Security - News & Howtos]
Security - Downloads]
|Linux Security - News &
GNU Linux Security Information] - this page
addresses Debian's status with respect to various known security holes,
which could potentially affect Debian.
Linux: Security Announcements] - This page
regularly informs you about security issues concerning SUSE Linux.
Security Resource Center] - provides a variety of
ways to help improve the security of your Linux- based IT
- this site exists to provide you with meaningful information about
security in the Mandrake Linux distribution.
- Security Announcements.
Advisories] - provides a centralized security
advisory resource to members of the Linux / BSD / Open Source
Sicherheitsservice] - Auf diesen Seiten finden Sie
alle Sicherheitsmeldungen, die von den wichtigsten Distributionen
- Bugtraq Archive].
Quick-Start HOWTO for Linux] - This document is a
an overview of the basic steps required to secure a Linux installation
from intrusion. It is intended to be an introduction.
Quick-Start HOWTO for Redhat Linux] - is a an
overview of the basic steps required to secure a Linux installation
from intrusion. It is intended to be an introduction.
Debian Manual] - describes security in the Debian
project. Starting with the process of securing and hardening the
default Debian GNU/Linux distribution installation. It also covers some
of the common tasks to set up a secure network environment using Debian
GNU/Linux, gives additional information on the security tools available
and talks about how security is enforced in Debian by the security
zum Absichern von Debian] - Dieses Dokument
beschreibt den Prozess, eine Debian- Standard- Installation abzusichern
und abzuhaerten. Es deckt die alltaegliche Arbeit, eine sichere
Netzwerkumgebung mit Debian GNU/Linux zu schaffen ab, und gibt
zusaetzlich Informationen über verfuegbare Sicherheits- Tools
und die Arbeit des Debian Sicherheit-Teams.
Security HOWTO] - This document is a general
overview of security issues that face the administrator of Linux
systems. It covers general security philosophy and a number of specific
examples of how to better secure your Linux system from intruders.
Your Unix/Linux OS] - Articles and information to
help you understand the holes and vulnerabilities that might be present
in a Unix or Linux operating system and the tools and utilities
commonly used with them as well as how you can configure your system to
be as secure as possible..
Configuration Guidelines] - This document describes
commonly exploited UNIX system configuration problems and recommends
practices that can be used to help deter several types of break-ins.
Systemsicherheitsguide] - beschaeftigt sich mit der
Absicherung und generellen Aspekten der Computer- Sicherheit eines
in Netzen] - ist eine hervorragende Arbeit zum
Thema Sicherheit in Netzen in deutsch.
Resources] - Many documentations.
- beschreibt eine Vielzahl von Methoden, Firewall-Komponenten
zusammenzusetzen, und befasst sich mit deren Vor- und Nachteilen.
und Firewall-Ecke] - bietet: Allgemeines zu
Firewalls, Literaturlisten, Mailinglisten, Newsgroups, FAQs,
FAQ] - in deutsch & english.
FAQ] - in deutsch.
and Proxy Server HOWTO] - This document is designed
to describe the basics of firewall systems and give you some detail on
setting up both a filtering and proxy firewall on a Linux based system.
IPCHAINS-HOWTO] - This document aims to describe
how to obtain, install and configure the enhanced IP firewalling chains
software for Linux, and some ideas on how you might use them.
and Security Site] - offers a "Firewall Design
Tool", iptables Tutorial, Firewall Scripts and links to Reference
Papers, Information Sites, Security Software Sites and much more.
iptables-Skripte] - fuer den Hausgebrauch.
Die Regeln sind zwar in der Grundkonfiguration von aussen dicht,
erlauben aber lokalen Usern allerhand, was im prof. Umfeld unerwuenscht
Firewall Generator for IPTables] - generates an
iptables firewall script for use with the 2.4 linux kernel.
Tutorial] - This document will guide you through
the setup process of netfilter/iptables step by step.
2.4 Packet Filtering HOWTO] - This document from
Rusty Russell describes how to use iptables to filter out bad packets
for the 2.4 Linux kernels.
2.4 NAT HOWTO] - describes how to do masquerading,
transparent proxying, port forwarding, and other forms of Network
- ist eine deutsche Uebersetztung des Linux 2.4 Packet
Filtering HOWTO. "Dieses HOWTO wechselt zwischen einer
leichten Einfuehrung und rohen Enthuellungen".
- beschreibt auf deutsch, wie man Masquerading, transparente Proxies,
Port Forwarding und andere Formen der Network Address Translation mit
dem 2.4er Linuxkernel einsetzen kann.
FAQ] - contains the Frequently Asked Questions as
encountered on the netfilter mailing list.
to netfilter/iptables] - Configuring firewalls for
Linux (kernel 2.4.x) using netfilter/iptables.
Netfilter IPTABLES Firewall Page] - offers many
links to iptables- scripts, FAQs, Howtos, Tutorials and other Network
- Die Firewall des Kernels 2.4] - Dieses Howto von Wolfgang
Kinkeldei vermittelt kompakt und verstaendlich die zur
Verfuegung stehenden Parameter.
im Kabelnetzwerk] - 10 Gebote fuer den Schutz der
elektronischen Privatsphaere im Breitbandinternet (Kabelmodem, xDSL,
ISDN und andere).
documentation] - "If you don't understand the basic
principles behind public key cryptography, then you may very well
jeopardize both your own and other people's security, and PGP will only
give you a false sense of safety".
|Linux Security - Downloads
- is an extremely large and current security tools resource.
Packetstorm is a non-profit organization comprised of security
professionals dedicated to providing the information necessary to
secure the World's networks.
Monitoring Tools] - This is a list of tools used
for Network (both LAN and WAN) Monitoring tools and where to find out
more about them. The audience is mainly network administrators.
Project] - security/hacking tools.
Security] - Scanners, Access Control, Auditing ....
- Computer Security Resource. Exploits, Hacking, Anonymity, Cracking,
Encryption, Phreaking, OS Security, Virii ... and Books devoted to
Downloads: Security] - Security/Hacking Tools like:
Scanner, Intrusion Detection System , Password Cracker, SSH and many
Mobile Research Center] - Most of the stuff here
deals with computer security. All of NMRC's hack and cracks will bring
forth the idea that you cannot secure a system for long -- sooner or
later someone will find a way around the obstacle.
Linux] - is a research prototype of the Linux kernel
and a number of utilities with enhanced security functionality designed
simply to demonstrate the value of mandatory access controls to the
Linux community and how such controls could be added to Linux.
- is a powerful tool for network monitoring and data acquisition. This
program allows you to dump the traffic on a network. It can be used to
print out the headers of packets on a network interface, filter packets
that match a certain expression.
- is a multipurpose sniffer/interceptor/logger for switched LAN. It
supports active and passive dissection of many protocols (even ciphered
ones) and includes many feature for network and host analysis, that are
integrated with a easy-to-use and pleasureful ncurses interface.
Administrator's Tool for Analyzing Networks (SATAN)]
- recognizes several common networking-related security problems, and
reports the problems without actually exploiting them.
- the "Security Administrator's Integrated Network Tool" is a
vulnerability-assessment scanner. SAINT has been released under the
original SATAN license and conforms to the Open Source Definition.
- is a free network protocol analyzer for Unix and Windows. It allows
you to examine data from a live network or from a capture file on disk.
You can interactively browse the capture data, viewing summary and
detail information for each packet. Ethereal has several powerful
features, including a rich display filter language and the ability to
view the reconstructed stream of a TCP session.
Security Scanner] - is a utility for network
exploration or security auditing. It supports ping scanning, many port
scanning techniques, and TCP/IP fingerprinting. Nmap also offers
flexible target and port specification, decoy scanning, determination
of TCP sequence predictability characteristics, sunRPC scanning,
reverse-identd scanning, and more. Console and X-Window versions are
- is a free, powerful, up-to-date and easy to use remote security
scanner. Nessus is currently rated among the top products of its type
throughout the security industry and is endorsed by professional
information security organizations such as the SANS Institute.
- is an active sniffer, based on libpcap and libnet. It provides
methods for aggressive sniffing on switched local area network
environments. It dumps the payload of all the TCP packets received on
the specified ports.
- is a tool to locally check for signs of a rootkit.
Hunter] - (rkhunter) scans for
rootkits, backdoors and local exploits.
Coroner's Toolkit (TCT)] - is a collection of tools
that are either oriented towards gathering or analyzing forensic data
on a Unix system. It is primarily designed for Unix systems, but it can
some small amount of data collection & analysis from non-Unix
- is a file system integrity and intrusion detection tool that allows
to trace what changes have occured on a file system, when these changes
have occured, and who was logged into the system at the respective time.
- is a daemon intended to catch someone installing a rootkit or running
a packet sniffer. It is designed to run continually with a small
footprint under an innocuous name. When triggered, it sends email,
appends to a logfile, and disables networking or halts the system.
- (previously known as TASK) is a collection of UNIX- based command
line file system and media management forensic analysis tools. The file
system tools allow you to examine file systems of a suspect computer in
a non- intrusive fashion.
Recorder] - captures data transmitted as part of
TCP connections (flows), and stores data in a way that is convenient
for protocol analysis or debugging. tcpflow understands TCP sequence
numbers and will reconstruct data streams regardless of retransmissions.
Forensic Browser] - is a graphical interface to The
Sleuth Kit (TASK). Autopsy allows one to view allocated and deleted
file system content in a "File Manager" style interface and perform key
- is an LKM that is designed to investigate and detect rootkits.
Carbonite even works with LKM rootkits that patch calls to /proc. It
works like lsof and ps at the kernel level, querying every process in
Linux's task_struct, which is the kernel structure that maintains
information on every running process in Linux.
- is a linux tool for conducting forensic examinations. Although
intended for law enforcement purposes, it may be useful to other
members of the community. Foremost reads through a file, such as a dd
image file or a disk partition and extracts file.
- is a cross-platform, lightweight network intrusion detection tool
that can be deployed to monitor small TCP/IP networks and detect a wide
variety of suspicious network traffic as well as outright attacks.
- is a (commercial) tool that checks to see what has changed on your
system. The program monitors key attributes of files that should not
change, including binary signature, size, expected change of size, etc.
Tools] - provide host-level security services for
the Unix platform. PortSentry, LogSentry, and HostSentry protect
against portscans, automate log file auditing, and detect suspicious
login activity on a continuous basis.
- (System iNtrusion Analysis and Reporting Environment) is a series of
log collection agents that facilitate centralised analysis of audit log
data. Agents are available for Linux, Windows, Solaris, IIS, Lotus
Notes, Irix, AIX, ISA/IIS & more.
- is an 802.11 layer2 wireless network detector, sniffer, and intrusion
detection system. Kismet will work with any wireless card which
supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a,
and 802.11g traffic.
- is a wireless LAN (WLAN) tool which recovers encryption keys.
AirSnort operates by passively monitoring transmissions then computing
the encryption key when enough packets have been gathered.
AP] - generates thousands of counterfeit 802.11b
access points and therefore confuses Wardrivers, NetStumblers, Script
Kiddies, and other undesirables.
- is an open source tool for breaking 802.11 WEP secret keys using the
latest discovered weakness of RC4 key scheduling.
- is a 802.11 WEP key cracker. It implements the so-called Fluhrer -
Mantin - Shamir (FMS) attack, along with some new attacks by a talented
hacker named KoreK.
- is a tool designed to teach how WEP works, what different
vulnerabilities has, and how they can be used in practice to break a
WEP protected wireless network.
- is a WLAN open source Linux tool for breaking 802.11 WEP keys. This
tool is based on an active dictionary attack that tests millions of
words to find the right key.
the Ripper] - is a fast password cracker, currently
available for many flavors of Unix. Its primary purpose is to detect
weak Unix passwords.
Password & Registry Editor] - This is a
utility to (re)set the password of any user that has a valid (local)
account on your NT system by a single floppy that uses Linux as the OS.
- The netfilter/iptables project is the Linux 2.4.x
or above firewalling subsystem. It delivers you the functionality of
packet filtering (stateless or stateful), all different kinds of NAT
(Network Address Translation) and packet mangling.
- is a user interface to netfilter/iptables and
Linux policy routing or traffic control, allowing you to edit firewall
rules and configure the firewall to "mark" packets for policy routing
or for class based queueing (CBQ).
- is an iptables firewall for use with the 2.4.x
series of the Linux kernel. It is easily configured through a single,
well commented configuration file. gShield is released under the GNU
General Public License (GPLv2).
- is an Open Source visual firewall program. The software aims to
combine ease of use with powerful features, therefore serving both
Linux desktop users and system administrators.
- The Shoreline Firewall, more commonly known as "Shorewall", is an iptables
based firewall that can be used on a dedicated firewall system, a
multi-function masquerade gateway/server or on a standalone Linux
Firewall] - is an ipchains
based firewall that can be used on a dedicated masquerading firewall
machine (including LRP), a multi-function masquerade gateway/server or
on a standalone Linux system.
- is a powerful but lightweight firewall for heavy use systems. Be
prepared to spend some time setting this up. If you are looking for a
"quick fix", then you are on the wrong site. BullDog is NOT a quick
fix, but rather one step in a complete security policy. It supports ipchains
- is a web-based utility for building and configuring your ipchains
or iptables based Linux firewall. InnerTek Software
currently offers two versions of fBuilder: fBuilder Lite - a free
version of fBuilder that includes a standard set of features and
- is a tool that interactively builds a firewall using Linux' ipfwadm
or ipchains firewalling.
- is a KDE application designed to manage the netfilter
functionalities that come with the kernels 2.4 and later.
Builder] - is multi-platform firewall configuration
and management tool. Firewall Builder currently supports iptables,
ipfilter, OpenBSD PF
and Cisco PIX.
Firewall Generator for IPTables] - is designed to
easily generate a full-featured iptables
configuration script with a variety of the most commonly desired
- is a free implementation of Telnet and SSH for Win32 and Unix
platforms, along with an xterm terminal emulator.
for Windows] - is a free package that installs a
minimal OpenSSH server and client utilities in the Cygwin package
without needing the full Cygwin installation.
- is a FREE version of the SSH protocol suite of network connectivity
tools that increasing numbers of people on the Internet are coming to
rely on. OpenSSH encrypts all traffic (including passwords) to
effectively eliminate eavesdropping, connection hijacking, and other
- is a client that implements the SSH1 and SSH2 protocols. It is
written in pure Java. MindTerm can be used as stand alone software to
access standard SSH-aware hosts. Like any SSH client MindTerm can also
be used as a client to an AppGate Server system for extended
Authorization, Authentication and VPN functionality.
- is a complete and free replacement for PGP. Because it does not use
the patented IDEA algorithm, it can be used without any restrictions.
GnuPG is a RFC2440 (OpenPGP) compliant application.
- is a Gnome interface for GnuPG. It's main purpose is to be a PGP/GPG
Key Manager, though it has other components including a text editor and
- Here you may download the latest freeware PGP version, whether you
want the international or the US variant.
- is a simple, free, open source KDE frontend for gpg. It will be part
of the official KDE 3.2.
- is a command line password database program for Unix. It is
compatible with Counterpane's Win32 Password Safe software. It can also
copy the passwords into the X selection and clipboard, but it doesn't
open a visible window. The database is encrypted with blowfish, and a
single passphrase decrypts it all.
- With PwManager you can easily manage your passwords. PwManager saves
your passwords blowfish- encrypted in one file, so you have to remember
only one master- password instead of all. Instead of the master-
password you can use a chipcard, so you don't have to remember a
password to access the list.
- is a straight- forward, easy- to- use password manager that maintains
compatibility with Password Safe files.
- is an easy-to-use password manager written in JAVA. So it runs on any
platform provided that there is an appropriate Java- Virtual- Machine
OpenAntiVirus.org Projects] - offers specialized
Open Source anti-virus,
computer security and network security software.
AntiVirus] - is an anti-virus toolkit for UNIX. The
main purpose of this software is the integration with mail servers
sanitizer] - can scan email attachments for
viruses. Other things it can do: block or "mangle" attachments based on
their file names, disable potentially dangerous HTML code, such as
Antivirus for Linux] - is available in many
versions (products and services to suit both the home user as well as
the corporate user). The Version for Workstations is FREE for Home
for Linux and FreeBSD] - is a comprehensive,
flexible anti-virus program. Without a license key AntiVir will run in
a restricted Demo mode only. For further testing you can order an
evaluation key for free.
for Linux] - is an antivirus solution for the Linux
environment. Considering its robust design, it is primarily intended
for Linux-based servers; however, it can easily be used on desktop
computers as well.
Virus Control (NVC) for Linux] - offers both On-
access and On- demand scanning of files residing on the servers or
Antivirus for Linux] - is an antivirus designed to
be managed from the command line or console. It scans files using both
string searches and heuristic methods.
Anti-Virus] - protects your network, desktop and
even remote laptop computers from viruses and spam.
Antivirus] - Complete virus defense solutions
designed for easy virus prevention on Linux systems.
- is a Perl script that virus scans http downloads request on a UNIX
server after passing through the Squid proxy server.
Redirector] - is a Squid helper Script, to get
Virus scanning for defined Extensions. The Script was tested with
Python, pyclamav, ClamAV and Squid.
- is an Open Source web content filter. It filters the actual content
of pages based on many methods including phrase matching, PICS
filtering and URL filtering.
Anti-Virus Plugin] - is a GPL addon that takes
Virus Scanning capabilities and integrates them into the content
filtering web proxy DansGuardian.
- is a combined filter, redirector and access controller plugin for
Squid. It is free, very flexible, extremely fast, easily installed and
portable. squidGuard has many powerful configuration options.
- is a web proxy with advanced filtering capabilities for protecting
privacy, filtering web page content, managing cookies, controlling
access, and removing ads, banners, pop-ups and other obnoxious junk.