Test your environment's security with BackTrack


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Test your environment's security with BackTrack
# 1  
Old 06-13-2008
Test your environment's security with BackTrack

Fri, 13 Jun 2008 15:00:00 GMT
In the field of penetration testing, BackTrack is today's premier Linux distribution. Designed for, created by, and used by security professionals around the globe, BackTrack is the result of a merger between two earlier, competing distributions -- WHAX and Auditor Security Collection. The most recent beta version was released on June 10.


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Cybersecurity

Security of Environment Variables

Hello, I'm trying to help a client with passing decrypted passwords into child processes. I just want to ask how secure (or not) it is to pass those decrypted passwords via environment variables? Thanks, denden (2 Replies)
Discussion started by: denden
2 Replies

2. Cybersecurity

Backtrack or BlackUbuntu ?

I want to learn penetration testing, ethical hacking and other security based stuff.. 1) Please tell me which OS is the best Black Ubuntu or BackTrack ? 2) I already have Windows 7 and Ubuntu 11.10 in my laptop. So is there any way to convert my latest ubuntu to backtrack /Black ubuntu?... (2 Replies)
Discussion started by: Arun_Linux
2 Replies

3. UNIX for Dummies Questions & Answers

I've no idea how this command works and I've no test environment to see it's output

`echo $variable | cut -c$((${#variable}))-` I know the working of echo,pipe and cut to some extent. Thanks in advance . Video tutorial on how to use code tags in The UNIX and Linux Forums. (2 Replies)
Discussion started by: Ion_Shell
2 Replies

4. Shell Programming and Scripting

Test on string containing spacewhile test 1 -eq 1 do read a $a if test $a = quitC then break fi d

This is the code: while test 1 -eq 1 do read a $a if test $a = stop then break fi done I read a command on every loop an execute it. I check if the string equals the word stop to end the loop,but it say that I gave too many arguments to test. For example echo hello. Now the... (1 Reply)
Discussion started by: Max89
1 Replies

5. UNIX for Advanced & Expert Users

AIX, Solaris, Linux Test Environment Design Question

AIX, Solaris, Linux Test Environment Design Question We want to set an AIX, Solaris & Linux test environment. Here are the hardware equipments: (1) A Sunfire v100 (or v120), 1GB memory, two 36GB HDD. (2) An IBM pSeries 7026, 1 GB memory, 4 9GB HDD. (3) Five external HDD with SCSI... (1 Reply)
Discussion started by: aixlover
1 Replies

6. Solaris

AIX, Solaris, Linux Test Environment Design Question

AIX, Solaris, Linux Test Environment Design Question We want to set an AIX, Solaris & Linux test environment. Here are the hardware equipments: (1) A Sunfire v100 (or v120), 1GB memory, two 36GB HDD. (2) An IBM pSeries 7026, 1 GB memory, 4 9GB HDD. (3) Five external HDD with SCSI... (4 Replies)
Discussion started by: aixlover
4 Replies
Login or Register to Ask a Question
crypt.conf(4)                                                      File Formats                                                      crypt.conf(4)

NAME
crypt.conf - configuration file for pluggable crypt modules SYNOPSIS
/etc/security/crypt.conf DESCRIPTION
crypt.conf is the configuration file for the pluggable crypt architecture. Each crypt module must provide a function to generate a pass- word hash, crypt_genhash_impl(3C), and a function to generate the salt, crypt_gensalt_impl(3C). There must be at least one entry in crypt.conf with the same name as is stored in the crypt_algorithm_magic symbol of the module. The docu- mentation provided with the module should list this name. The module_path field specifies the path name to a shared library object that implements crypt_genhash_impl(), crypt_gensalt_impl(), and crypt_algorithm_magic. If the path name is not absolute, it is assumed to be relative to /usr/lib/security/$ISA. If the path name con- tains the $ISA token, the token is replaced by an implementation-defined directory name that defines the path relative to the calling pro- gram's instruction set architecture. The params field is used to pass module-specific options to the shared objects. See crypt_genhash_impl(3C) and crypt_gensalt_impl(3C). It is the responsibility of the module to parse and interpret the options. The params field can be used by the modules to turn on debugging or to pass any module-specific parameters that control the output of the hashing algorithm. EXAMPLES
Example 1: Provide compatibility for md5crypt-generated passwords. The default configuration preserves previous Solaris behavior while adding compatibility for md5crypt-generated passwords as provided on some BSD and Linux systems. # # crypt.conf # 1 /usr/lib/security/$ISA/crypt_bsdmd5.so Example 2: Use md5crypt to demonstrate compatibility with BSD- and Linux-based systems. The following example lists 4 algorithms and demonstrates how compatibility with BSD- and Linux-based systems using md5crypt is made avail- able, using the algorithm names 1 and 2. # # crypt.conf # md5 /usr/lib/security/$ISA/crypt_md5.so rot13 /usr/lib/security/$ISA/crypt_rot13.so # For *BSD/Linux compatibilty # 1 is md5, 2 is Blowfish 1 /usr/lib/security/$ISA/crypt_bsdmd5.so 2 /usr/lib/security/$ISA/crypt_bsdbf.so ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), passwd(4), attributes(5), crypt_unix(5) SunOS 5.10 10 Jun 2002 crypt.conf(4)