arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.
Authforce is an HTTP authentication brute forcer. Using various methods,
it attempts brute force username and password pairs for a site. It has
the ability to try common username and passwords, username derivations,
and common username/password pairs. It is used to both test the security
of your site and to prove the insecurity of HTTP authentication based on
the fact that users just don't pick good passwords.
autossh 程序,启动一个 ssh 副本并监视它,必要的时候重启它,比如它死了
或者停止通信了。
最初的想法和机制来自 rstunnel(可靠的 SSH 隧道)。这个版本的方法有所
改变:autossh 使用 ssh 来构建 ssh 转发环路(一个从本地到远程,一个从
远程到本地),然后发送测试数据并期待其返回。(这个想法得感谢泰伦斯·马丁。)
BASE is the Basic Analysis and Security Engine. It is based on the code
from the ACID project. This application provides a PHP-based web front-end
to query and analyze the alerts coming from a Snort IDS system.
BASE is a web interface to perform analysis of intrusions that Snort has
detected on your network. It uses a user authentication and role-base
system, so that you as the security admin can decide what and how much
information each user can see. It also has a simple to use, web-based
setup program for people not comfortable with editing files directly.
BitDefender Console Antivirus
checkpassword-pam was written from scratch. There are several older
packages called checkpassword-pam, derived from DJB's checkpassword
code. This checkpassword-pam is more modern and administrator-friendly.
The chrootuid command combines chroot(8) and su(1) into one program,
so that there is no need to have commands such as /usr/bin/su in the
restricted environment. Access to the file system is restricted to
the newroot subtree and privileges are restricted to those of the
newuser account (which must be a known account in the unrestricted
environment).
See also jail(8)
From the aescrypt README.html:
This is a program for encrypting/decrypting streams of data using
Rijndael and Cipher Block Feedback mode (CFB-128).
...
5. This program was deliberately kept extremely simple. It is not
intended to be a full encryption solution, it is intended to be
used within scripts as part of a complete solution. Keychain
management, public key signatures, etc. are all expected to be
done external to this program.
ike-scan discovers IKE hosts and can also fingerprint them using the
retransmission backoff pattern.
ike-scan does two things:
a) Discovery: Determine which hosts are running IKE.
This is done by displaying those hosts which respond to the IKE requests
sent by ike-scan.
b) Fingerprinting: Determine which IKE implementation the hosts are using.
This is done by recording the times of the IKE response packets from the
target hosts and comparing the observed retransmission backoff pattern
against known patterns.
The BlindElephant Web Application Fingerprinter attempts to discover
the version of a (known) web application by comparing static files
at known locations against precomputed hashes for versions of those
files in all available releases. The technique is fast,
low-bandwidth, non-invasive, generic, and highly automatable.