il blog di iteam5.net

27.11.04

Helix il live cd linux per investigare

Helix è una versione personalizzata del "Knoppix Live Linux CD" contenente: i linux kernels 2.4.27 & 2.6.7), Fluxbox window manager, un sistema di hardware detection e diverse applicazioni (Incident Response / Forensics Tools, Network Utilities, Servers, Packet Sniffers and Assemblers, Vulnerability Assessment, Wireless tools).
La traccia ISO pesa soltanto 689 mega; masterizzatela, ed avrete un sistema studiato specificatamente per non modificare il computer su cui eseguite il cd, in modo da svolgere attività di System Forensics (Helix è usato dal SANS per il modulo formativo: System Forensics, Investigation and Response).

1 Commenti:

Blogger Francesco Passantino ha scritto...

Auditor security collection
The Auditor security collection is a Live-System based on KNOPPIX. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. Independent of the hardware in use, the Auditor security collection offers a standardised working environment, so that the build-up of know-how and remote support is made easier. Even during the planning and development stages, our target was to achieve an excellent user-friendliness combined with an optimal toolset. Professional open-source programs offer you a complete toolset to analyse your safety, byte for byte. In order to become quickly proficient within the Auditor security collection, the menu structure is supported by recognised phases of a security check. (Foot-printing, analysis, scanning, wireless, brute-forcing, cracking). By this means, you instinctively find the right tool for the appropriate task. In addition to the approx. 300 tools, the Auditor security collection contains further background information regarding the standard configuration and passwords, as well as word lists from many different areas and languages with approx. 64 million entries. Current productivity tools such as web browser, editors and graphic tools allow you to create or edit texts and pictures for reports, directly within the Auditor security platform.
Many tools were adapted, newly developed or converted from other system platforms, in order to make as many current auditing tools available as possible on one CD-ROM. Tools like Wellenreiter and Kismet were equipped with an automatic hardware identification, thus avoiding irritating and annoying configuration of the wireless cards.
http://www.remote-exploit.org/?page=auditor

21/12/04 19:12

 

Posta un commento

<< Home

Ultime notizie


hai provato la nostra toolbar?

sicurezza: tutte le news