Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
(Page 1 of 2)   1 2  Next >

Category: System Security Management » Solaris

darc - Distributed Aide Runtime Controller
Added 2006-04-24
by Jacob Martinson
darc is a multi-threaded Python application designed for managing AIDE installations in large heterogeneous networks. It provides centralized database management, unified reporting, and eliminates the need to maintain Aide databases and binaries on read-only media.

FireMon
Added 2006-03-27
by Secure Passage
FireMon, is an Enterprise Security Management application that provides visibility to and control of network changes, configurations, and performance. Designed as a security tool, FireMon monitors configurations, evaluates configuration effectiveness, and alerts administrators to changes in configurations. FireMon controls devices by implementing intelligent device information processing and combining it with input from technical experts and customer requirements. FireMon meets key needs of security professionals, particularly security managers, auditors, security administrators, and network professionals with security concerns.

PatchLink Update
Added 2004-11-30
by PatchLink Corporation
With PATCHLINK UPDATE, patch management is the secure, proactive, and preventative process it should be. PATCHLINK UPDATE scans networks for security holes and closes them with the click of a mouse, no matter the operating system, the vendor applications, the mix, or the size of the environment. From 5K nodes to 20+K nodes, PATCHLINK UPDATE works quickly, accurately and safely to ensure desktops and servers are patched correctly and completely the first time around.

Saint Jude
Added 2002-05-17
by Tim Lawless
Saint Jude is a wholly kernel-based intrusion detection and intrusion response system that implements the Saint Jude Model for detection of improper privilege transitions. Saint Jude can detect the presence of ongoing and successful attacks, from sources both local and remote, that would yield root-level access to the attacking individual. Detection is performed using a rule-based anomaly detector that uses a model of normal system behavior that is generated on the protected machine during a training phase. By comparing actual actions against a fully developed model, it is possible to detect attacks against vulnerabilities that are both known and unknown with no false positives or negatives.

Papillon
Added 2002-02-11
by Konrad Rieck
Papillon is a loadable kernel module designed for the Solaris operating environment 8. It was inspired by the Openwall linux kernel patch and adds most of the functionality of this patch to the Solaris kernel. Functionality includes a restricted proc, chroot environment protections, secure STDIO file descriptors, restricted sym- and hardlinks, and more.

Sun Enterprise Network Security Service (SENSS)
Added 2001-10-22
by Bruce Development Team (Sun)
SENSS "Bruce" is a flexible, Java-based infrastructure that permits centralized security management of small, medium and large-sized intranets. The Bruce software provides you with a network service daemon that should be installed on each host in your network; these daemons are linked together in a hierarchy of trust. This hierarchy may be used for the distribution and execution of digitally-signed packages containing (java, binary, or script) code that may be used to check and fix host security issues in a bulk, batch-oriented manner. Execution requests are likewise digitally signed, replay attacks are prevented, and network communications are secured by access-control lists and pluggable authentication and secrecy modules. Output generated during the process of checking is in HTML format, and percolates to the root of the hierarchy, where it is browsable. The Bruce software is not yet complete; this is the Early Access 2 (EA2) release, that we (the Bruce development team) are making available for the benefit of parties with a professional interest in network security, for their experimentation and comment.

Yet Another Solaris Security Package (YASSP)
Added 2001-10-22
by Jean Chouanard, chouanard@parc.xerox.com
YASSP is bundle of packages to secure Solaris. The default behavior turns off most of the services, which is suitable for an external (exposed) server like a firewall, a web server or a ftp server. These services can be easily turned back on via a configuration file The OS security tuning is performed at various levels: turn- ing off (networked) services, changing file owner/mode, ena- bling logging, tuning the network stack, changing the system parameters and also providing a coherent default environment so that administrators know what they can expect and where.

JumpStart Architecture and Security Scripts (JASS Toolkit)
Added 2001-10-22
by Alex Noordergraaf, alex.noordergraaf@SUN.COM
The JumpStart(TM) Architecture and Security Scripts (Toolkit) has been developed by Sun's Enterprise Engineering and Professional Services organizations to harden, minimize, and secure Solaris systems. The primary goal behind the development of this Toolkit was to simplify and automate the process of securing Solaris systems. The "JASS" Toolkit attains that goal by being usable through JumpStart or in a standalone mode.

solpromisc
Added 2001-10-22
by User Datagram Protocol
This is a kernel module which you can load to detect attempts to put devices into promiscuous mode from user space via DLPI (e.g. solsniff, tcpdump, anything pcap based). It dumps the cred struct for the process, and the driver responsible, to the dmesg output buffer for collection by syslog. Read the source, please.

Solaris Security Toolkit
Added 2001-10-22
by SUN
The Solaris Security Toolkit is a tool designed to assist in creation and deployment of secured Solaris Operating Environment systems. The Toolkit is comprised of a set of scripts and directories implementing the recommendations made in the Sun BluePrints OnLine program (http://www.sun.com/blueprints).

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox





VeriSign SSL Certificates secure e-commerce transactions



 

Privacy Statement
Copyright 2006, SecurityFocus