Ubuntu Security :: Are The Tools Backtrack Uses Compatible With

Feb 23, 2011

Im trying to run some penetration testing on my home wireless and want to know if the tools that backtrack uses are available in the repository.

Specifically tools that can be used to sniff out valid mac addresses and breaking wep encryption-what tools am i looking for?

View 1 Replies


ADVERTISEMENT

Ubuntu :: Can't Install Some Of The Backtrack 4 Tools?

Aug 21, 2010

Ok so I did some stupid stuff and tried to install some of the Backtrack 4 tools. Now when I tried to install VLC player in terminal I get this:"ph@top:~$ sudo apt-get install vlc Reading package lists. Done Building dependency tree Reading state information... Done Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation:

[Code]...

View 8 Replies View Related

Fedora :: How To Install Backtrack 5 Tools In 15

Jun 19, 2011

If there any possibility to install all backtrack 5 programs into my fedora 15 or not and how? Penstest Tools !

View 3 Replies View Related

Ubuntu :: Install Backtrack 4 Tools But Not In Pentest Directory

Jul 31, 2010

how to install penetration testing tools from Backtrack 4 (offensive-security) repository like all other programs (NOT IN /pentest DIRECTORY).

View 1 Replies View Related

Software :: Backtrack Tools Under Open Suse 11

Sep 26, 2010

i like open suse style and i knew the backtrack is the best in the security issues. so i wanna a way that add the backtrack tools to my suse 11

View 2 Replies View Related

Ubuntu :: Installing Backtrack Tools With Menu Structure In Kubuntu 9.10

Feb 5, 2010

Installing backtrack4 tools with menu structure in Kubuntu 9.10 *NOTE* This WILL break your kpackagekit !!! You will need to reinstall kpackagekit after the installation is complete or fix it with synaptic. *This may or may not break your system so do at your own risk* For this to work you will need to follow these instructions EXACTLY as it is here. Go to: [URL] Download the tarzip and open it up. INSTALLING THE BACKTRACK SUB MENU STRUCTURE

Place the menu_backup folder in your home directory. <<----YOU WILL NEED THIS FOR THIS TO WORK Open the BT4-app-list folder and place the backtrack.txt1 file also in your home directory. Open a shell and type: kdesudo dolphin /etc/xdg/menus Delete the kd4-applications.menu file. (dont worry, I have provided a backup copy in the download) Open the BT4-kde4-applicantions.menu folder and place it where you deleted the old menu. Now you can exit.

Now you have the bt4 sub menu. ADDING THE BT4 GPG KEY AND REPO Open a shell and type: wget -q [URL] This adds the GPG key. Then in a shell type: sudo echo "deb [URL] pwnsauce main microverse macroverse restricted universe multiverse" > /etc/apt/sources.list

[Code]....

View 3 Replies View Related

Software :: Looking For Resource To Load Into Ubuntu Distro / Want To Install Backtrack Tools?

Jun 9, 2011

Looking for resource to load into my ubuntu distro I'm using my own mix of Zorin os 5 and Studio I want to install backtrack tools is there a mirror out there for ver4 or 5 I need the resource and gpl keys

View 3 Replies View Related

Fedora Security :: Script To Add Security Spin Tools To Normal Installation

May 22, 2011

love security/pentest tools. This script adds ALL the tools from the Security Spin, plus Metasploit. Feel free to modify it if need be.

View 12 Replies View Related

Security :: Backtrack 5 - Release 10 May 2011

May 7, 2011

This is the first version that supports 64bit and ARM in addition the the 32 bit. Should be very interesting. [URL]

View 8 Replies View Related

Security :: BackTrack For Web Vulnerability Assessment?

Jan 13, 2011

I i've virtual machine that is running BackTrack4r2. I need to use the built-in tool Metaspolit in bt for assessing the security and vulnerability in websites The prob is that i dont have any about the Metaspolit tool.

View 10 Replies View Related

General :: Testing The Wireless Network Security Using Backtrack

May 4, 2011

I have installed a "backtrack 4" in order to test the the wireless network security of my router. how and which commands would be needed. Also, do I need to install airodump into the host?

View 1 Replies View Related

Security :: Armitage Metasploit BackTrack 4 No Collaboration Server Is Present

Mar 27, 2011

I am using BackTrack 4 RC 2, Metasploit and Armitage. I am not able to see my target computers in the target area of the Armitage application after performing an Nmap quick scan (OS detect) on my wireless network (I have several computers connected to the wireless network).

Furthermore, I got the following warnings when trying to do the Nmap quick scan (OS detect):

Quote:

What do these warnings mean?

I was following these steps (as seen in this video: [url])

Code:

View 4 Replies View Related

Ubuntu Security :: SELinux Project Not Compatible

Apr 20, 2011

I would like to secure my site and I want to implement CAS for SSO, SELinux for the permission into my server and CODA, the last one I have read is not compatible with it, but I don't know if somebody have tried something. The most important request from HQ is use SELinux, they're conviced is the best one for the user permissions. I tried to look for some info in internet but there almost nothing.

View 2 Replies View Related

Security :: Generating A Key Compatible With PGP?

Jun 24, 2010

I am currently using [URL] to send and receive faxes at work. I need the faxes to be encrypted. They offer public key encryption with PGP 9.8.2 They just need my public key to be compatible with their PGP version. I found a few statements at the GPG site, which may not be true for newer versions of gpg: PGP, Inc. refuses to accept Elgamal keys of type 20 even for encryption.They only support type 16.PGP 5.x does not accept v4 signatures for data material but OpenPGP requests generation of v4 signatures for all kind of data, that's why GnuPG defaults to them. By default, GnuPG encrypts your secret key using the Blowfish symmetric algorithm. Older PGPs will only understand 3DES, CAST5, or IDEA symmetric algorithms. PGP doesn't do Elgamal signing keys at all, so they are not usable with any version. I attempt to avoid using trial and error here, because an incompatible key may provoke loss of crucial information. It is difficult to estimate how long it would take them/me to find out that the key provided was not compatible; but probably it would entail a significant loss for the business.

View 1 Replies View Related

Ubuntu :: Security Distro Or Cracking Tools?

Mar 25, 2010

I want to see how secure my company is. I am not too concerned about over the wire, more about someone hacking our wireless.

View 6 Replies View Related

Security :: Using Open Source Network Security Tools On Large Network

Jul 5, 2010

how efficient and effective are these snort, argus, ossec etc etc for an organization having 3500 PC Network, connected through 700+ Cisco Devices (Layer 2 and Layer 3), and scattered on 130 different sites (geographically)? what should be the combination of products and what should be the architecture for an efficient forensics activity?

View 2 Replies View Related

Fedora Security :: STD Tools Ported?

Feb 3, 2010

Anyone know if the collection of STD tools have been included in Fedora repositories? Would love to recreate a STD disk based off of F12+ live cd and those tools. (Knoppix Secuity Tools Disk that seem to have died out a couple years back) Great tools, just the distro doesnt support new hardware....but if in a F12+package......all would be good.

View 3 Replies View Related

Fedora Security :: Can't Find Any Tools Available To Either Set It Up

Jun 20, 2011

It seems the fingerprint reader is detected, and several related packages are installed, but I can't find any tools available to either set it up. or activate it for use.

View 6 Replies View Related

Ubuntu Security :: Firewall Installed And Running In10.04 - GUI Tools?

Jul 1, 2010

Is there a firewall installed and running in 10.04? If so are there any gui tools for configuring it and where are they? If there is not a firewall, what should I install to get one properly up and running?

View 2 Replies View Related

Ubuntu Security :: Great Tools For Antivirus/intrusion Detection?

Feb 16, 2011

software to use against Intrusion and such. The thing is that I don't want to have several anti virus programs running at the same time due to collision.

View 9 Replies View Related

Security :: 5 Of The Best Free Disk Encryption Tools?

Apr 10, 2011

Quote: The importance of security should never be underestimated. The consequences of losing data can be disastrous for any organisation. For example, the loss of a single unencrypted laptop may have huge repercussions. This could include breaching data protection legislation with the risk of a significant fine, a loss in the confidence of an organisation, as well as the risk that sensitive data may fall into the hands of a competitor or third party with malicious intent.

View 1 Replies View Related

Security :: What Tools And Techniques Do You Use To Analyze Data?

Apr 15, 2011

For those with IT jobs, how do you handle security monitoring for your company?

1.How do you determine what to monitor-- The most vulnerable assets, most critical or something else?

2.What kind of data do you collect for security monitoring purposes?

3.What tools and techniques do you use to analyze the data?

View 6 Replies View Related

Security :: Tools For Content Filtering In System?

Jun 22, 2009

I have already developed file type filtering functions through squid. Now I want to deal with content filtering aspects... What tools are available there for so in linux?

View 6 Replies View Related

Security :: Tools For Securing Mail Server?

May 21, 2011

iam working on mail server in redhat centos. i want to know how to secure my mail server for heavy loading , any monitoring tools in GUI or console , is any essential tool which is used in Like MNC for mail server..

i know few command in like top,netstat,etc through google but i willing to know some more

View 8 Replies View Related

Fedora Security :: Recommended Network Monitoring Tools?

Feb 9, 2011

I am currently running a 64-bit Fedora 14 server which hosts a game server, a voice server, and remote desktop functionality, each on a distinct TCP port. I am currently using the built-in firewall to deny all traffic other than ICMP ping/pong and TCP traffic on those specific ports.I am looking for a graphical application which will let me monitor any connections being made to my server in order to keep an eye out for possible security concerns. To be more specific, I'd like to be able to see the source IP addresses, TCP/UDP ports, and individual bandwidth in use by external connections being made to the server, along with any other information that might be helpful in identifying a possible intrusion attempt.

View 3 Replies View Related

Hardware :: Security Cameras And Obtain Info Tools?

May 28, 2010

I have been setting up multiple security system in the area and was wondering what was the easiest way is to get the camera information that one would need in setting up survellance systems like zoneminder. I use xawtv for testing and

PHP Code:
zmu -d <device_path> -q -v 

But how can I get specific information about NTSC/PAL cameras or IP cameras. In other words is there a specific tool for that purpose? I can see my video cameras fine using xawtv -c /dev/video but can I look at those log files to see what setting it used for the cameras

View 1 Replies View Related

Security :: Monitoring Tools For Squid Proxy Server

Feb 9, 2010

is someone can guide the best open source tools to monitor as webbase,gui,shell prompt

View 1 Replies View Related

Fedora Security :: Generating Password Hashes Compatible With FC11/sha-512 Shadow File?

Jul 3, 2009

I've been trying to write php or perl code to generate the sha-512 password hashes in fedora. I've been unable to do the hashing which is encoded in the shadow file on fedora core 11. Does anyone have php or perl code which provides the hashing algorithm. (All of my attempts result in the encrypted hashing being longer than 86 character -- the length that crypt says the sha-512 should be)

View 3 Replies View Related

Ubuntu Security :: Secure A Terminal Server, So That It Can't Be Hacked By Bruteforce/divtionary Tools?

Oct 8, 2010

How to secure a Terminal Server. so that it can't be hacked by bruteforce/divtionary tools ?

View 7 Replies View Related

Security :: PDFs Are AES Cipher-able As Of The Acrobat 7 Spec- Any GNU Tools To Handle It?

Jun 6, 2011

I've been using pdfTk to encrypt PDFs for distribution to unsophisticated users (that is, users without PGP keys or the will to get one). RC4 encryption, although reasonably adequate for my use, is relatively insecure. I would be more comfortable with AES. Have any gnu tools emerged that implement AES within a PDF container?

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved