Date: Jan 31 2001 08:39:28 EST
From: [EMAIL PROTECTED]
Subject: Re: [redewan] En: Dial Backup


Pode interessar......

[ ]�s

Leandro Guimar�es
Analista de Suporte
AGA S.A.
Tel: (0xx21) 546-1014 ext:227
Fax:(0xx21) 543-1279
email: [EMAIL PROTECTED]
                           Top 50 Security Tools




 Nessus                                       http://www.nessus.org/



                                              Description: Remote network
security auditor, the      
                                              client The Nessus Security
Scanner is a security       
                                              auditing tool. It makes possible
to test security      
                                              modules in an attempt to find
vulnerable spots that    
                                              should be fixed. . It is made up
of two parts: a       
                                              server, and a client. The
server/daemon, nessusd, is   
                                              in charge of the attacks, whereas
the client, nessus,  
                                              interferes with the user through
nice X11/GTK+         
                                              interface. . This package
contains the GTK+ 1.2        
                                              client, which exists in other
forms and on other       
                                              platforms, too.







 Netcat                                  http://www.l0pht.com/~weld/netcat/



                                         Note: This is an unofficial site

                                         Description: TCP/IP swiss army knife A
simple Unix utility  
                                         which reads and writes data across
network connections      
                                         using TCP or UDP protocol. It is
designed to be a reliable  
                                         "back-end" tool that can be used
directly or easily driven  
                                         by other programs and scripts. At the
same time it is a     
                                         feature-rich network debugging and
exploration tool, since  
                                         it can create almost any kind of
connection you would need  
                                         and has several interesting built-in
capabilities.          






 Tcpdump                                      http://www.tcpdump.org/



                                              Description: A powerful tool for
network monitoring    
                                              and data acquisition This program
allows you to dump   
                                              the traffic on a network. It can
be used to print out  
                                              the headers of packets on a
network interface that     
                                              matches a given expression. You
can use this tool to   
                                              track down network problems, to
detect "ping attacks"  
                                              or to monitor the network
activities.                  






 Snort                                        http://www.snort.org/



                                              Description: flexible packet
sniffer/logger that       
                                              detects attacks Snort is a
libpcap-based packet        
                                              sniffer/logger which can be used
as a lightweight      
                                              network intrusion detection
system. It features rules  
                                              based logging and can perform
content                  
                                              searching/matching in addition to
being used to detect 
                                              a variety of other attacks and
probes, such as buffer  
                                              overflows, stealth port scans,
CGI attacks, SMB        
                                              probes, and much more. Snort has
a real-time alerting  
                                              capability, with alerts being
sent to syslog, a        
                                              separate "alert" file, or even to
a Windows computer   
                                              via Samba.







 Saint                                     http://www.wwdsi.com/saint/



                                           Description: SAINT (Security
Administrator's Integrated   
                                           Network Tool) is a security
assesment tool based on       
                                           SATAN. Features include scanning
through a firewall,      
                                           updated security checks from CERT &
CIAC bulletins, 4     
                                           levels of severity (red, yellow,
brown, & green) and a    
                                           feature rich HTML interface.







 Ethereal                                     http://ethereal.zing.org/



                                              Description: Network traffic
analyzer Ethereal is a    
                                              network traffic analyzer, or
"sniffer", for Unix and   
                                              Unix-like operating systems. It
uses GTK+, a graphical 
                                              user interface library, and
libpcap, a packet capture  
                                              and filtering library.





                                                                
 Whisker    http://www.wiretrip.net/rfp/p/doc.asp?id=21&iface=2 
                                                                
            Description: Rain.Forest.Puppy's excellent CGI      
            vulnerability scanner                               
                                                                


                                                              
 Internet Security Scanner         http://www.iss.net/        
                                                              
                                   Note: This tool costs      
                                   significant $$$ to use,    
                                   and does not come with     
                                   source code.               
                                   Description: A popular     
                                   commercial network         
                                   security scanner.          
                                                              




 Abacus Portsentry
http://www.psionic.com/abacus/portsentry/                   


                                         Description: Portscan detection daemon
PortSentry has the   
                                         ability to detect portscans(including
stealth scans) on the 
                                         network interfaces of your machine.
Upon alarm it can block 
                                         the attacker via hosts.deny, dropped
route or firewall      
                                         rule. It is part of the Abacus program
suite. . Note: If    
                                         you have no idea what a port/stealth
scan is, I'd recommend 
                                         to have a look at
http://www.psionic.com/abacus/portsentry/ 
                                         before installing this package.
Otherwise you might easily  
                                         block hosts you'd better not(e.g. your
NFS-server,          
                                         name-server, ...).







 DSniff
http://naughty.monkey.org/~dugsong/dsniff/                     


                                      Description: A suite of powerful for
sniffing networks for     
                                      passwords and other information. Includes
sophisticated        
                                      techniques for defeating the "protection"
of network           
                                      switchers.







 Tripwire                                     http://www.tripwire.com/



                                              Note: Depending on usage, this
tool may have expensive 
                                              licensing feesassociated with it.

                                              Description: A file and directory
integrity checker.   
                                              Tripwire is a tool that aids
system administrators and 
                                              users in monitoring a designated
set of files for any  
                                              changes. Used with system files
on a regular (e.g.,    
                                              daily) basis, Tripwire can notify
system               
                                              administrators of corrupted or
tampered files, so      
                                              damage control measures can be
taken in a timely       
                                              manner.







 Cybercop Scanner
http://www.pgp.com/asp_set/products/tns/ccscanner_intro.asp    


                                  Note: This tool costs significant $$$ to use,
and does not     
                                  come with source code. A powerful demo
version is available    
                                  for testing.

                                  Description: Another popular commercial
scanner                




                                            
 Hping2 http://www.kyuzz.org/antirez/hping/ 
                                            
        Description: hping2 is a network    
        tool able to send custom            
        ICMP/UDP/TCP packets and to display 
        target replies like ping does with  
        ICMP replies. It handles            
        fragmentation and arbitrary packet  
        body and size, and can be used to   
        transfer files under supported      
        protocols. Using hping2, you can:   
        test firewall rules, perform        
        [spoofed] port scanning, test net   
        performance using different         
        protocols, packet size, TOS (type   
        of service), and fragmentation, do  
        path MTU discovery, tranfer files   
        (even between really Fascist        
        firewall rules), perform            
        traceroute-like actions under       
        different protocols, fingerprint    
        remote OSs, audit a TCP/IP stack,   
        etc. hping2 is a good tool for      
        learning TCP/IP.                    
                                            




 SARA                                       http://www-arc.com/sara/



                                            Description: The Security Auditor's
Research Assistant   
                                            (SARA) is a third generation
security analysis tool that 
                                            is based on the SATAN model which
is covered by the GNU  
                                            GPL-like open license. It is
fostering a collaborative   
                                            environment and is updated
periodically to address       
                                            latest threats.







 Sniffit
http://reptile.rug.ac.be/~coder/sniffit/sniffit.html            


                                     Description: packet sniffer and monitoring
tool sniffit is a    
                                     packet sniffer for TCP/UDP/ICMP packets.
sniffit is able to     
                                     give you very detailed technical info on
these packets (SEC,    
                                     ACK, TTL, Window, ...) but also packet
contents in different    
                                     formats (hex or plain text, etc. ).







 SATAN                                       http://www.fish.com/satan/



                                             Description: Security Auditing
Tool for Analysing       
                                             Networks This is a powerful tool
for analyzing networks 
                                             for vulnerabilities created for
sysadmins that cannot   
                                             keep a constant look at bugtraq,
rootshell and the      
                                             like.







 IPFilter                                 http://coombs.anu.edu.au/ipfilter/



                                          Description: IP Filter is a TCP/IP
packet filter, suitable 
                                          for use in a firewall environment. To
use, it can either   
                                          be used as a loadable kernel module
orincorporated into    
                                          your UNIX kernel; use as a loadable
kernel module where    
                                          possible is highly recommended.
Scripts are provided to    
                                          install and patch system files, as
required.               






 iptables/netfilter/ipchains/ipfwadm
http://netfilter.kernelnotes.org/              


                                                      Description: IP packet
filter administration   
                                                      for 2.4.X kernels
Iptables is used to set up,  
                                                      maintain, and inspect the
tables of IP packet  
                                                      filter rules in the Linux
kernel. The iptables 
                                                      tool also supports
configuration of dynamic    
                                                      and static network
address translation.        






 Firewalk
http://www.packetfactory.net/Projects/Firewalk/                


                                     Description: Firewalking is a technique
developed by MDS and   
                                     DHG that employs traceroute-like
techniques to analyze IP      
                                     packet responses to determine gateway ACL
filters and map      
                                     networks. Firewalk the tool employs the
technique to determine 
                                     the filter rules in place on a packet
forwarding device. The   
                                     newest version of the tool, firewalk/GTK
introduces the option 
                                     of using a graphical interface and a few
bug fixes.            




                                                      
 Strobe http://www.insecure.org/nmap/index.html#other 
                                                      
        Description: A "Classic" high-speed TCP port  
        scanner                                       
                                                      




 L0pht Crack                              http://www.l0pht.com/l0phtcrack/



                                          Note: No source code is included
(except in research      
                                          version) and their is a $100
registration fee.            
                                          Description: L0phtCrack is an NT
password auditting tool. 
                                          It willcompute NT user passwords from
the cryptographic   
                                          hashes that are stored by the NT
operation system.        
                                          L0phtcrack can obtain the hashes
through many sources     
                                          (file, network sniffing, registry,
etc) and it has        
                                          numerous methods of generating
password guesses           
                                          (dictionary, brute force, etc).







 John The Ripper                             http://www.openwall.com/john/



                                             Description: An active password
cracking tool john, 
                                             normally called john the ripper,
is a tool to find  
                                             weak passwords of your users.







 Hunt                                  http://www.cri.cz/kra/index.html#HUNT



                                       Description: Advanced packet sniffer and
connection          
                                       intrusion. Hunt is a program for
intruding into a            
                                       connection, watching it and resetting
it. . Note that hunt   
                                       is operating on Ethernet and is best
used for connections    
                                       which can be watched through it.
However, it is possible to  
                                       do something even for hosts on another
segments or hosts     
                                       that are on switched ports.





                                                      
 OpenSSH / SSH http://www.openssh.com/                
               http://www.ssh.com/commerce/index.html 
                                                      
               Note: The ssh.com version cost money   
               for some uses, but source code is      
               available.                             
               Description: Secure rlogin/rsh/rcp     
               replacement (OpenSSH) OpenSSH is       
               derived from OpenBSD's version of ssh, 
               which was in turn derived from ssh     
               code from before the time when ssh's   
               license was changed to be non-free.    
               Ssh (Secure Shell) is a program for    
               logging into a remote machine and for  
               executing commands on a remote         
               machine. It provides secure encrypted  
               communications between two untrusted   
               hosts over an insecure network. X11    
               connections and arbitrary TCP/IP ports 
               can also be forwarded over the secure  
               channel. It is intended as a           
               replacement for rlogin, rsh and rcp,   
               and can be used to provide rdist, and  
               rsync with a secure communication      
               channel.                               
                                                      




 tcp wrappers
ftp://ftp.porcupine.org/pub/security/index.html               


                                       Description: Wietse Venema's TCP
wrappers library Wietse      
                                       Venema's network logger, also known as
TCPD or LOG_TCP. .     
                                       These programs log the client host name
of incoming telnet,   
                                       ftp, rsh, rlogin, finger etc. requests.
Security options are: 
                                       access control per host, domain and/or
service; detection of  
                                       host name spoofing or host address
spoofing; booby traps to   
                                       implement an early-warning system.







 Ntop                                         http://www.ntop.org/



                                              Description: display network
usage in top-like format  
                                              ntop is a Network Top program. It
displays a summary   
                                              of network usage by machines on
your network in a      
                                              format reminicent of the unix top
utility. . It can    
                                              also be run in web mode, which
allows the display to   
                                              be browsed with a web browser.







 traceroute/ping/telnet                             http://www.linux.com/



                                                    Description: These are
utilities that virtually  
                                                    all UNIX boxes already
have. In fact, even       
                                                    Windows NT has them ( but
the traceroute command 
                                                    is called tracert ).







 NAT (NetBIOS Auditing Tool)
http://www.tux.org/pub/security/secnet/tools/nat10/          


                                       Note: This is an unofficial download
site.                   
                                       Description: The NetBIOS Auditing Tool
(NAT) is designed to  
                                       explorethe NETBIOS file-sharing services
offered by the      
                                       target system. It implements a stepwise
approach to gather   
                                       information and attempt to obtain file
system-level access   
                                       as though it were a legitimate local
client.                 






 scanlogd                                 http://www.openwall.com/scanlogd/



                                          Description: A portscan detecting
tool Scanlogd is a       
                                          daemon written by Solar Designer to
detect portscan        
                                          attacks on your maschine.





                                                                   
 Sam Spade                   http://samspade.org/t/                
                             http://www.samspade.org/              
                                                                   
                             Description: Online tools for         
                             investigating IP addresses and        
                             tracking down spammers.               
                                                                   




 NFR                                          http://www.nfr.com/



                                              Note: Source code was once freely
available but I do   
                                              not know if this is still the
case. Some usage may     
                                              cost money.

                                              Description: A commercial
sniffing application for     
                                              creating intrusiondetection
systems. Source code was   
                                              at one time available, but I do
not know if that is    
                                              still the case.







 logcheck                               http://www.psionic.com/abacus/logcheck/



                                        Description: Mails anomalies in the
system logfiles to the   
                                        administrator Logcheck is part of the
Abacus Project of      
                                        security tools. It is a program created
to help in the       
                                        processing of UNIX system logfiles
generated by the various  
                                        Abacus Project tools, system daemons,
Wietse Venema's TCP    
                                        Wrapper and Log Daemon packages, and
the Firewall Toolkit�   
                                        by Trusted Information Systems
Inc.(TIS). . Logcheck helps   
                                        spot problems and security violations
in your logfiles       
                                        automatically and will send the results
to you in e-mail.    
                                        This program is free to use at any
site. Please read the     
                                        disclaimer before you use any of this
software.              






 Perl                                         http://www.perl.org/



                                              Description: A very powerful
scripting language which  
                                              is often used to create
"exploits" for the purpose of  
                                              verifying security
vulnerabilities. Of course, it is   
                                              also used for all sorts of other
things.               






 Ngrep
http://www.packetfactory.net/Projects/ngrep/                   


                                      Description: grep for network traffic
ngrep strives to provide 
                                      most of GNU grep's common features,
applying them to the       
                                      network layer. ngrep is a pcap-aware tool
that will allow you  
                                      to specify extended regular expressions
to match against data  
                                      payloads of packets. It currently
recognizes TCP, UDP and ICMP 
                                      across Ethernet, PPP, SLIP and null
interfaces, and            
                                      understands bpf filter logic in the same
fashion as more       
                                      common packet sniffing tools, such as
tcpdump and snoop.       






 Cheops                                    http://www.marko.net/cheops/



                                           Description: A GTK based network
"swiss-army-knife"      
                                           Cheops gives a simple interface to
most network          
                                           utilities, maps local or remote
networks and can show OS 
                                           types of the machines on the
network.                    






 Vetescan                                   http://www.self-evident.com/



                                            Description: Vetescan is a bulk
vulnerability scanner   
                                            which contains programs to check
for and/or exploit     
                                            many remote network security
exploits that are known    
                                            for Windows or UNIX. It includes
various programs for   
                                            doing different kinds of scanning.
Fixes for            
                                            vulnerablities are included along
with the exploits.    




                                                                        
 Retina               http://www.eeye.com/html/Products/Retina.html     
                                                                        
                      Note: Commercial product with no source code      
                      available. A demo binary is available for         
                      testing.                                          
                      Description: A commercial security scanner by the 
                      great guys at eeye.                               
                                                                        


                                             
 Libnet http://www.packetfactory.net/libnet/ 
                                             
                                             
        Description: Routines for the        
        construction and handling of network 
        packets. libnet provides a portable  
        framework for low-level network      
        packet writing and handling. .       
        Libnet features portable packet      
        creation interfaces at the IP layer  
        and link layer, as well as a host of 
        supplementary functionality. Still   
        in it's infancy however, the library 
        is evolving quite a bit. Additional  
        functionality and stability are      
        added with each release. . Using     
        libnet, quick and simple packet      
        assembly applications can be whipped 
        up with little effort. With a bit    
        more time, more complex programs can 
        be written (Traceroute and ping were 
        easily rewritten using libnet and    
        libpcap).                            
                                             




 Crack / Libcrack                        http://www.users.dircon.co.uk/~crypto/



                                         Description: Crack 5 is an update
version of Alec          
                                         Muffett's classiclocal password
cracker. Traditionally     
                                         these allowed any user of a system to
crack the            
                                         /etc/passwd and determine the
passwords of other users (or 
                                         root) on the system. Modern systems
require you to obtain  
                                         read access to /etc/shadow in order to
perform this. It is 
                                         still a good idea for sysadmins to run
a cracker           
                                         occasionally to verify that all users
have strong          
                                         passwords.







 Cerberus Internet Scanner
http://www.cerberus-infosec.co.uk/cis.shtml                


                                          Description: CIS is a free security
scanner written and    
                                          maintained by Cerberus Information
Security, Ltd and is    
                                          designed to help administrators
locate and fix security    
                                          holes in their computer systems. Runs
on Windows NT or     
                                          2000. No source code is provided.







 Swatch                                 http://www.stanford.edu/~atkins/swatch/



                                        Description: Swatch was originally
written to actively       
                                        monitor messages as they were written
to a log file via the  
                                        UNIX syslog utility. It has multiple
methods of alarming,    
                                        both visually and by triggering events.
The perfect tools    
                                        for a master loghost. This is a beta
release of version 3.0, 
                                        so please use it with caution. The code
is still slightly    
                                        ahead of the documentation, but
examples exist. NOTE: Works  
                                        flawlessly on Linux (RH5), BSDI and
Solaris 2.6 (patched).   






 OpenBSD                                      http://www.openbsd.org/



                                              Description: The OpenBSD project
produces a FREE,      
                                              multi-platform 4.4BSD-based
UNIX-like operating        
                                              system. Our efforts place
emphasis on portability,     
                                              standardization, correctness,
security, and            
                                              cryptography. OpenBSD supports
binary emulation of     
                                              most programs from SVR4
(Solaris), FreeBSD, Linux,     
                                              BSDI, SunOS, and HPUX.







 Nemesis                                  http://celerity.bartoli.org/nemesis/



                                          Description: The Nemesis Project is
designed to be        
                                          acommandline-based, portable human IP
stack for           
                                          UNIX/Linux. The suite is broken down
by protocol, and     
                                          should allow for useful scripting of
injected packet      
                                          streams from simple shell scripts.







 LSOF
ftp://vic.cc.purdue.edu/pub/tools/unix/lsof/                  


                                      Description: List open files. Lsof is a
Unix-specific         
                                      diagnostic tool. Its name stands for LiSt
Open Files, and it  
                                      does just that. It lists information
about any files that are 
                                      open by processes current running on the
system. The binary   
                                      is specific to kernel version 2.2







 Lids                                    http://www.turbolinux.com.cn/lids/



                                         Description: The LIDS is an intrusion
detection/defense     
                                         system inLinux kernel. The goal is to
protect linux systems 
                                         against root intrusions, by disabling
some system calls in  
                                         the kernel itself. As you sometimes
need to administrate    
                                         the system, you can disable LIDS
protection.                






 IPTraf                                 http://cebu.mozcom.com/riker/iptraf/



                                        Description: Interactive Colorful IP
LAN Monitor IPTraf is  
                                        an ncurses-based IP LAN monitor that
generates various      
                                        network statistics including TCP info,
UDP counts, ICMP and 
                                        OSPF information, Ethernet load info,
node stats, IP        
                                        checksum errors, and others. . Note
that since 2.0.0 IPTraf 
                                        requires a kernel >= 2.2







 IPLog                                      http://ojnk.sourceforge.net/



                                            Description: iplog is a TCP/IP
traffic logger.           
                                            Currently, it is capable of logging
TCP, UDP and ICMP    
                                            traffic. iplog 2.0 is a complete
re-write of iplog 1.x,  
                                            resulting in greater portability
and better performance. 
                                            iplog 2.0 contains all the features
of iplog 1.x as well 
                                            as several new ones. Major new
features include a packet 
                                            filter and detection of more scans
and attacks. It       
                                            currently runs on Linux, FreeBSD,
OpenBSD, BSDI and      
                                            Solaris. Ports to other systems, as
well as any          
                                            contributions at all, are welcome
at this time.          






 Fragrouter
http://www.anzen.com/research/nidsbench/                     


                                        Description: Fragrouter is aimed at
testing the correctness  
                                        of a NIDS,according to the specific
TCP/IP attacks listed in 
                                        the Secure Networks NIDS evasion paper.
[2] Other NIDS       
                                        evasion toolkits which implement these
attacks are in        
                                        circulation among hackers or publically
available, and it is 
                                        assumed that they are currently being
used to bypass NIDSs   






 Queso                                 http://www.apostols.org/projectz/queso/



                                       Note: A couple of the OS detection tests
in Queso were later 
                                       incorporated into Nmap. A paper we wrote
on OS detection is  
                                       available here.

                                       Description: Guess the operating system
of a remote machine  
                                       by looking in the TCP replies.







 GPG/PGP                                       http://www.gnupg.org/

                                               http://www.pgp.com/



                                               Description: The GNU Privacy
Guard (GnuPG) is a       
                                               complete and free replacement
for PGP, developed in   
                                               Europe. Because it does not use
IDEA or RSA it can be 
                                               used without any restrictions.
GnuPG is a RFC2440     
                                               (OpenPGP) compliant application.
PGP is the famous    
                                               encryption program which helps
secure your data from  
                                               eavesdroppers and other risks.







Responder a