Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
06-09-2006, 09:47 PM
|
#1
|
Member
Registered: Dec 2005
Posts: 54
Rep:
|
security vulnerability
Hello all,
I was wondering if anyone could help me out with my newbie question.
Is there a software for FC 5 or any linux that I could run a security vulnerability test that will show me what security holes a linux or windows have. Then do a test on the hole to see what happens with the machine. Like a NT, 2000 machine see if I could bring up the blue screen of death... A Gui would be nice.
I'm getting in to security so this would help me at home with my 2 computer I have already setup running windows.
[Malachai]
|
|
|
06-09-2006, 10:40 PM
|
#2
|
Senior Member
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658
Rep:
|
Very few tools are going to be comprehensive by themselves, but something like nessus or metasploit might be what you are looking for, at least in terms of identifying potential security vulns. The standard caveats about only scanning machines you are authorized to perform this type of analysis on would clearly apply here. Also do yourself a favor and spend some time learning about how exploits work (things like how a buffer overflow works, shellcode, etc), rather than just clicking a button repeatedly.
|
|
|
06-10-2006, 12:12 AM
|
#3
|
Member
Registered: Mar 2006
Distribution: BackTrack, RHEL, FC, CentOS, IPCop, Ubuntu, 64Studio, Elive, Dream Linux, Trix Box
Posts: 310
Rep:
|
Hi Malachai.77,
You may also check SARA which is based on SATAN.
I tried it and did like the reporting style too. (Good to impress your friends / clients / boss /whosoever is concerned )
[QUOTE:Captain]
Also do yourself a favor and spend some time learning about how exploits work (things like how a buffer overflow works, shellcode, etc), rather than just clicking a button repeatedly.[/QUOTE]
I would like to know some ref. sites or links captain.
Thanks in advance
|
|
|
All times are GMT -5. The time now is 01:57 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|