IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.
641e93d516beedb82ea6902b76db51746176efd1b8b6af86814ac320d254e928
Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.
8bf8e3b872213e4163fd59634e0c8dfc3bcbce81475eb64f98d60c4c412e17a2
scanssh scans a list of addresses and networks for running SSH servers and their version numbers. scanssh supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH servers in a company or the Internet as whole.
dea74cadaa62163da15179dd4adde921a04558ba70c745ded0f711eb3855cb2c
JCon is a security-scanner and brute-force password breaking tool. It can scan ports, FTP and mailer daemons, and check for CGI-vulnerabilities. It is easy to use, platform independent, easily extensible, and can perform all of its actions on lists of hosts/IP addresses.
7244acfc42f36e6377508386df6cc968becd83fefb2b37f1dc90dccc9abe4a61
CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. No user info is transmitted, so it can be used as an anonymous proxy. HTTP and FTP are supported. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, encoded target URLs, configuration by end user, and more.
16a82decd7d2a13d783b9183bf22a87111d9b3a05d046f3f94a62265d0ac3f09
CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. No user info is transmitted, so it can be used as an anonymous proxy. HTTP and FTP are supported. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, encoded target URLs, configuration by end user, and more.
b2efb05a707055a5d76b3c8719b1bc00d5b0e290888710de309f359046732b1e
The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.
8459d7e1cf4d16f4d2535b7dda2ad49323ca89bb88f90460854bfc02ec8f92ce
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.
668359b668a71b61438b1ab2f12daabe3a31ac1b11e9dd4fdf840819bce81d6a
ViperDB is a file checker. It is meant to be run from cron on a regular basis in order to monitor strange activity on a system. It supports checking of size, mtime, privileges, UID/GID, added/deleted files, and (as of 0.9.3) MD5 checksums. Data isn't stored in a single archive as in tripwire, but is split among all the monitored directories. This ViperDB is in fact a fork of the original, as the original authors seem unreachable.
3cb38576519cd7ae00a09aa9a3652653cfedf7ce8409a1a400538db02dec7f83
Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.
e94ae7b2a89c6c5bfc488323fd1ba584c1d611ac791bd59ea4cfbca64eaf78a5
Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.
9c006f636dee28f206c1de0a15c1ca9a6555ee2b7b2d7b6856afe8387cf0a925
Debian Security Advisory DSA-035-1 - Man2html contains a remote denial of service attack which can use up all available memory. Upgrade to the newest version.
e1d95320a78e84c88163ab91bc64bc8646142fd453c2345eb8145bc1994fee3d
Debian Security Advisory DSA-034-1 - When eperl is installed setuid root, it can switch to the UID/GID of the scripts owner. Although Debian doesn't ship the program setuid root, this is a useful feature which people may have activated locally. When the program is used as /usr/lib/cgi-bin/nph-eperl the bugs could lead into a remote vulnerability as well.
02eaa849d2cade62ea6b294233b6e1c1e2966df90f5ce3308c20a07b5f1becbc
Debian Security Advisory - A buffer overflow in all versions of Analog except 4.16 has been discovered in the ALIAS command. This bug is particularly dangerous if the form interface (which allows unknown users to run the program via a CGI script) has been installed.
371f662494b07e9ace10facbbd3f19648ed19a75fee11836cbce0414e3320918