what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from JD Glaser

Email addressjd.glaser at foundstone.com
First Active1999-08-17
Last Active2003-07-07
fport.zip
Posted Jul 7, 2003
Authored by JD Glaser | Site foundstone.com

Fport v2.0 is powerful windows tool which reports all open TCP/IP and UDP ports and maps them to the owning application. This is the same information you would see using the 'netstat -an' command, but it also maps those ports to running processes with the PID, process name and path. Fport can be used to quickly identify unknown open ports and their associated applications. Supports Windows NT4, Windows 2000 and Windows XP.

tags | udp, tcp
systems | windows
SHA-256 | a279608c63ed6d10fe9b87e1e2f80d6d98e87abd33df72324dd3cb7bccb75064
Blast20.zip
Posted Dec 15, 2000
Authored by JD Glaser | Site foundstone.com

Blast v2.0 - A small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers.

tags | tcp
SHA-256 | 4748961063184db9300cb0e92b5327c7001591c319c6cac0ad3f148a0474d49f
NTOMax20.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

NTOMax v2.0 - A scriptable, server stress testing tool.This tool takes a text file as input and runs a server through a series of tests based on the input. The purpose of this tool is to find buffer overflows and DOS points in a server.

tags | overflow
SHA-256 | ef34377a85529f26bafd7fc023eda8fc64b8470ac6e53c53e19d8e7325857bf9
ForensicToolkit20.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

Forensic Toolkit v2.0 is a file properties analyzer designed to examine the files on a disk drive for unauthorized activity. Lists files by their last access time, search for access times between certain time frames, and scan the disk for hidden files and data streams.

SHA-256 | 4d29428f9ff309f7b8d1dae8cf523a7dcbcace17b6b2fa9a7708117299dc0fa4
NTLast30.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

NTLast v3.0 is a security audit tool for Windows NT. It can help identify and track who has gained access to your system, and document the details. Includes raw time output for Excel analysis and additional features for Webmasters.

systems | windows
SHA-256 | 8ec05251c3081e25c2859714a5a176605e31ea2408b766257b565cc544361ff6
NTOMax10.zip
Posted Feb 11, 2000
Authored by JD Glaser | Site ntobjectives.com

NTOMax v1.0 - A scriptable, server stress testing tool.This tool takes a text file as input and runs a server through a series of tests based on the input. The purpose of this tool is to find buffer overflows and DOS points in a server.

Changes: Trial parameter lets you view the buffer to be sent w/o sending it, verbose toggle, norecv parameter, and reopen parameter. This version fixes many timeout errors users were getting.
tags | overflow
SHA-256 | 67706ebf49993f04d67f291331b9d20efa84b717acc0cb97a856eec2bbf2198b
ntattack.zip
Posted Jan 2, 2000
Authored by JD Glaser | Site ntobjectives.com

Paper detailing a successful attack against a NT server running the avirt mail service. In powerpoint, html, and text format.

tags | paper
SHA-256 | 05dd4f84800e47a958684354f2cdd13df2ce3b91bf48643d83f12d755dae7c78
blast-1.1.zip
Posted Dec 23, 1999
Authored by JD Glaser | Site ntobjectives.com

Blast - a small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers.

tags | tcp
SHA-256 | 7e30726cd777c2975e738acdc0b4d360919d62ad57b2c22ba6aa932509a8e8ba
ntotoolsSD.zip
Posted Oct 21, 1999
Authored by JD Glaser | Site ntobjectives.com

NT OBJECTives, Inc. Presents - Seek and Destroy Network Tools. NTO Tools includes four new tools: Lservers[tm], NTOLog[tm] and NPList[tm] and NTODrv[tm]. NTOLog[tm] is a Powerful, network wide backup/clear utility for NT logs.i LServers[tm] is a NetBIOS name dumper. NPList[tm] is a NT network process dumper. NTODrv[tm] is a NT network driver/service dumper. Download NTO Seek/Destroy Tools[tm].

SHA-256 | ed8828e22d4b2702b5da0a6830008e334e58b0e5d79651ef004727657c22c2e0
Packetx1.zip
Posted Oct 15, 1999
Authored by JD Glaser

PacketX 1.0 is a native Windows NT firewall testing tool that allows for complete TCP/IP packet creation. It creates packets to be 'fired' at a firewall in validation tests so that firewall rules can be confirmed. PacketX[tm] contains complete TCP/IP packet spoofing technology in order to verify the approval/denial of internet domain address against firewall ACL's. Freeware version.

tags | spoof, tcp
systems | windows
SHA-256 | 4c35e611d93dad2d380a1e9f3e54a132c151acf2d5fc5d0e14e626923b7725b3
SANS99wedUPDATE.PPT
Posted Oct 14, 1999
Authored by JD Glaser

Updated paper on Intrusion Detection under Windows NT. This should make things a bit clearer. Microsoft Powerpoint presentation.

tags | paper
systems | windows
SHA-256 | a45c068425c0bf5d041f5c876d0ebd0469a3d384c7bcf037e4daf643457ae7c9
NTOtools2.zip
Posted Oct 14, 1999
Authored by JD Glaser

3 NT tools - lservers is a NetBIOS name dumper that quickly lists names of PDC's, BDC's, NT boxes, etc. NTOLog backs up or copies NT log files. Can use stdin or input from lservers. NPList can dump all processes on the network. Example: lservers \\HOSTX XDOMAIN /nt | nplist | grep l0phtcrack.

SHA-256 | 22b2147a1dca1952b2dc95d5a17cf49b74ebb379f3069d8e27118b30fec529e3
ntotoolsPress2.zip
Posted Oct 14, 1999
Authored by JD Glaser

Documentation for NTOtools2.

SHA-256 | 31041d0a2f491b5caa008e694bb0febefe2aef971f313bec7aed62ddc60702f2
Defeating_PGP_with_LanMan.doc
Posted Oct 12, 1999
Authored by JD Glaser

A word document discussing the possibilities of defeating encryption programs such as PGP using LanMan under NT.

tags | paper
SHA-256 | 36075d5ad515b3cc6df89ff4093cd14678327dc9bfa487d7c98880cc7bd36e16
SANS99wed.zip
Posted Oct 12, 1999
Authored by JD Glaser

Intrusion Auditing Under Windows NT. Microsoft PowerPoint presentation.

tags | paper
systems | windows
SHA-256 | 1f6a7a3596b2ad9381e38f460158d1b5ac70433e7354b9021b4a40bdeeff3891
Ntlast16.zip
Posted Oct 5, 1999
Authored by JD Glaser

NTLast 1.6 is a security audit tool for Windows NT. It's a Win32 command line utility with several switches that search the event log for Interactive/Remote/Failed logon stats. In it's simplist form, it reports the last ten successful logons at your computer. NTLast does two significant things that event viewer does not. It can distinguish remote/interactive logons and it matches logon times with logoff times. NTLast is designed to assist your efforts in tracking down logon/logoff data.

tags | remote
systems | windows
SHA-256 | f4714562db9789cff915e2fdb7578a6c93cb3878834211ba13fda28f127c0952
null.sessions.html
Posted Aug 17, 1999
Authored by JD Glaser

Excellent detailed explanation describing how to programmatically connect to NT Server NULL Sessions and extract the name of the true administrator account.

SHA-256 | 385e5b27d636bd14505e27e7fb7bbe9aae23dcdffcaf95f465b255d4a5c97685
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close