Slackware This Forum is for the discussion of Slackware Linux.
|
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
01-05-2014, 06:40 AM
|
#1
|
Member
Registered: Jul 2011
Location: Beside of Andromeda !
Distribution: OpenBSD, RedHat, Arch, ..
Posts: 90
Rep:
|
What 's the best Security Tools Collection for Slackware?
Hi,
I'm new to slackware and I search for a best Slackware Security tools collection.
I found wifislax but its main tools run in spanish!
backtrack3 (Slackware base) is too old!
Any Other?
|
|
|
01-05-2014, 07:54 AM
|
#2
|
Member
Registered: Sep 2012
Posts: 451
Rep:
|
Actually backtrack/kali are probably your best bets.
There is a reason almost the entire pen test community uses them. Lots and lots of the tools in there depend on very specific versions of things like python, ruby, samba openldap, openssl, etc which are often out of date and have vulnerabilities of their own. Those same tools also almost always need root to do privileged operations and because they are developed quickly don't then do things like drop privileges etc. You can be exposing the machine you are doing your tests from quite bit that way.
If there is are tools you are using often in an environment you support I'd consider building and installing those specific applications in your Slackware environment; but for the rest of it my recommendation is just running the current Kali in kvm/vmware player/virtual box/etc. Save any information you need to keep somewhere persistent but do your work in a snapshot and revert to the base state whenever you need. You'll find its nice working on a system where you are completely free to trash the filesystem, replace libraries/modified their behavior to be out of spec/etc without worrying if you break something on your system.
|
|
1 members found this post helpful.
|
01-05-2014, 08:00 AM
|
#3
|
Member
Registered: Jul 2011
Location: Beside of Andromeda !
Distribution: OpenBSD, RedHat, Arch, ..
Posts: 90
Original Poster
Rep:
|
OK,
If I copy the KALI pentest folder into slackware root directory, can its tools work correctly or must be compiled again in slackware?
|
|
|
01-05-2014, 10:34 AM
|
#4
|
LQ Veteran
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Rep:
|
Quote:
Originally Posted by mbzadegan
OK,
If I copy the KALI pentest folder into slackware root directory, can its tools work correctly or must be compiled again in slackware?
|
Epic fail most likely. Some may run, but it's a recipe for disaster.
|
|
|
01-05-2014, 10:35 AM
|
#5
|
Member
Registered: Sep 2012
Posts: 451
Rep:
|
I am sure some will work, but most I think you will need to rebuild. I am not sure what your objectives are, if its generic pentesting kind of work I really think long term you will be happier just running Kali in a VM.
That way you can just download the latest version when you need it rather than trying to keep all those tools up to date. The unfortunate reality is so much of that stuff is just not written to be especially portable and its not packaged up to built with make and autoconf.
Even stuff like metasploit pretty much ships with its own Ruby and Java binaries an just installs everything in its own folder up /opt sharing nothing with the rest of the system because no sane disto would use compatible versions of that stuff.
If all you want is metasploit, nmap, and stuff than you could install that directly to Slackware: http://slackbuilds.org/repository/14...rch=metasploit
But if you are after the whole tool box so to speak; its just to much work to make it all work happily on Slackware or any other desktop/server Linux distribution.
|
|
|
01-05-2014, 12:57 PM
|
#6
|
Member
Registered: Jul 2011
Location: Beside of Andromeda !
Distribution: OpenBSD, RedHat, Arch, ..
Posts: 90
Original Poster
Rep:
|
Ok,
I need some speed tools such as pktgen or hping,... that work in high speed process but virtualling systems can't runs process on the highest speed.
Last edited by mbzadegan; 01-06-2014 at 01:05 AM.
|
|
|
All times are GMT -5. The time now is 10:41 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|