
Posted Aug 17, 1999
Authored by Kevin Lindsay

Secure Locate 1.5 - Secure locate provides a secure way to index and quickly search for files on your system. It uses incremental encoding just like GNU locate to compress its database to make searching faster, but it will also store file permissions and ownership so that users will not see files they do not have access to. It is a bit slower than the GNU locate, but thats the price for security.

Changes: A couple of bug fixes but mostly new features. You can now search using basic POSIX regular expressions. It should also be noted that Redhat 6.0 has switched from GNU Locate to Secure Locate as the default filesystem indexing/searching mechanism.
tags | tool, intrusion detection
systems | unix
SHA-256 | 764177f1abc468ce770cc5616f3ac4452d6abfa866c3af3a87d7bd7abbcd3168
instmon-1.5.tar.gz
Posted Aug 17, 1999
Authored by Vasilis Vasaitis

instmon is a shell script that monitors installations and detects the files that were added or modified.

Changes: Slightly changed the default search list (added /var/lib) and the default exclude list (added /root); instmon now uses $TMPDIR when set; Comparisons between version numbers are now done in a different way, which is more correct for the UN*X world; Fixed to work with RPM >= 2.5.0; Empty directories are now removed even more aggressively; Things are becoming complicated, so the awk command is now required, and instmon has to store some helper scripts (currently one) in /usr/local/lib/instmon.
tags | tool, shell, intrusion detection
systems | unix
SHA-256 | 521890695e1e3662c3decb97e5500bcf11a8d8bc90fb923991451cc518fd3a6a
nettest-1.1.tar.gz
Posted Aug 17, 1999
Authored by Rene Chaddock

nettest 1.1 - Nettest is a program which monitors a network connection, and takes some action (either email, audible notification, syslog entries, or all of the above) if/when the connection goes down. It's great for xDSL/Cable/Mission Critical Network Connections.

Changes: Fixed bug where pingnumber exibited other (unwanted) behaviour, fixed bug which caused nettest to crash under certain situations, more reliable email-sending code, added retrytime variable which allows nettest to try connection more frequently when connection is actually down.
tags | tool, intrusion detection
systems | unix
SHA-256 | f03b646e8857bc2ea97edbc414fc01c6b24b959e70413c879b5a41a6e4916f47
qps-1.7.tar.gz
Posted Aug 17, 1999
Authored by Mattias Engdegard

Qps is a visual process manager, an X11 version of "top" or "ps" that displays processes in a window and lets you sort and manipulate them. Qps can: change nice value of a process, alter the scheduling policy and soft realtime priority of a process, display the TCP/UDP sockets used by a process, and names of the connected hosts, display the memory mappings of the process (which files and shared libraries are loaded where), display the open files of a process, kill or send any other signal to selected processes, display the load average as a graph, and use this as its icon when iconified, show (as graph or numbers) current CPU, memory and swap usage, sort the process table on any attribute (size, cpu usage, owner etc), and does much, much more. UNIX domain sockets are visible in the Files table, SMP support. Very nice GUI. Requires Qt library 1.40 or later and Linux 2.0 or later, or Solaris 2.5.x.

tags | tool, udp, tcp, intrusion detection
systems | linux, unix, solaris
SHA-256 | 1d83a1d39dab62184bc5ea6485ac11f6776d24a9ad455cf3964fd478ae60fbfa
sxid_3.2.5.tar.gz
Posted Aug 17, 1999
Authored by Ben Collins

sXid 3.2.5 - sXid is an all in one suid/sgid monitoring program designed to be run from cron on a regular basis. Basically it tracks any changes in your s[ug]id files and folders. If there are any new ones, ones that aren't set any more, or they have changed bits or other modes then it reports the changes in an easy to read format via email or on the command line.

Changes: added option to specify other than the default mail program, patch to make use of TMPDIR if set.
tags | tool, intrusion detection
systems | unix
SHA-256 | 068e6179bf682f3673760c894d1e11eab45ab5aee0c6aef0b60f1b96c63db3ea
top-3.5beta9.tar.gz
Posted Aug 17, 1999
Authored by William LeFebvre

Top - A Top-CPU Usage Display provides a rolling display of top-CPU using processes on a Unix system. It also displays other information about the overall health of the system, including load averages and memory utilization. Numerous portability patches and optimizations in this release.

tags | tool, intrusion detection
systems | unix
SHA-256 | 638bc036604e6d701edd4c6a4619d2ec23cb08d8dee9963e298806700f3c4d29
treeps-1.1.0.tar.gz
Posted Aug 17, 1999
Authored by George MacDonald

treeps 1.1.0 - Treeps is a X/Motif program for Unix/Linux that is designed to make monitoring and interacting with the running programs on your system easy and intuative. A "real time" tree view shows the relationships between the processes and is color coded to provide easy interpretation of various values. The process tree displays any combination of users/groups and can be used to drill down into process details and then extract key fields for continous monitoring.

Changes: Process Activity "LED's" to show state/load/priority, leader bars to show /group/session leaders, process tips for mouseover glances at key process info, many icon bar changes, color icons, larger and more icons, much more linux info, better user/group selection from group/user tree dialog, std. usage of colors, better auto sizing of window, many layout changes (esp star layout), RPM packages, KDE install script, man/strace/renice processes, renice subtree, single click kill, and many bug fixes.
tags | tool, intrusion detection
systems | linux, unix
SHA-256 | 456da1b8f5821d0061320f1ce721fe1e3c93d1caaa90f37cb0f8def363326f32
watchdog-4.5.tar.gz
Posted Aug 17, 1999
Authored by Michael Meskes

watchdog is a daemon that monitors systems processes and loads, and will automatically reboot a server if the load rises above a defined level. Very useful tool.

tags | tool, intrusion detection
systems | unix
SHA-256 | a3eab8779d5aa45bf0bf0bd1e8944d01f8b02b7e01f1460938364a6c878dc5fe
Page 29 of 37
Back2728293031Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close