Tracking Forums, Newsgroups, Maling Lists
Home Scripts Tutorials Tracker Forums
  Advanced Search
  HOME    TRACKER    Linux


Fedora Security :: Script To Add Security Spin Tools To Normal Installation

love security/pentest tools. This script adds ALL the tools from the Security Spin, plus Metasploit. Feel free to modify it if need be.

View 12 Replies (Posted: 22nd May 2011, 05:37 AM)

Sponsored Links:

Related Forum Messages For Linux category:
Fedora Security :: Install Security Lab Menu On A Normal 13 Installation?
Is it possible to install security lab menu on a normal Fedora 13 installation? I don't want to use security spin.

Posted: 30th May 2010, 04:51 AM

View 14 Replies!   View Related
Fedora Security :: Security Spin Pen Through SMB
Using SMB to access a windows machine through port 139/445 is great, but how can this be used to exploit the system?I know this is gonna get flamed for the nature of hacking, but i'm trying to pen my own windows box with my sec spin of fedora (tried backtrack but didnt like the feel of it, so got the GNOME-security spin)I'm trying to find a way to open up c$ without sitting at my win box and sharing it.

Posted: 3rd June 2010, 11:17 PM

View 1 Replies!   View Related
Fedora Security :: FYI Security Spin ?
FYI Security Spin.


"...The Fedora Security Spin provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies in universities and other organizations. The spin is maintained by a community of security testers and developers. It comes with the clean and fast LXDE Desktop Environment and a customized menu that provides all the instruments needed to follow a proper test path for security testing or to rescue a broken system. The Live image has been crafted to make it possible to install software while running, and if you are running it from a USB stick created with the LiveUSB Creator's overlay feature, you can install and update software and save your test results permanently..."

About Security Spin -


Available Apps of Security Spin -


Posted: 2nd March 2010, 07:06 AM

View 9 Replies!   View Related
Fedora Networking :: Unable To Activate Wireless Card In Security Spin
I've been trying to get Security Spin up and running (after having tried unsuccessfully with knoppix STD). I need to be able to connect to my home network, or hell any wireless network.I've tried using iwconfig wlan0 as well as the options in the Network Configuration panel as well as other related panels. I'm able to change and set up profiles for the wireless card, but not to activate them. The button just isn't clickable.If it helps, I'm running Security Spin from a unetbootin usb drive. The wireless card is identified by the system as "Intel Corporation PRO/Wireless 4965 AG or AGN [Kedron] Network Connection" .

Posted: 27th July 2010, 08:15 PM

View 2 Replies!   View Related
Fedora Security :: STD Tools Ported?
Anyone know if the collection of STD tools have been included in Fedora repositories? Would love to recreate a STD disk based off of F12+ live cd and those tools. (Knoppix Secuity Tools Disk that seem to have died out a couple years back) Great tools, just the distro doesnt support new hardware....but if in a F12+package......all would be good.

Posted: 3rd February 2010, 08:54 AM

View 3 Replies!   View Related
Fedora Security :: Can't Find Any Tools Available To Either Set It Up
It seems the fingerprint reader is detected, and several related packages are installed, but I can't find any tools available to either set it up. or activate it for use.

Posted: 20th June 2011, 03:47 PM

View 6 Replies!   View Related
Fedora Security :: Recommended Network Monitoring Tools?
I am currently running a 64-bit Fedora 14 server which hosts a game server, a voice server, and remote desktop functionality, each on a distinct TCP port. I am currently using the built-in firewall to deny all traffic other than ICMP ping/pong and TCP traffic on those specific ports.I am looking for a graphical application which will let me monitor any connections being made to my server in order to keep an eye out for possible security concerns. To be more specific, I'd like to be able to see the source IP addresses, TCP/UDP ports, and individual bandwidth in use by external connections being made to the server, along with any other information that might be helpful in identifying a possible intrusion attempt.

Posted: 9th February 2011, 10:18 PM

View 3 Replies!   View Related
Security :: Using Open Source Network Security Tools On Large Network
how efficient and effective are these snort, argus, ossec etc etc for an organization having 3500 PC Network, connected through 700+ Cisco Devices (Layer 2 and Layer 3), and scattered on 130 different sites (geographically)? what should be the combination of products and what should be the architecture for an efficient forensics activity?

Posted: 07-05-2010, 07:38 AM

View 2 Replies!   View Related
Security :: Bypassing Normal Login UI
I was under the impression the Linux (in my case the Fedora OS) is very secure. However I've learnt with deep concern that that one can have access to the system during system startup i.e one can give various startup directives and bypass the normal login UI to have direct root access.

Is there a way to disble this so that the directives during startup are fixed and cannot be altered. I would like to make the system secure to the maximum extent possible.

Posted: 11-16-2010, 05:31 AM

View 5 Replies!   View Related
Security :: Tools For Content Filtering In System?
I have already developed file type filtering functions through squid. Now I want to deal with content filtering aspects... What tools are available there for so in linux?

Posted: 06-22-2009, 02:46 AM

View 6 Replies!   View Related
Security :: Tools For Securing Mail Server?
iam working on mail server in redhat centos. i want to know how to secure my mail server for heavy loading , any monitoring tools in GUI or console , is any essential tool which is used in Like MNC for mail server..

i know few command in like top,netstat,etc through google but i willing to know some more

Posted: 05-21-2011, 12:40 AM

View 8 Replies!   View Related
Security :: What Tools And Techniques Do You Use To Analyze Data?
For those with IT jobs, how do you handle security monitoring for your company?

1.How do you determine what to monitor-- The most vulnerable assets, most critical or something else?

2.What kind of data do you collect for security monitoring purposes?

3.What tools and techniques do you use to analyze the data?

Posted: 04-15-2011, 10:30 AM

View 6 Replies!   View Related
Ubuntu Security :: Are The Tools Backtrack Uses Compatible With
Im trying to run some penetration testing on my home wireless and want to know if the tools that backtrack uses are available in the repository.

Specifically tools that can be used to sniff out valid mac addresses and breaking wep encryption-what tools am i looking for?

Posted: February 23rd, 2011

View 1 Replies!   View Related
Security :: 5 Of The Best Free Disk Encryption Tools?
Quote: The importance of security should never be underestimated. The consequences of losing data can be disastrous for any organisation. For example, the loss of a single unencrypted laptop may have huge repercussions. This could include breaching data protection legislation with the risk of a significant fine, a loss in the confidence of an organisation, as well as the risk that sensitive data may fall into the hands of a competitor or third party with malicious intent.

Posted: 04-10-2011, 08:13 PM

View 1 Replies!   View Related
Ubuntu :: Security Distro Or Cracking Tools?
I want to see how secure my company is. I am not too concerned about over the wire, more about someone hacking our wireless.

Posted: March 25th, 2010

View 6 Replies!   View Related
Ubuntu Security :: Can't Get Respond Through Normal Channels?
I can't get respond through normal channels, all I can use is my phone. My keyboard is disabled. My PC is pretty much a paper weight. Both of them. The only way they could be getting in is through the wifi. I don't know if there is anything I can do. My recovery programsare not accessible. Even onstartup. Is it possible to clear the hard drive another way? I've heard fire purifies, I couldn't get another disc to boot up to reinstall ubuntu. Please text me any ideas, but please be specific with command lines, I have trouble with all the () and / [ and where they go.

Posted: April 10th, 2011

View 9 Replies!   View Related
Security :: Monitoring Tools For Squid Proxy Server
is someone can guide the best open source tools to monitor as webbase,gui,shell prompt

Posted: 02-09-2010, 02:42 AM

View 1 Replies!   View Related
Hardware :: Security Cameras And Obtain Info Tools?
I have been setting up multiple security system in the area and was wondering what was the easiest way is to get the camera information that one would need in setting up survellance systems like zoneminder. I use xawtv for testing and

PHP Code:

But how can I get specific information about NTSC/PAL cameras or IP cameras. In other words is there a specific tool for that purpose? I can see my video cameras fine using xawtv -c /dev/video but can I look at those log files to see what setting it used for the cameras

Posted: 05-28-2010, 03:15 PM

View 1 Replies!   View Related
Security :: To Call Chroot Under Normal Unprevileged User ?
Its been two days over, after my search started . But I didn't find answer any where ?. I need to call chroot as part of normal user, but to my surprise it can only be called by SUper user with CAP_SYS_CHROOT capabilities. I am not sure how to add this capability to my user .

Posted: 03-24-2010, 04:43 AM

View 10 Replies!   View Related
Security :: Prevent Normal Users See All The Processes Running On The Box?
I've a Linux box with few users (with shell). I would like to prevent normal users see all the processes running on the box. How can I implement this?

Posted: 12-30-2010, 07:19 AM

View 1 Replies!   View Related
Security :: Lots Of CRON Spam From Root. Normal?
Take a peek at this:

Jan 23 20:15:01 localhost CRON[22629]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 23 20:15:01 localhost CRON[22629]: pam_unix(cron:session): session closed for user root


Posted: 01-25-2010, 04:12 PM

View 3 Replies!   View Related
Security :: Support Of Third Party Tools Logs In Syslog/rsyslog?
I am searching that how i can configure syslogs/rsyslog to receive third party tools or softwares logs. For example i have a program that generates logs like when it is started and logs about its services, alerts if there are any alarms etc. I want to forward these logs using syslogs/rsyslog. Is their any possibility how can i achieve that

Posted: 08-23-2010, 09:20 AM

View 2 Replies!   View Related
Ubuntu Security :: Firewall Installed And Running In10.04 - GUI Tools?
Is there a firewall installed and running in 10.04? If so are there any gui tools for configuring it and where are they? If there is not a firewall, what should I install to get one properly up and running?

Posted: July 1st, 2010

View 2 Replies!   View Related
Ubuntu Security :: Great Tools For Antivirus/intrusion Detection?
software to use against Intrusion and such. The thing is that I don't want to have several anti virus programs running at the same time due to collision.

Posted: February 16th, 2011

View 9 Replies!   View Related
Copyright 2005-08, All rights reserved