Avoid Hacks with Linux Test Tools - dummies

Avoid Hacks with Linux Test Tools

By Kevin Beaver

You can use many UNIX-based security tools to test your Linux systems. Some are much better than others. Either way, you need to take measures against hackers and test your system! Windows-based commercial tools seem to do as good a job as any. Some favorites are as follows:

  • BackTrack Linux toolset on a bootable CD or .iso image file

  • LanGuard for port scanning, OS enumeration, and vulnerability testing

  • NetScanTools Pro for port scanning, OS enumeration, and much more

  • Nmap for OS fingerprinting and detailed port scanning

  • QualysGuard for OS fingerprinting, port scanning, and very detailed and accurate vulnerability testing

    A tool such as QualysGuard can perform the majority of the security testing needed to find flaws in Linux. Another popular commercial alternative is Rapid7’s Nexpose.

  • Nessus for OS fingerprinting, port scanning, and vulnerability testing

  • THC-Amap for application version mapping

Hundreds if not thousands of other Linux hacking and testing tools are available on such sites as SourceForge.net and freecode.com. The key is to find a set of tools — preferably as few as possible — that can do the job that you need to do and that you feel comfortable working with.