exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 244 RSS Feed

Files

snort-2.1.0.tar.gz
Posted Dec 29, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Fixed bugs and added signatures.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 0bb7a8d015a1f2cc56d65197e31374fa0fec10870324898559b13a6b6923f7c4
mysecrep.gz
Posted Dec 29, 2003
Authored by Bart Somers | Site doornenburg.homelinux.net

mysecrep version 0.8 generates an audit-report from the syslog messages from snort, pcds and samhain, thus covering a whole range of security-tools, packed in 1 report. The report written is to disk and send via email. Written in Perl.

Changes: Cleaned up snort reporting, making it more flexable to extend or modify. Modified the file mask settings.
tags | tool, perl, sniffer
SHA-256 | 0df458bec8eacdea74ecd5c7d843a9bce89a4fe855d42ea37e933e4ea92037f3
iamdohv1.tgz
Posted Dec 23, 2003
Authored by Mark Osborne

i-am-doh is a utility that filters approximately 75% of all false-positives given by an IDS. It uses existing reliable tools like Nmap, Nessus, and Amap to validate IDS alerts based on the following criteria and techniques: OS identification, service identification, port scanning, vulnerability scanning, online CVE and bug interpretation, and server importance weighting.

tags | tool, sniffer
SHA-256 | 8240812efc3fddb3c130b13349ca734da19a96a92366c88e4e6aa21be0bd7fd3
FLoP-1.0.6.tar.gz
Posted Dec 18, 2003
Authored by DG | Site geschke-online.de

FLoP is utility designed to gather alerts with a payload from distributed Snort sensors at a central server, and to store them in a database. Both PostgreSQL and MySQL are currently supported. High priority alerts may be sent out via e-mail.

tags | tool, sniffer
SHA-256 | 18adeaf982dc57c0ae442afb3815fc04ee7c432a62e9688ccb674a4955dfd542
MIDAS-2.1a.tar.gz
Posted Dec 3, 2003
Site midas-nms.sourceforge.net

MIDAS NMS is a configurable web based network monitoring and network intrusion detection server. It uses a distributed client/server model that allows it to scale to very large networks, and features highly optimized Snort support that dramatically reduces the overhead of both the Snort Sensor and the alert data repository. Also supports Netsaint/Nagios plugins and Big Brother clients, allowing for easy migration.

Changes: Web interface was completely rewritten and much improved. The requirement of rrdtool was removed. Internal SQL tables and PHP functions are now used to produce graphs. Several major and minor bugs were fixed.
tags | tool, web, sniffer
SHA-256 | 2655edc70bf23696df70dc487fa99dd751550a133361135e178e2fad1208738d
oinkmaster-0.9.tar.gz
Posted Dec 3, 2003
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

Changes: Bug fixes.
tags | tool, perl, sniffer
systems | bsd
SHA-256 | d9d006ffdb368ee6a413eee32caca7b7ee7d284108b1ec37da8cf1b7fb9bd40c
snort-2.0.5.tar.gz
Posted Nov 21, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Stream4 fixes from Andrew Rucker Jones. Allow memcap to be configured for threshold features.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | a9d3059d1855779a06ffff9856c3179ae8d49e99a95d8a6c3cb5d6cbe3fa9246
snort-2.0.4.tar.gz
Posted Nov 7, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Fixed a core dump introduced with 2.0.3 when dealing with negated patterns. Users are encouraged to upgrade.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | ef81483f56be012cb92de708bc8967579d816d400c7043c4a4cd78e3671c78ea
snort-2.0.3.tar.gz
Posted Nov 5, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: RPMs can now be made by running rpmbuild against the tarball. Various bug fixes.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 16602f22eaadbc4ebb4fb1c76080251e9d4f5966ce99376dfbd2421badbdaa22
snort-2.0.2.tar.gz
Posted Sep 18, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Added Thresholding and Suppression features, Fixed TCP RST processing bug, Cleanup of spp_arpspoof, Cleanup of win32 version including proper Event Log support, and munged data fixes for stream4.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 0ab456f9eb81241cacff3102350ca2d3d01b129d6cc59541457ba3b94e221918
incident-2.8.tar.gz
Posted Sep 4, 2003
Authored by Viraj Alankar | Site bigfoot.com

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: Various bug fixes.
tags | tool, remote, sniffer
SHA-256 | 24ec86fb42b9495fa5464f6fc03e66bab5a330c3cefadf3038ba8823739444bd
oinkmaster-0.8.tar.gz
Posted Sep 4, 2003
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

tags | tool, perl, sniffer
systems | bsd
SHA-256 | 493788e7014c2411f59303da651df64e9f1ada3b98bd567a9f8b3129aa61996e
idscenter11rc4.zip
Posted Aug 5, 2003
Authored by Ueli Kistler | Site engagesecurity.com

IDScenter is a control and management front-end for the Windows platform. Main features: Snort 2.0/1.9/1.8/1.7 support, Snort service support, Snort configuration wizard, Rule editor, AutoBlock plugins (Network ICE BlackICE Defender plugin included (Delphi, open-source), Plugin framework for Delphi included), MySQL alert detection & file monitoring, e-mail alerts / alarm sound alerts / visual notification, etc.

Changes: AlertMail fixed, code audit completed, various other bug fixes.
tags | tool, sniffer
systems | windows
SHA-256 | 6e63a96e3d7b640463f315ba5db36b317a35ea578991fa75ab4ad69acbba59f5
snort-2.0.1.tar.gz
Posted Jul 24, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Fixed host endianness problem in UDP decoder, VLAN decoding fixes from Michael Pomraning, add edtcp state checking to httpflow, added window detection plugin documentation to manual, lots of new rules and tons of new rule documentation, and more documented in the changelog.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | b788871c0f91201b1a31c1f00aaa9c66675d601621475bdce6d1b47247ca04f4
idscenter11rc3.zip
Posted Jun 17, 2003
Authored by Ueli Kistler | Site engagesecurity.com

IDScenter is a control and management front-end for the Windows platform. Main features: Snort 2.0/1.9/1.8/1.7 support, Snort service support, Snort configuration wizard, Rule editor, AutoBlock plugins (Network ICE BlackICE Defender plugin included (Delphi, open-source), Plugin framework for Delphi included), MySQL alert detection & file monitoring, e-mail alerts / alarm sound alerts / visual notification, etc.

Changes: Snort 2.0 Support and more.
tags | tool, sniffer
systems | windows
SHA-256 | f9b7423c7841bf496874eb4b6958f826ddcecd9c8631065cef6dfd7aa797770e
snort.tshirt.txt
Posted Jun 3, 2003
Site snort.org

Snort is giving away free t-shirts for writing rules. Gets yours today.

tags | tool, sniffer
SHA-256 | f8789fd7432e8330b4af0cc468f682831b8f4a00d5b5f64cbae23771e0386080
snort-2.0.0.tar.gz
Posted Apr 15, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Enhanced high-performance detection engine, Stateful Pattern Matching, An external third party professional security audit funded by Sourcefire (http://www.sourcefire.com), Many new and updated rules, Enhancements to self preservation mechanisms in stream4 and frag2, State tracking fixes in stream4, New HTTP flow analyzer, Enhanced protocol decoding (TCP options, 802.1q, etc), Enhanced protocol anomaly detection (IP, TCP, UDP, ICMP, RPC, HTTP), etc.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | e999b6f20d456b2c36e296b3b89b341e162532a0fad2cd446bfeff0cecdbb396
snort-1.9.1.tar.gz
Posted Mar 4, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: A remote root vulnerability in the RPC fragment normalization code has been fixed in this stable release. Fixed some bugs and added new options. Full changelog including cvs available here.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 266b623ca81c4075039f1d2bc8e0ec7b777378ddccdf4dabf93f313693ec5985
idscenter11rc1.zip
Posted Feb 11, 2003
Authored by Ueli Kistler | Site packx.net

IDScenter is a control and management front-end for the Windows platform. Main features: Snort 1.9/1.8/1.7 support, Snort service support, Snort configuration wizard, Rule editor, AutoBlock plugins (Network ICE BlackICE Defender plugin included (Delphi, open-source), Plugin framework for Delphi included), MySQL alert detection & file monitoring, e-mail alerts / alarm sound alerts / visual notification, etc.

Changes: Fixed Stream4, Frag2 preprocessors setup, and minor bugs.
tags | tool, sniffer
systems | windows
SHA-256 | 69cbc9866723c2a52f2fe4ea7f68cc35f117253d649d9afa4245f43c1d6680a7
incident-2.4.tar.gz
Posted Dec 29, 2002
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: Incident entries reported from WHOIS servers such as RIPE now take priority over other email addresses listed in the same WHOIS output.
tags | tool, remote, sniffer
SHA-256 | 94727682cc12dced9d7ffa50e8436c87b0d5e89def9f32c37727cfcad072daef
idscenter109b23.zip
Posted Dec 18, 2002
Authored by Eclipse | Site packx.net

IDScenter is a control and management front-end for Windows platform. Main features: Snort 1.9/1.8/1.7 support, Snort service support, Snort configuration wizard, Rule editor, AutoBlock plugins (Network ICE BlackICE Defender plugin included (Delphi, open-source), Plugin framework for Delphi included), MySQL alert detection & file monitoring, e-mail alerts / alarm sound alerts / visual notification, etc.

Changes: Working setup package, Delphi libraries compiled in program, Plugin framework update, and small fixes.
tags | tool, sniffer
systems | windows
SHA-256 | 3e34cc0d12317b233581fcb0f47de17fb2333adc34a812338c0767ba5ffc2916
idscenter109b22.zip
Posted Dec 11, 2002
Authored by Ueli Kistler | Site packx.net

IDScenter is a free configuration and management GUI for Snort IDS on Windows platform. Features: Snort 1.9 / 1.8 / 1.7 support, Snort service mode support, Snort configuration wizard (Variables, Preprocessor plugins, Output plugins, Rulesets), Ruleset editor (supports all Snort 1.9.1 rule options), AutoBlock plugin support (ISS NetworkICE BlackICE Defender plugin included, Delphi framework too), Alert notification (via e-mail, alarm sound or only visual notification), Test configuration* feature (fast testing of your IDS configuration), Monitoring of up to 10 files and MySQL alert detection (allows centralized monitoring of all Snort sensors), Log rotation* (compressed archiving of log files), Integrated log viewer, Program execution if an attack was detected, and more.

tags | tool, sniffer
systems | windows
SHA-256 | 3a88ed36a87e041f420709ee0d0fae0a1a24a406dd662453951cce94c79db13b
snortctl.tar.gz
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site aenigma.mediaservice.net

A suite of scripts that were originally part of the AEnigma DIDS Project. The script snortctl is for management of the Snort NIDS. The snortfilter is a log parser and colorized.

tags | tool, sniffer
SHA-256 | a20e34b031a3b811e776cf26ef2b23b8da7a07a37c0d686dcea96aab426d35a4
snort-1.9.0.tar.gz
Posted Oct 4, 2002
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: New stable release with a large number of enhancements and bug fixes. This is the first release to use the "flow" keyword. Full changelog available here.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 405a94e8fcc2629b63d6e303d88e32b16e4fd2363154cf2d02bd4de74d10d041
incident-2.3.tar.gz
Posted Aug 30, 2002
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: When showing an excerpt of logs, the number of matching lines is now shown to express the severity of attack. A bug was also fixed that would consider certain FQDNs as IPs.
tags | tool, remote, sniffer
SHA-256 | 6e06ce57e9567b7f857f438a20ef6cfa6911fe8497fa14aeee9a0fdeefb081d4
Page 6 of 10
Back45678Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Proposed Underwater Datacenter Surprises Regulators Who Hadn't Heard About It
Posted Sep 11, 2024

tags | headline, government, usa
When You Pay A Ransom And The Decryptor Doesn't Work
Posted Sep 11, 2024

tags | headline, hacker, privacy, malware, cybercrime, data loss, fraud, cryptography
Electronic Payment Firm Slim CD Notifies 1.7M Customers Of Data Breach
Posted Sep 10, 2024

tags | headline, hacker, privacy, data loss
Crypto Scams Rake In $5.6B A Year For Lowlifes, FBI Says
Posted Sep 10, 2024

tags | headline, hacker, cybercrime, data loss, fraud, fbi, cryptography
Microsoft Hosting Cybersecurity Summit After Global IT Outage
Posted Sep 10, 2024

tags | headline, microsoft, denial of service
WhatApp's View Once Could Be View Whenever Due To A Flaw
Posted Sep 10, 2024

tags | headline, privacy, flaw, facebook, social
CISA Breaks Silence On Controversial Airport Security Bypass Vulnerability
Posted Sep 10, 2024

tags | headline, government, usa, flaw, terror
Russia's Top Secret Military Unit Reportedly Plots Undersea Cable Sabotage
Posted Sep 10, 2024

tags | headline, government, russia, denial of service, cyberwar, spyware, military
COLDRIVER Crooks Take Pro Democracy NGOs For A Phishy Ride
Posted Sep 9, 2024

tags | headline, government, usa, russia, fraud, cyberwar, password, phish
Cisco Merch Shoppers Stung In Magecart Attack
Posted Sep 9, 2024

tags | headline, hacker, bank, cybercrime, fraud, cisco, backdoor
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close