Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
OK, I'm trying to get a network set up to monitor, secure, and hack. I need to experiment with network security, and I need to know how many computers I need for a minimal network. I am trying to get a hold of a laptop I can use with Linux and network it to my other laptop running Windows to try and hack it from my desktop. What programs are recommended, and what amount hardware?
I have a similar situation going for a class right now. I have my main desktop (amd64 3000+ with 1 GB RAM) running Gentoo, a Pentium M 600 MHz laptop with 192 MB RAM running BackTrack2, and a 500 MHz PIII with 256 MB RAM running Windows Server 2003.
BackTrack2 has a long list of exploit/exploration/persistence/etc... programs. You should check it out. It's based on Slackware and comes as a LiveCD with installer (should you desire to install).
As for hardware...as you can see, I'm running garbage haha. But I've already managed to exploit the Win2k3 Server machine using a few different methods, so hardware hasn't been an issue so far.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.