LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-17-2018, 01:27 PM   #1
JazzBulls
LQ Newbie
 
Registered: Feb 2018
Posts: 3

Rep: Reputation: Disabled
Linux security modules


Hello all...

I don't know if this is a right place to ask this, but I'll give it a try...
I am doing a thesis for my graduation, on a subject of "Linux security modules". And my plan is to create 4 virtual machines with Ubuntu, or some different distribution, and set 4 different security modules on each virtual machine. AppArmor, SELinux, Smack and TOMOYO...
And I was thinking to simulate an attack on each security module to establish what are the good sides and bad sides of each module...
So my question is... Is there a safe way to simulate the attack and to get a proof of this attack and to establish and see what I did on the way...

Thank you...
 
Old 02-17-2018, 08:34 PM   #2
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,324
Blog Entries: 28

Rep: Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142
You may find this article from Linux Voice (which is now part of Linux Magazine) quite helpful: https://www.linuxvoice.com/hacking-a-beginners-guide/
 
2 members found this post helpful.
Old 02-18-2018, 05:43 AM   #3
JazzBulls
LQ Newbie
 
Registered: Feb 2018
Posts: 3

Original Poster
Rep: Reputation: Disabled
Thank you for this info...
I didn't have the time to read all of it, but from what I have read, it is going to be very very usefull...
If you know anything else that might be helpfull, I would be grateful...
 
Old 02-21-2018, 08:25 AM   #4
Triple Fault
LQ Newbie
 
Registered: Feb 2018
Location: 0x100000
Distribution: Debian Based
Posts: 17

Rep: Reputation: Disabled
What sort of attacks are you thinking about carrying out? The only way I can think to safely simulate an attack would be attack your own infrastructure, or in this case, vm on a local network with no internet. Now in order to see what you did while carrying out the attack, and if you don't program using the pcap library or whatever, I would recommend a good network analyzer like wireshark, snort, and/or hexinject to see and log what is going on while you are attacking yourself. And I'm still not sure of what attack you are trying to carry out exactly.. Probe scan and overflow(ddos), ssh brute force, httpd attacks, etc ... Once again, unless you can write your own port scanners, or use libssh, libcurl, libpcap, or your own libraries of functions, I would recommend programs like nmap, hydra, the aircrack-ng suite, or just discovering stuff on a live boot of kali linux to carry out the attacks..

Last edited by Triple Fault; 02-21-2018 at 08:43 AM.
 
Old 02-21-2018, 08:54 AM   #5
JazzBulls
LQ Newbie
 
Registered: Feb 2018
Posts: 3

Original Poster
Rep: Reputation: Disabled
I don't mean literally a hacking attack, just something basic that I could use to prove that I tried to test each security module. I don't even have to bypass the module, just enough that it leaves me a trace or some kind of log that will tell me that someone tried to bypass the security module.
 
Old 02-21-2018, 09:13 AM   #6
Triple Fault
LQ Newbie
 
Registered: Feb 2018
Location: 0x100000
Distribution: Debian Based
Posts: 17

Rep: Reputation: Disabled
hmmmm... I'm not sure then. I can't figure out how to 'test' a security module without carrying out an 'attack' really. Good luck on your penetration & stress testing endeavors for school though
 
Old 02-21-2018, 09:16 AM   #7
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Penetration Testing ... "pen tests."

I will be interested to read your thesis in PDF form once you've completed it and gotten your sheepskin. It could be, or could become, a thorough introduction to the various kernel facilities that you (and your mentor) select. And that would be very nice to read.

Last edited by sundialsvcs; 03-06-2018 at 08:10 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Linux Security Modules compiling trouble nikhil86 Programming 6 03-12-2008 12:01 PM
LXer: Linux Security Modules Sans Modules LXer Syndicated Linux News 0 10-20-2007 11:01 PM
Linux security modules & Slackware rkelsen Slackware 2 07-01-2007 10:34 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:21 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration