Results 1 to 4 of 4

Thread: System hardening and defense

  1. #1
    WWJudasD
    Guest

    Default System hardening and defense

    I was wondering if any efforts have been made to the Backtrack OS itself to harden it against attacks. A list of features and tools would be wonderful, but I wasn't sure if one was available.

    The dilemma I have for upgrading to BT4, which is already kind of a foregone conclusion for me, is that I'm not sure what differentiates BT4 from Ubuntu with several useful tools prepackaged, a shiny interface, and what I think of as a separate "keychain of trust." A list of features would be helpful.

  2. #2
    Good friend of the forums
    Join Date
    Feb 2009
    Posts
    356

    Default

    you're the one who is supposed to protect your OS from intruders. Hardening a distribution makes it unpleasant experience for users who don't care about hardening and it limits usability in many cases. So ... you can just enable ufw as a start, use only certificate auth for sshd, then move on to deeper hardning, if you need it.

  3. #3
    Moderator KMDave's Avatar
    Join Date
    Jan 2010
    Posts
    2,281

    Default

    You could check the Wiki for a list of tools provided by BT and you could also check out the dev's blog for a featurelist.
    Tiocfaidh ár lá

  4. #4
    Moderator
    Join Date
    Jan 2010
    Posts
    167

    Default

    Quote Originally Posted by WWJudasD View Post
    I was wondering if any efforts have been made to the Backtrack OS itself to harden it against attacks. A list of features and tools would be wonderful, but I wasn't sure if one was available.
    you can find lots of hardening tutorials in the net, for example ...

    http://iase.disa.mil/stigs/checklist/index.html

    there is a nice tool called lynis ...

    http://www.rootkit.nl/projects/lynis.html

    m-1-k-3

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •