Test your environment's security with BackTrack


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Test your environment's security with BackTrack
# 1  
Old 06-13-2008
Test your environment's security with BackTrack

Fri, 13 Jun 2008 15:00:00 GMT
In the field of penetration testing, BackTrack is today's premier Linux distribution. Designed for, created by, and used by security professionals around the globe, BackTrack is the result of a merger between two earlier, competing distributions -- WHAX and Auditor Security Collection. The most recent beta version was released on June 10.


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Cybersecurity

Security of Environment Variables

Hello, I'm trying to help a client with passing decrypted passwords into child processes. I just want to ask how secure (or not) it is to pass those decrypted passwords via environment variables? Thanks, denden (2 Replies)
Discussion started by: denden
2 Replies

2. Cybersecurity

Backtrack or BlackUbuntu ?

I want to learn penetration testing, ethical hacking and other security based stuff.. 1) Please tell me which OS is the best Black Ubuntu or BackTrack ? 2) I already have Windows 7 and Ubuntu 11.10 in my laptop. So is there any way to convert my latest ubuntu to backtrack /Black ubuntu?... (2 Replies)
Discussion started by: Arun_Linux
2 Replies

3. UNIX for Dummies Questions & Answers

I've no idea how this command works and I've no test environment to see it's output

`echo $variable | cut -c$((${#variable}))-` I know the working of echo,pipe and cut to some extent. Thanks in advance . Video tutorial on how to use code tags in The UNIX and Linux Forums. (2 Replies)
Discussion started by: Ion_Shell
2 Replies

4. Shell Programming and Scripting

Test on string containing spacewhile test 1 -eq 1 do read a $a if test $a = quitC then break fi d

This is the code: while test 1 -eq 1 do read a $a if test $a = stop then break fi done I read a command on every loop an execute it. I check if the string equals the word stop to end the loop,but it say that I gave too many arguments to test. For example echo hello. Now the... (1 Reply)
Discussion started by: Max89
1 Replies

5. UNIX for Advanced & Expert Users

AIX, Solaris, Linux Test Environment Design Question

AIX, Solaris, Linux Test Environment Design Question We want to set an AIX, Solaris & Linux test environment. Here are the hardware equipments: (1) A Sunfire v100 (or v120), 1GB memory, two 36GB HDD. (2) An IBM pSeries 7026, 1 GB memory, 4 9GB HDD. (3) Five external HDD with SCSI... (1 Reply)
Discussion started by: aixlover
1 Replies

6. Solaris

AIX, Solaris, Linux Test Environment Design Question

AIX, Solaris, Linux Test Environment Design Question We want to set an AIX, Solaris & Linux test environment. Here are the hardware equipments: (1) A Sunfire v100 (or v120), 1GB memory, two 36GB HDD. (2) An IBM pSeries 7026, 1 GB memory, 4 9GB HDD. (3) Five external HDD with SCSI... (4 Replies)
Discussion started by: aixlover
4 Replies
Login or Register to Ask a Question
PAM_SELINUX(8)							 Linux-PAM Manual						    PAM_SELINUX(8)

NAME
pam_selinux - PAM module to set the default security context SYNOPSIS
pam_selinux.so [close] [debug] [open] [nottys] [verbose] [select_context] [env_params] [use_current_range] DESCRIPTION
In a nutshell, pam_selinux sets up the default security context for the next execed shell. When an application opens a session using pam_selinux, the shell that gets executed will be run in the default security context, or if the user chooses and the pam file allows the selected security context. Also the controlling tty will have it's security context modified to match the users. Adding pam_selinux into a pam file could cause other pam modules to change their behavior if the exec another application. The close and open option help mitigate this problem. close option will only cause the close portion of the pam_selinux to execute, and open will only cause the open portion to run. You can add pam_selinux to the config file twice. Add the pam_selinux close as the executes the open pass through the modules, pam_selinux open_session will happen last. When PAM executes the close pass through the modules pam_selinux close_session will happen first. OPTIONS
close Only execute the close_session portion of the module. debug Turns on debugging via syslog(3). open Only execute the open_session portion of the module. nottys Do not try to setup the ttys security context. verbose attempt to inform the user when security context is set. select_context Attempt to ask the user for a custom security context role. If MLS is on ask also for sensitivity level. env_params Attempt to obtain a custom security context role from PAM environment. If MLS is on obtain also sensitivity level. This option and the select_context option are mutually exclusive. The respective PAM environment variables are SELINUX_ROLE_REQUESTED, SELINUX_LEVEL_REQUESTED, and SELINUX_USE_CURRENT_RANGE. The first two variables are self describing and the last one if set to 1 makes the PAM module behave as if the use_current_range was specified on the command line of the module. use_current_range Use the sensitivity level of the current process for the user context instead of the default level. Also suppresses asking of the sensitivity level from the user or obtaining it from PAM environment. MODULE TYPES PROVIDED
Only the session module type is provided. RETURN VALUES
PAM_AUTH_ERR Unable to get or set a valid context. PAM_SUCCESS The security context was set successfully. PAM_USER_UNKNOWN The user is not known to the system. EXAMPLES
auth required pam_unix.so session required pam_permit.so session optional pam_selinux.so SEE ALSO
pam.conf(5), pam.d(5), pam(8) AUTHOR
pam_selinux was written by Dan Walsh <dwalsh@redhat.com>. Linux-PAM Manual 06/16/2009 PAM_SELINUX(8)