Ubuntu Security :: Are The Tools Backtrack Uses Compatible With
Feb 23, 2011
Im trying to run some penetration testing on my home wireless and want to know if the tools that backtrack uses are available in the repository.
Specifically tools that can be used to sniff out valid mac addresses and breaking wep encryption-what tools am i looking for?
View 1 Replies
ADVERTISEMENT
Aug 21, 2010
Ok so I did some stupid stuff and tried to install some of the Backtrack 4 tools. Now when I tried to install VLC player in terminal I get this:"ph@top:~$ sudo apt-get install vlc Reading package lists. Done Building dependency tree Reading state information... Done Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation:
[Code]...
View 8 Replies
View Related
Jun 19, 2011
If there any possibility to install all backtrack 5 programs into my fedora 15 or not and how? Penstest Tools !
View 3 Replies
View Related
Jul 31, 2010
how to install penetration testing tools from Backtrack 4 (offensive-security) repository like all other programs (NOT IN /pentest DIRECTORY).
View 1 Replies
View Related
Sep 26, 2010
i like open suse style and i knew the backtrack is the best in the security issues. so i wanna a way that add the backtrack tools to my suse 11
View 2 Replies
View Related
Feb 5, 2010
Installing backtrack4 tools with menu structure in Kubuntu 9.10 *NOTE* This WILL break your kpackagekit !!! You will need to reinstall kpackagekit after the installation is complete or fix it with synaptic. *This may or may not break your system so do at your own risk* For this to work you will need to follow these instructions EXACTLY as it is here. Go to: [URL] Download the tarzip and open it up. INSTALLING THE BACKTRACK SUB MENU STRUCTURE
Place the menu_backup folder in your home directory. <<----YOU WILL NEED THIS FOR THIS TO WORK Open the BT4-app-list folder and place the backtrack.txt1 file also in your home directory. Open a shell and type: kdesudo dolphin /etc/xdg/menus Delete the kd4-applications.menu file. (dont worry, I have provided a backup copy in the download) Open the BT4-kde4-applicantions.menu folder and place it where you deleted the old menu. Now you can exit.
Now you have the bt4 sub menu. ADDING THE BT4 GPG KEY AND REPO Open a shell and type: wget -q [URL] This adds the GPG key. Then in a shell type: sudo echo "deb [URL] pwnsauce main microverse macroverse restricted universe multiverse" > /etc/apt/sources.list
[Code]....
View 3 Replies
View Related
Jun 9, 2011
Looking for resource to load into my ubuntu distro I'm using my own mix of Zorin os 5 and Studio I want to install backtrack tools is there a mirror out there for ver4 or 5 I need the resource and gpl keys
View 3 Replies
View Related
May 22, 2011
love security/pentest tools. This script adds ALL the tools from the Security Spin, plus Metasploit. Feel free to modify it if need be.
View 12 Replies
View Related
May 7, 2011
This is the first version that supports 64bit and ARM in addition the the 32 bit. Should be very interesting. [URL]
View 8 Replies
View Related
Jan 13, 2011
I i've virtual machine that is running BackTrack4r2. I need to use the built-in tool Metaspolit in bt for assessing the security and vulnerability in websites The prob is that i dont have any about the Metaspolit tool.
View 10 Replies
View Related
May 4, 2011
I have installed a "backtrack 4" in order to test the the wireless network security of my router. how and which commands would be needed. Also, do I need to install airodump into the host?
View 1 Replies
View Related
Mar 27, 2011
I am using BackTrack 4 RC 2, Metasploit and Armitage. I am not able to see my target computers in the target area of the Armitage application after performing an Nmap quick scan (OS detect) on my wireless network (I have several computers connected to the wireless network).
Furthermore, I got the following warnings when trying to do the Nmap quick scan (OS detect):
Quote:
What do these warnings mean?
I was following these steps (as seen in this video: [url])
Code:
View 4 Replies
View Related
Apr 20, 2011
I would like to secure my site and I want to implement CAS for SSO, SELinux for the permission into my server and CODA, the last one I have read is not compatible with it, but I don't know if somebody have tried something. The most important request from HQ is use SELinux, they're conviced is the best one for the user permissions. I tried to look for some info in internet but there almost nothing.
View 2 Replies
View Related
Jun 24, 2010
I am currently using [URL] to send and receive faxes at work. I need the faxes to be encrypted. They offer public key encryption with PGP 9.8.2 They just need my public key to be compatible with their PGP version. I found a few statements at the GPG site, which may not be true for newer versions of gpg: PGP, Inc. refuses to accept Elgamal keys of type 20 even for encryption.They only support type 16.PGP 5.x does not accept v4 signatures for data material but OpenPGP requests generation of v4 signatures for all kind of data, that's why GnuPG defaults to them. By default, GnuPG encrypts your secret key using the Blowfish symmetric algorithm. Older PGPs will only understand 3DES, CAST5, or IDEA symmetric algorithms. PGP doesn't do Elgamal signing keys at all, so they are not usable with any version. I attempt to avoid using trial and error here, because an incompatible key may provoke loss of crucial information. It is difficult to estimate how long it would take them/me to find out that the key provided was not compatible; but probably it would entail a significant loss for the business.
View 1 Replies
View Related
Mar 25, 2010
I want to see how secure my company is. I am not too concerned about over the wire, more about someone hacking our wireless.
View 6 Replies
View Related
Jul 5, 2010
how efficient and effective are these snort, argus, ossec etc etc for an organization having 3500 PC Network, connected through 700+ Cisco Devices (Layer 2 and Layer 3), and scattered on 130 different sites (geographically)? what should be the combination of products and what should be the architecture for an efficient forensics activity?
View 2 Replies
View Related
Feb 3, 2010
Anyone know if the collection of STD tools have been included in Fedora repositories? Would love to recreate a STD disk based off of F12+ live cd and those tools. (Knoppix Secuity Tools Disk that seem to have died out a couple years back) Great tools, just the distro doesnt support new hardware....but if in a F12+package......all would be good.
View 3 Replies
View Related
Jun 20, 2011
It seems the fingerprint reader is detected, and several related packages are installed, but I can't find any tools available to either set it up. or activate it for use.
View 6 Replies
View Related
Jul 1, 2010
Is there a firewall installed and running in 10.04? If so are there any gui tools for configuring it and where are they? If there is not a firewall, what should I install to get one properly up and running?
View 2 Replies
View Related
Feb 16, 2011
software to use against Intrusion and such. The thing is that I don't want to have several anti virus programs running at the same time due to collision.
View 9 Replies
View Related
Apr 10, 2011
Quote: The importance of security should never be underestimated. The consequences of losing data can be disastrous for any organisation. For example, the loss of a single unencrypted laptop may have huge repercussions. This could include breaching data protection legislation with the risk of a significant fine, a loss in the confidence of an organisation, as well as the risk that sensitive data may fall into the hands of a competitor or third party with malicious intent.
View 1 Replies
View Related
Apr 15, 2011
For those with IT jobs, how do you handle security monitoring for your company?
1.How do you determine what to monitor-- The most vulnerable assets, most critical or something else?
2.What kind of data do you collect for security monitoring purposes?
3.What tools and techniques do you use to analyze the data?
View 6 Replies
View Related
Jun 22, 2009
I have already developed file type filtering functions through squid. Now I want to deal with content filtering aspects... What tools are available there for so in linux?
View 6 Replies
View Related
May 21, 2011
iam working on mail server in redhat centos. i want to know how to secure my mail server for heavy loading , any monitoring tools in GUI or console , is any essential tool which is used in Like MNC for mail server..
i know few command in like top,netstat,etc through google but i willing to know some more
View 8 Replies
View Related
Feb 9, 2011
I am currently running a 64-bit Fedora 14 server which hosts a game server, a voice server, and remote desktop functionality, each on a distinct TCP port. I am currently using the built-in firewall to deny all traffic other than ICMP ping/pong and TCP traffic on those specific ports.I am looking for a graphical application which will let me monitor any connections being made to my server in order to keep an eye out for possible security concerns. To be more specific, I'd like to be able to see the source IP addresses, TCP/UDP ports, and individual bandwidth in use by external connections being made to the server, along with any other information that might be helpful in identifying a possible intrusion attempt.
View 3 Replies
View Related
May 28, 2010
I have been setting up multiple security system in the area and was wondering what was the easiest way is to get the camera information that one would need in setting up survellance systems like zoneminder. I use xawtv for testing and
PHP Code:
zmu -d <device_path> -q -v
But how can I get specific information about NTSC/PAL cameras or IP cameras. In other words is there a specific tool for that purpose? I can see my video cameras fine using xawtv -c /dev/video but can I look at those log files to see what setting it used for the cameras
View 1 Replies
View Related
Feb 9, 2010
is someone can guide the best open source tools to monitor as webbase,gui,shell prompt
View 1 Replies
View Related
Jul 3, 2009
I've been trying to write php or perl code to generate the sha-512 password hashes in fedora. I've been unable to do the hashing which is encoded in the shadow file on fedora core 11. Does anyone have php or perl code which provides the hashing algorithm. (All of my attempts result in the encrypted hashing being longer than 86 character -- the length that crypt says the sha-512 should be)
View 3 Replies
View Related
Oct 8, 2010
How to secure a Terminal Server. so that it can't be hacked by bruteforce/divtionary tools ?
View 7 Replies
View Related
Jun 6, 2011
I've been using pdfTk to encrypt PDFs for distribution to unsophisticated users (that is, users without PGP keys or the will to get one). RC4 encryption, although reasonably adequate for my use, is relatively insecure. I would be more comfortable with AES. Have any gnu tools emerged that implement AES within a PDF container?
View 2 Replies
View Related