Ports Search

Results 3,8313,840 of 5,161 for /ports-mgmt/.(0.007 seconds)
security/arpCounterattack-1.2.0 (Score: 0.006224396)
Detects and remedies ARP attacks
arpCounterattack is a program for detecting and remedying "ARP attacks." It monitors traffic on any number of Ethernet interfaces and examines ARP replies and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP request that is in conflict with its notion of "correct" Ethernet/IP address pairs, it logs the attack if logging is enabled, and, if the Ethernet interface that the attack was seen on is configured as being in aggressive mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables of hosts on the local network segment. The corrective gratuitous ARP request and corrective gratuitous ARP reply can be sent from an Ethernet interface other than the one that the attack was seen on.
security/authforce-0.9.9 (Score: 0.006224396)
HTTP authentication brute forcer
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common username and passwords, username derivations, and common username/password pairs. It is used to both test the security of your site and to prove the insecurity of HTTP authentication based on the fact that users just don't pick good passwords.
security/autossh-1.4e (Score: 0.006224396)
Automatically restart SSH sessions and tunnels
autossh is a program to start a copy of ssh and monitor it, restarting it as necessary should it die or stop passing traffic. The original idea and the mechanism were from rstunnel (Reliable SSH Tunnel). With this version the method changes: autossh uses ssh to construct a loop of ssh forwardings (one from local to remote, one from remote to local), and then sends test data that it expects to get back. (The idea is thanks to Terrence Martin.)
security/base-1.4.5 (Score: 0.006224396)
Basic Analysis and Security Engine - analyzing Snort alerts
BASE is the Basic Analysis and Security Engine. It is based on the code from the ACID project. This application provides a PHP-based web front-end to query and analyze the alerts coming from a Snort IDS system. BASE is a web interface to perform analysis of intrusions that Snort has detected on your network. It uses a user authentication and role-base system, so that you as the security admin can decide what and how much information each user can see. It also has a simple to use, web-based setup program for people not comfortable with editing files directly.
security/bdc-7.0.1 (Score: 0.006224396)
BitDefender Console Antivirus for FreeBSD
BitDefender Console Antivirus
security/checkpassword-pam-0.99 (Score: 0.006224396)
Implementation of checkpassword authentication program
checkpassword-pam was written from scratch. There are several older packages called checkpassword-pam, derived from DJB's checkpassword code. This checkpassword-pam is more modern and administrator-friendly.
security/chrootuid-1.3 (Score: 0.006224396)
Simple wrapper that combines chroot(8) and su(1) into one program
The chrootuid command combines chroot(8) and su(1) into one program, so that there is no need to have commands such as /usr/bin/su in the restricted environment. Access to the file system is restricted to the newroot subtree and privileges are restricted to those of the newuser account (which must be a known account in the unrestricted environment). See also jail(8)
security/aescrypt-0.7 (Score: 0.006224396)
Command-line AES encryption/decryption suite
From the aescrypt README.html: This is a program for encrypting/decrypting streams of data using Rijndael and Cipher Block Feedback mode (CFB-128). ... 5. This program was deliberately kept extremely simple. It is not intended to be a full encryption solution, it is intended to be used within scripts as part of a complete solution. Keychain management, public key signatures, etc. are all expected to be done external to this program.
security/ike-scan-1.9 (Score: 0.006224396)
VPN scanner and identifier
ike-scan discovers IKE hosts and can also fingerprint them using the retransmission backoff pattern. ike-scan does two things: a) Discovery: Determine which hosts are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan. b) Fingerprinting: Determine which IKE implementation the hosts are using. This is done by recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns.
security/blindelephant-1.0 (Score: 0.006224396)
Fingerprint the web applications used by a web site
The BlindElephant Web Application Fingerprinter attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable.