Knoppix STD

Knoppix STD

Knoppix STD (Security Tools Distribution) is a Live CD Linux distribution based on Knoppix that focuses on computer security tools. It includes GPL licensed tools in the following categories: authentication, password cracking, encryption, forensics, firewalls, honeypots, intrusion detection system, network utilities, penetration, packet sniffers, assemblers, vulnerability assessment and wireless networking. Knoppix STD version 0.1 was published January 24, 2004, on Knoppix 3.2, and therefore stagnated, lacking updated drivers and packages. A release date for version 0.2 has not yet been announced.

Tools

*Authentication tools located in /usr/bin/auth/ include freeradius 0.9.3.

*Encryption tools located in /usr/bin/crypto/ include 2c2, 4c, acfe, cryptcat, gifshuffle, gpg 1.2.3, ike-scan, mp3stego, openssl 0.9.7c, outguess, stegbreak, stegdetect, sslwrap, stunnel, super-freeSWAN 1.99.8, texto and xor-analyze.

*Forensics tools located in /usr/bin/forensics/ include sleuthkit 1.66, autopsy 1.75, biew, bsed, consh, coreography, dcfldd, fenris, fatback, foremost, ftimes, galleta, hashdig, hdb, mac-robber, md5deep, memfetch, pasco, PhotoRec, readdbx, readoe, rifiuti, secure_delete, TestDisk, wipe, and other typical system tools used for forensics (dd, lsof, strings, grep, etc.)

*Firewall tools located in /usr/bin/fw/ include blockall, flushall, firestarter, firewalk, floppyfw, fwlogwatch, iptables 1.2.8, gtk-iptables and shorewall 1.4.8-RC1,

*Honeypots located in /usr/bin/honeypot/ include honeyd 0.7, labrea and thp

*Intrusion detection systems located in /usr/bin/ids/ include snort 2.1.0, ACID, barnyard, oinkmaster, hogwash, bro, prelude, WIDZ, aide, logsnorter, swatch, sha1sym, md5sum and syslogd.

*Network utilities located in /usr/bin/net-utils/ include LinNeighborhood, argus, arpwatch, cdpr, cheops, etherape, iperf, ipsc, iptraf, mrtg, mtr, ntop 2.1.0, rrdtool, samba and tcptrack.

*Password tools located in /usr/bin/pwd-tools/ include john 1.6.34, allwords2, chntpw, cisilia, cmospwd, djohn, pwl9x and rcrack.

*Servers located in /usr/bin/servers/ include apache, ircd-hybrid, samba, smail, sshd, vnc, net-snmp, tftpd and xinetd

*Packet sniffers located in /usr/bin/sniff/ include aimSniff, driftnet, dsniff, ethereal .0.10.0, ettercap 0.6.b, filesnarf, mailsnarf, msgsnarf, ngrep, tcpdump, urlsnarf and webspy.

*TCP tools located in /usr/bin/tcp-tools/ include arpfetch, arping, arpspoof, arpwatch, despoof, excalibur, file2cable, fragroute, gspoof, hopfake, hunt, ipmagic, lcrzoex, macof, packetto 1.10 and 2.0pre3, netsed, packETH, tcpkill and tcpreplay

*Tunnels located in /usr/bin/tunnels/ include cryptcat, httptunnel, icmpshell, netcat, shadyshell, stegtunnel, tcpstatflow and tiny shell.

*Vulnerability Assessment tools located in /usr/bin/vuln-test/ include ADM tools, amap 4.5, IRPAS, chkrootkit 0.43, ClamAV, curl, exodus, ffp, firewalk, hydra, nbtscan, ncpquery, nessus 2.0.9, nikto, nmap 3.48, p0f, proxychains, rpcinfo, screamingCobra, siege, sil, snot, syslog_deluxe, thcrut, vmap, warscan, xprobe2, yaph and zz.

*Wireless tools located in /usr/bin/wireless/ include airsnarf, airsnort, airtraf, gpsdrive, kismet 3.0.1, kismet-log-viewer, macchanger, wellenreiter and patched orinoco drivers

See also

*Auditor Security Collection
*Backtrack Live CD
*nUbuntu
*PHLAK: Another security tools live CD

External links

* [http://s-t-d.org/ Official website]
* [http://distrowatch.com/table.php?distribution=std Distrowatch page]
* [http://securitydistro.com/ SecurityDistro.com]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Knoppix STD — In diesem Artikel oder Abschnitt fehlen folgende wichtige Informationen: Artikel veraltet. Aktuelle Version 6.1 weicht stark von seinen Vorgängern ab (ressourcenschonenender, kein KDE mehr (CD Fassung), booten in die Konsole, Barrierefreier,… …   Deutsch Wikipedia

  • Knoppix — Parte de la familia GNU/Linux …   Wikipedia Español

  • Knoppix — Infobox OS name = Knoppix caption = Knoppix 5.3.1 with KDE developer = Klaus Knopper family = Linux source model = Open source working state = Current latest release version = 5.3.1 latest release date = release date|2008|03|27 language = German… …   Wikipedia

  • Comparison of Linux distributions — Technical variations of Linux distributions include support for different hardware devices and systems or software package configurations. Organizational differences may be motivated by historical reasons. Other criteria include security,… …   Wikipedia

  • IT-Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • IT-Sicherheitsbeauftragter — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • IT-Sicherheitsprüfung — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • IT-Sicherheitsüberprüfung — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • IT Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”