Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
(Page 1 of 1)  

Category: Auditing » PSTN

Iwar
Added 2005-11-13
by Da Beave
A Unix Based (Linux/OpenBSD/Etc) full featured "war dialer". MySQL/ASCII Flat file logging, tone/silence location, banner detection, "curses" front end.

Attack Tool Kit (ATK)
Added 2004-12-17
by Marc Ruef
The Attack Tool Kit (ATK) is an open-source utility to realize penetration tests and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP).

THC-SCAN
Added 2001-10-22
by van Hauser / THC
THC-Scan v2.0 now working under DOS, Win95/98/NT and all DOS emulators (UNiX) on all 80x86 processors. ODBC databank support, completely automated tone, carrier, vmb scanning, large palette of analyzing tools added.

ToneLoc
Added 2001-10-22
by Minor Threat & Mucho Mass
ToneLoc is a wardialer/scanner program.

PhoneTag
Added 2001-10-22
by Clockwork
Phonetag is a carrier scanner for Windows.

Jericho
Added 2001-10-22
by Jason R. Rhoads
Unix carrier scanner. This program attempts connections to a series of phone numbers to ascertain if a modem or fax machine will answer. Scan information is stored in a ndbm(3) database.

ShokDial
Added 2001-10-22
by Matt Connover
ShokDial 4.1, an excellent war dialer for linux.

AutoDial
Added 2001-10-22
by Gerard Lane
MS-DOS based war dialer utility.

TC Dialer
Added 2001-10-22
by TimeCop
DTMF dialer for X Windows. Requires soundcard.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox







 

Privacy Statement
Copyright 2005, SecurityFocus