Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hi, I am new to linux as well as beginner to ethical hacking.
Curruntly using Ubuntu 9.10!
I am eager to know where the hacking begins in linux? The stuff like netstat, telnet, or mail-forging or even pinging...ho do we do that in linux?
First, lets be clear that that there is a distinct difference between the term 'hacking' and 'cracking'. The tools you mention, netstat, telnet, and ping are routinely used for network and application diagnostics. They can also be used for reconnaissance. Your mention of the term mail-forging (an attack to disguise the source of an e-mail and send it to the victim) puts your question clearly in the realm of 'cracking'. These discussions are forbidden by the LQ rules: link and has been reported for moderator review.
Last edited by Noway2; 02-15-2011 at 04:39 AM.
Reason: typo correction
You're supposed to understand from the above that "hacking" the way you mean it isn't a topic for LQ. If you search the 'net for "ethical hacking" I'm sure you'll find documents to read, sites to visit and software to use. After having done that, if you have any specific questions that do not violate the LQ Rules, feel free to ask them. Do however note that questions like "how do I circumvent DRM", "how do I bypass my [schools IDS filter|institution proxy|work port restrictions]", "how do I crack a WEP key", "how do I hack OpenSSH-5.1p2" or "how do I cross-site script, remote file include, sql-inject specific-software-version-x" are questions that we do not like to see.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.