BrowserSpy
BrowserSpy will tell you detailed information, like version and support, of
your Browser, JavaScript, JVM, Java, Plugins, Components, Language, Screen,
Hardware, IP, Cookies, Web Server, FTP Password etc....
CVE Vulnerability Search
Engine The ICAT Metabase is a product of the Computer Security Division
at the National Institute of Standards and Technology.
Somar Software (DumpSec, DumpACL,
DumpEvt) As last released by SomarSoft, these utilities are now offered as
FREE utilities for reporting of security, directory, registry, and event
information under Windows NT
ISS Internet Scanner
provides automated security vulnerability detection and analysis for devices
on a network.
Nessus Security Scanner for
Linux, *BSD*, Solaris and NT with different Frontends like Java and GTK
Nmap Nmap ("Network
Mapper") is an open source utility for network exploration or security
auditing. It was designed to rapidly scan large networks, although it works
fine against single hosts.
hping TCP
pinger, can analyse networks and hosts on the TCP Flag level.
queso Queso identifies
operating systems via the TCP packet signature
firewalk Firewalking is a technique that employs
traceroute-like techniques to analyze IP packet responses to determine
gateway ACL filters and map networks.
dnswalk dnswalk
is a DNS database debugger. It works by initiating a zone transfer of a
current zone, inspecting individual records for inconsistencies with other
data, and generating warnings and errors.
CIS Cerberus' Internet Scanner
is a free security scanner.
netcat Swiss Army Knife for TCP and UDP
(like socket). Simple Port Scanner, simple Port redirector and simple access
to sockets from Scripts.
COPS (Computer Oracle
and Password System) a Unix host security tool from Dan Farmer
tiger is a set of scripts
that scan a Un*x system looking for security problems, in the same fashion
as Dan Farmer's COPS.
SARA Security Auditors
Research Assistent, based on the SATAN model
SAINT (Security
Administrator's Integrated Network Tool) is a security assesment tool based
on SATAN.
nemesis is a command-line UNIX network packet injection
suite.
Pandora is a set of tools for testing the security of
Novell Netware
MacAnalysis is a
security auditing suite for your Macintosh to perform and help implement a
security standard for your computer/network by performing a full security
check of network protocols, open services, port scans, vulnerable CGI
scripts and much more.
ngrep
network grep is a pcap-aware tool that will allow you to specify extended
regular expressions to match against data payloads of packets. It currently
recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI and null
interfaces, and understands bpf filter logic in the same fashion as more
common packet sniffing tools, such as tcpdump and snoop.
AIRsnort
is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP
networks. AirSnort operates by passively monitoring transmissions, computing
the encryption key when enough packets have been gathered.
WEPcrack
is a tool that cracks 802.11 WEP encryption keys using the latest discovered
weakness of RC4 key scheduling.
bsd-airtools is a package that provides a complete toolset
for wireless 802.11b auditing.
NetStumbler is a
Windows utility for 802.11b based wireless network auditing written by
Marius Milner.
WaveStumbler
WaveStumbler is console based 802.11 network mapper for Linux. It reports
the basic AP stuff like channel, WEP, ESSID, MAC etc. It has support for
Hermes based cards (Compaq, Lucent/Agere, ... )
OpenCard
Framework is a standard framework announced by an Industry consortium
that provides for interoperable smart cards solutions across many hardware
and software platforms.
Unix
Computer Security Checklist AUSCERT, Australian Computer
Emergency Response Team; 1995; ASCII Text; 89k A comprehensive checklist
for securing your Unix box.
Packets
Found on an Internet Bellovin, Steven M.; 1993; GZip'd
Postscript; 32k A very interesting paper describing the various attacks,
probes, and miscellaneous packets floating past AT&T Bell Labs' net
connection.
Security
Problems in the TCP/IP Protocol Suite Bellovin, Steven M.; 1989;
GZip'd Postscript; 10k A broad overview of problems within TCP/IP
itself, as well as many common application layer protocols which rely on
TCP/IP.
There
Be Dragons Bellovin, Steven M.; 1992; GZip'd Postscript; 58k
Another Bellovin paper discussing the various attacks made on
att.research.com. This paper is also the source for this page's
title.
An
Advanced 4.3BSD IPC Tutorial Berkeley CSRG; date unknown; GZip'd
Postscript; 60k This paper describes the IPC facilities new to 4.3BSD.
It was written by the CSRG as a supplement to the manpages.
NFS Tracing
by Passive Network Monitoring Blaze, Matt; 1992; ASCII Text
Blaze, now famous for cracking the Clipper chip while at Bell Labs, wrote
this paper while he was a PhD candidate at Princeton.
Improving
the Security of your Unix System Curry, David, SRI International;
1990; GZip'd Postscript; 99k This is the somewhat well known SRI Report
on Unix Security. It's a good solid starting place for securing a Unix box.
With
Microscope & Tweezers Eichin & Rochlis; 1989; GZip'd
Postscript.gz; 99k An analysis of the Morris Internet Worm of 1988 from
MIT's perspective.
The COPS
Security Checker System Farmer & Spafford; 1994; GZip'd
Postscript; 45k The original Usenix paper from 1990 republished by CERT
in 1994.
COPS
and Robbers Farmer, Dan; 1991; ASCII Text This paper
discusses a bit of general security and then goes into detail regarding Unix
system misconfigurations, specifically ones that COPS checks for.
A Simple
Active Attack Against TCP Joncheray, Laurent; 1995; GZip'd
Postscript; 90k This paper describes an active attack against TCP which
allows re-direction (hijacking) of the TCP stream.
Foiling
the Cracker Klein, Daniel; GZip'd Postscript; 38k A Survey
of, and Improvements to, Password Security. Basically a treatise on how to
select proper passwords.
A
Weakness in the 4.2BSD Unix TCP/IP Software Morris, Robert T;
1985; GZip'd Postscript; 10k This paper describes the much ballyhooed
method by which one may forge packets with TCP/IP. Morris wrote this in
1985. It only took the media 10 years to make a stink about it!
Covering
Your Tracks Phrack Vol. 4, Issue #43; GZip'd Postscript; 16k
A Phrack article describing the unix system logs and how it is possible to
reduce the footprint and visibility of unauthorized access.
Cracking
Shadowed Password Files Phrack Vol. 5 Issue #46 GZip'd
Postscript; 19k A Phrack article describing how to use the system call
password function to bypass the shadow password file.
Thinking
About Firewalls Ranum, Marcus; Gzip'd Postscript; 30k A
general overview of firewalls, with tips on how to select one to meet your
needs.
An
Introduction to Internet Firewalls Wack & Carnahan for NIST;
Gzip'd Postscript; 600k This is a special publication of the National
Institute of Standards and Technology which provides a solid introduction to
firewalls concepts and uses.
TCP
Wrapper Venema, Wietse; Gzip'd Postscript; 13k Wietse's paper
describing his TCP Wrapper concept, the basis for the TCP Wrappers security
and logging suite.
ID Password Recovery
(IPR) is a tool for recovering passwords on Lotus Notes ID files. It does
this by guessing passwords you supply in a dictionary file.
AppDetective™ for Lotus Domino is a network-based,
penetration testing/vulnerability assessment scanner that locates and assesses
the security strength of database and groupware applications within your
network.
ITtoolbox
Security ITtoolbox Security offers forums for technical discussion, an
integrated directory, white papers and daily news geared towards Security
professionals and users of Security products.
The
Coroner's Toolkit TCT is a collection of programs by Dan Farmer and
Wietse Venema for a post-mortem analysis of a UNIX system after
break-in
Computer Forensics Software TCTUTILs is a collection of
utilities that adds functionality to The Coroners Toolkit and the Autopsy
Forensic Browser
The Autopsy Forensic Browser is a graphical interface to
utilities found in The Coroners Toolkit (TCT) and TCTUTILs. It allows drive
images to be analyzed at a file, block, and inode level. It also allows easy
searches for strings in images.
Network Flight Recorder a
comprehensive, integrated, intrusion detection system that protects networks
and hosts from known attacks, misuse, abuse and anomalies
IT
Grundschutzhandbuch 1998 des Bundesamtes für Sicherheit in der
Informationstechnik (IT Baseline Protection Manual 1998 - Federal Agency
For Security In Information Technology)