It isn't easy to include only ten Linux open source security solutions, notably while network experts and security analysts have access to dozens, though not hundreds, of these. Different sets of tools are available for nearly every undertaking, tunnelling, sniffing, monitoring, and mapping. And for every situation—WiFi network, Web apps, database systems, etc. To compile the listing of must-have Linux security tools, we interviewed a committee of people (Vincent Danen, RedHat's vice president of product security; Andrew Schmitt, a representative of BluBracket Security Advisory Panel; Casey Bisson, Blu Brackets head of market expansion; as well as John Hammond, the Huntress' senior security researcher). The majority of them seem to be open-source software and free. Burp Suite Pro and Metasploit Pro are indeed the two that cost a lot of money. These are essential components of almost any organisational vulnerability analysis and penetration testing program. Through Linux Training, we'll look at Linux-based security devices and packages that are used for pen testing, analytics, reverse engineering, and more.
1. Impacket for internet protocol pen testing
- IPv4 and IPv6;
- ethernet, Linux;
- IP, UDP, TCP, IGMP, ICMP, ARP;
- SMB2, NMB, SMB1, SMB3;
- MSRPC Version 5, different types of transport: HTTP, TCP, SMB/NetBIOS, and SMB/TCP;
- NTLM, Plain, Kerberos, utilising hashes/password/keys/tickets;
- Parts of LDAP protocol execution and TDS (MSSQL).
2. Aircrack-ng, particularly for WiFi network safety
- Monitoring: Packet access and data exporting to text documents for subsequent operations by third-party programs.
- Targeting: Replay assaults, de-authentication, and packet injections to create phoney entry points.
- Checking: Testing the characteristics of WiFi adapters and drivers.
- WEP & WPA PSK Cracking (WPA 1 & 2).