Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
In the 4th post into this thread, I elaborate a bit on Backtrack.
In a nutshell, Backtrack isn't going to teach basic NSM (network security monitoring) or how to perform forensics or incident handling. Backtrack has a good set of tools included but those are useless if one doesn't know how to use the tools, and even if one becomes knowledgeable in using the tools, they'll probably not know what they're looking at when perusing output from those tools. Core skills need to be developed first, and once that is done, a good foundation is established. Bad foundation = house that will eventually have issues that will be seriously difficult to remedy.
For myself i can run as sudo all day long. Simply because i am the one who installed the OS on the computer. Everyone else in that class uses Windows 7 except for me and a friend of mine.
EDIT: Using ubuntu because yes, backtrack does have some nice tools. But if i need the tools i can simply get them on ubuntu. That, and what unix said about the foundation.
Last edited by dirtydog7655; 03-13-2011 at 10:02 AM.
Check out the winning papers for the Honeynet Project Challenges. In particular, I think Challenge 5 would be a good one to try for someone just starting out.
Check out the winning papers for the Honeynet Project Challenges. In particular, I think Challenge 5 would be a good one to try for someone just starting out.
NICE! I hadn't even thought of honeypots and honeynets. I haven't even run one before (although I understand the concept behind them).
NICE! I hadn't even thought of honeypots and honeynets. I haven't even run one before (although I understand the concept behind them).
Keep them coming, guys!
Yeah, I find the various tools and techniques people use to solve the challenges really interesting. I can't wait to see how people utilize the Linux memory image for the current challenge. Another cool thing is you don't even have to setup a honeypot, they provide the evidence from real attacks for anyone to download and analyze.
I was a finalist in one of the SANS Network Forensic Contests, which will continue providing challenges in analyzing PCAPs soon. Anyone interested in analyzing network traffic should definitely check that site out as well.
Yeah probably. What do you think of that one? I started using it a lot lately. I just might edit up the source code to do a few more things... If I make it better, I will probably submit my changes to the next version.
I must say, sounds and looks promising. I however do not have a use for it myself since a lot of the work i am doing is either in class or at home, instead of in a working environment. Unless you can suggest a couple ways for me to use it haha.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.