Suramya's Blog : Welcome to my crazy life…

April 10, 2005

Linux Rootkit detection tools

Filed under: Knowledgebase,Linux/Unix Related — Suramya @ 8:24 PM

According to Wikipedia, A root kit is a set of tools used by an intruder after cracking a computer system. These tools can help the attacker maintain his or her access to the system and use it for malicious purposes.

It is pretty hard to detect a root kit using standard system tools so we need to use specialized detection programs. Below are links to software that detects RootKits in Linux:

Rootkit Hunter:

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.

chkrootkit:

chkrootkit is a tool to locally check for signs of a Rootkit.

Audit user logon activity

Filed under: Security Tools,Tech Related — Suramya @ 8:15 PM

These program(s) help you audit user logon activity to locate unusual activity:

EventCombMT:

Available as part of the Security Guide Scripts Download, this is a multi-threaded tool that will parse event logs from many servers at the same time.

Instructions on how to use EventCombMT are available over here.

Update (08th Aug 2007): Fixed the link to download the software and added the link to the instructions page

Tools to Audit a Windows Server

Filed under: Security Tools,Security Tutorials,Tech Related — Suramya @ 8:10 PM

Here are some links to software/articles that will help you Audit your windows server(s):

Software:

Articles:

– Suramya

New Knowledge @Suramya.com Blog started

Filed under: Website Updates — Suramya @ 12:29 AM

Started keeping a new blog called Knowledge @Suramya.com. This blog will be a place for me to store all the interesting things/tips/resources I find and think are useful. It will contain everything from links to interesting articles to computer definitions to tutorials.

Since I am very interested in computer security there are links here to software/tutorials that explain how to test computer security. These are for informational purposes only and if you decide to use them to break into a system that you don’t own then you are doing it at your own risk, if you get into trouble don’t blame me.

Originally all this info was supposed to be in a KnowledgeBase but I didn’t find any KB software which I liked so I decided to keep a Blog instead.

Check it out and let me know what you think of it.

-Suramya

List of Datawipe Tools

Filed under: Knowledgebase,Security Tools,Tech Related — Suramya @ 12:19 AM

Below are some software that allows you to delete data from disks securely. All of them are pretty efficent and make it difficult for someone to recover the data. However keep in mind that no data is 100% unrecoverable to those who have sufficient time and money.

So it you have some really sensitive data that you have to destroy look into purchasing a furnace and melt the disks down and then destroy the remains.

Software for Data Wiping:

DBAN:

Darik’s Boot and Nuke (’DBAN’) is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.

Autoclave:

It’s a bootable floppy image that sterilizes IDE hard disks on x86 machines.

BCWIPE:

BCWipe software is designed to securely delete files from disks and other media

Free Secure Delete Tools:

The utilities on this page allow you to destructively wipe/delete/erase a file, a disk (floppy disks, hard disks, etc), or a partition.

Kill Disk:

Active@ KillDisk is a powerful and compact DOS software that allows you to destroy all data on hard and floppy drives completely, excluding any possibility of future recovery of deleted files and folders.

Eraser:

Eraser is a powerful system security utility developed on the basis of advanced studies and research.

April 9, 2005

System log management Applications and Resources

Filed under: Security Tools,Tech Related — Suramya @ 9:49 PM

Programs to monitor the Log files for multiple computers running Windows 2000/XP/NT/2003.

GFI LANguard S.E.L.M:

GFI LANguard S.E.L.M. can analyze application, system and other event logs. You can back up and clear event logs on all remote machines in your network automatically; and view, report and filter events network-wide, instead of just per machine. GFI LANguard S.E.L.M. collects all events in one central database, making it easy to create network-wide reports and custom filters. Using the custom rules, you can create your own event alerts based on event ID, condition and event contents.

syslogng:

syslogng provides a centralised, securely stored log of all devices on your network, whatever platform they run on. And syslog-ng also incorporates a host of powerful features, including filtering based on message content, as well as customisable data mining and analysis capabilities.

Syslog Daemon for Windows:

Kiwi Syslog Daemon is a freeware Syslog Daemon for Windows. It receives, filters, logs, displays and forwards Syslog messages and SNMP traps from hosts such as routers, switches, Unix hosts and any other syslog enabled device.

LogAnalysis.org:

A site dedicated to pulling together a repository of useful information on log analysis for computer security

Implementing Central Logging Server

This document attempts to provide a practical guide for implementing a centralized syslog server at an Enterprise level. The document includes details on porting cross platform logs to a central syslog server, porting messages to a database and real time viewing and querying of the logs

Update (12th May 2005):

MS Log Parser:

Log parser is a powerful, versatile tool that provides universal query access to text-based data such as log files, XML files and CSV files, as well as key data sources on the Windows® operating system such as the Event Log, the Registry, the file system, and Active Directory®.

SecurityFocus has a good article explaining how to use the logparser.

Security Wargame sites

Filed under: Interesting Sites — Suramya @ 8:14 PM

These site have some hacking type wargames, great fun and good to learn by.

http://www.dievo.org/
http://www.hackerplayground.com/games.php
http://hackerslab.org/
http://www.hackergames.net
http://roothack.org/
Hack Dot AE

Update: (04/20/2005)

Hackquest.de
hackthissite.org
honeynet.org
http://quiz.ngsec.com/
http://www.slyfx.com
http://www.mod-x.co.uk/main.php
http://www.osix.net/
http://www.bright-shadows.net/
http://academy.dyndns.org/
http://ambience.digitalshell.net/~llamatron
http://www.blind-dice.com
http://www.learntohack.org
www.area-6.net

If you know of some other sites let me know and I will add them here.

– Suramya

Virus list by ports used

Filed under: Interesting Sites — Suramya @ 2:56 AM

The sites below contain lists of viruses organized by the ports they use. So if you have an open port on your computer that shouldn’t be there, check out the sites below to see if it could be a virus:

+ http://www.simovits.com/trojans/trojans.html
+ http://lists.gpick.com/portlist/portlist.htm
+ http://www.bekkoame.ne.jp/~s_ita/port/port1-99.html
+ http://isc.sans.org/index.php
+ http://www.jlathamsite.com/dslr/suspectports.htm
+ http://www.doshelp.com/trojanports.htm
+ http://www.linux-firewall-tools.com/linux/ports.html
+ http://www.commodon.com/threat/threat-all.htm
+ http://advice.networkice.com/advice/Exploits/Ports

– Suramya

Knowlege @Suramya.com inaugurated

Filed under: Uncategorized — Suramya @ 2:42 AM

Welcome to Knowledge @Suramya.com. This is a brand new blog where I will be posting the stuff I find interesting and think might be useful. It will contain everything from links to interesting articles to computer definitions to tutorials.

Originally all this info was supposed to be in a KnowledgeBase but I didn’t find any KB software which I liked so I decided to use a Blog instead.

If you are looking for a more non-technical blog check out my other blog: http://www.suramya.com/blog

– Suramya

April 5, 2005

Computer Down so Collage Generator is down

Filed under: Software Releases,Website Updates — Suramya @ 5:52 AM

During a routine distribution update (apt-get dist-upgrade) of StarKnight (My primary workstation) something went wrong and KDE disappeared from my system. I tried reinstalling it but it still didn’t fix it. Then I played some more with the system and managed to mess it up even more. (I started getting segfaults when I try to install stuff and programs started giving wierd errors). So I am in the process of re-installing Debian on my computer and till thats done I am stuck using a windows machine. 🙁

Now since StarKnight is down the Collage Generation page is also down as the backend processing for it was being done on StarKnight. I am hoping that I should have it back up and running by tomorrow but lets see how that works out. I will keep you posted.

– Suramya

« Newer PostsOlder Posts »

Powered by WordPress