Difference between revisions of "Linux applications"
From Gender and Tech Resources
m (→Anti-Malware) |
m (→Security applications) |
||
Line 18: | Line 18: | ||
==== rkhunter ==== | ==== rkhunter ==== | ||
− | Rootkit Hunter (GNU GPL) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. Specifically, rkhunter is a shell script which carries out various checks on the local system to try and detect known rootkits and malware. It also performs checks to see if commands have been modified, if the system startup files have been modified, and various checks on the network interfaces, including checks for listening applications. rkhunter has been written to be as generic as possible, and so should run on most Linux and UNIX systems. It is provided with some support scripts should certain commands be missing from the system, and some of these are Perl scripts. | + | Rootkit Hunter (GNU GPL) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. Specifically, rkhunter is a shell script which carries out various checks on the local system to try and detect known rootkits and malware. It also performs checks to see if commands have been modified, if the system startup files have been modified, and various checks on the network interfaces, including checks for listening applications. rkhunter has been written to be as generic as possible, and so should run on most Linux and UNIX systems. It is provided with some support scripts should certain commands be missing from the system, and some of these are Perl scripts. |
* Website: http://rkhunter.sourceforge.net/ | * Website: http://rkhunter.sourceforge.net/ | ||
* FAQ: http://rkhunter.cvs.sourceforge.net/viewvc/rkhunter/rkhunter/files/FAQ | * FAQ: http://rkhunter.cvs.sourceforge.net/viewvc/rkhunter/rkhunter/files/FAQ | ||
* Mailing list: http://sourceforge.net/p/rkhunter/mailman/ | * Mailing list: http://sourceforge.net/p/rkhunter/mailman/ | ||
+ | * Available from repository. Requirements: Bourne Again Shell (Bash) and exim | ||
==== chrootkit ==== | ==== chrootkit ==== | ||
− | chkrootkit (Free software) is a tool to locally check for signs of a rootkit. It tests the following applications: aliens, asp, bindshell, lkm, rexedcs, sniffer, w55808, wted, scalper, slapper, z2, chkutmp, amd, basename, biff, chfn, chsh, cron, crontab, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, init, killall, ldsopreload, login, ls, lsof, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, tcpdump, top, telnetd, timed, traceroute, vdir, w, and write | + | chkrootkit (Free software) is a tool to locally check for signs of a rootkit. It tests the following applications: aliens, asp, bindshell, lkm, rexedcs, sniffer, w55808, wted, scalper, slapper, z2, chkutmp, amd, basename, biff, chfn, chsh, cron, crontab, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, init, killall, ldsopreload, login, ls, lsof, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, tcpdump, top, telnetd, timed, traceroute, vdir, w, and write. |
* Website: http://www.chkrootkit.org/ | * Website: http://www.chkrootkit.org/ | ||
* README: http://chkrootkit.org/README | * README: http://chkrootkit.org/README | ||
* FAQ: http://chkrootkit.org/faq/ | * FAQ: http://chkrootkit.org/faq/ | ||
+ | * Available from repository. | ||
=== Encryption === | === Encryption === | ||
Line 39: | Line 41: | ||
* Website: https://www.gnupg.org/ | * Website: https://www.gnupg.org/ | ||
* Documentation: https://www.gnupg.org/documentation/index.html (includes guides, FAQ's and mailinglists) | * Documentation: https://www.gnupg.org/documentation/index.html (includes guides, FAQ's and mailinglists) | ||
+ | * Available from repository. | ||
==== mcrypt ==== | ==== mcrypt ==== | ||
Line 44: | Line 47: | ||
* Website http://mcrypt.sourceforge.net/ | * Website http://mcrypt.sourceforge.net/ | ||
+ | * Available from repository. | ||
==== steghide ==== | ==== steghide ==== | ||
steghide (GNU GPL) is a steganography program that is able to hide data in various kinds of image- and audio-files. Steghide employs an algorithm which is undetectable by color-frequency based statistical tests. Steghide uses a graph-theoretic approach to steganography. The default encryption algorithm is Rijndael with a key size of 128 bits (which is AES - the advanced encryption standard) in the cipher block chaining mode. | steghide (GNU GPL) is a steganography program that is able to hide data in various kinds of image- and audio-files. Steghide employs an algorithm which is undetectable by color-frequency based statistical tests. Steghide uses a graph-theoretic approach to steganography. The default encryption algorithm is Rijndael with a key size of 128 bits (which is AES - the advanced encryption standard) in the cipher block chaining mode. | ||
Line 51: | Line 55: | ||
* Manual: http://steghide.sourceforge.net/documentation/manpage.php (english and spanish) | * Manual: http://steghide.sourceforge.net/documentation/manpage.php (english and spanish) | ||
* Mailing lists: http://sourceforge.net/p/steghide/mailman/ | * Mailing lists: http://sourceforge.net/p/steghide/mailman/ | ||
− | + | * Available from repository. Requirements: libmhash, libmcrypt, libjpeg, zlib | |
− | * | + | |
==== stunnel ==== | ==== stunnel ==== | ||
Stunnel (GNU GPL v2) is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer). It allows for securing non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Stunnel does not contain any crytographic code itself -- instead it relies on external SSL libraries. | Stunnel (GNU GPL v2) is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer). It allows for securing non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Stunnel does not contain any crytographic code itself -- instead it relies on external SSL libraries. | ||
Line 60: | Line 64: | ||
* HowTo: http://www.stunnel.org/howto.html (Installation and Authentication) | * HowTo: http://www.stunnel.org/howto.html (Installation and Authentication) | ||
* FAQ: http://www.stunnel.org/faq.html (Troubleshooting and Applications) | * FAQ: http://www.stunnel.org/faq.html (Troubleshooting and Applications) | ||
+ | * Available from repository as stunnel4. | ||
==== VeraCrypt ==== | ==== VeraCrypt ==== |
Revision as of 18:28, 13 July 2015
Contents
- 1 Installing applications
- 2 Stealth install of applications
- 3 Security applications
Installing applications
Stealth install of applications
- Launch Synaptic on the off-line computer you wish to install software packages on.
- Mark the packages you wish to install.
- Choose File-> Generate package download script.
- Save the script to your USB stick.
- Take the USB stick to an online linux computer and run the script on the USB stick. It will download only the packages required by the offline computer to the USB stick.
- Insert the USB stick into the offline computer.
- Launch Synaptic and click on File-> Add downloaded packages
- Select the directory on your USB stick containing the downloaded *.deb files and click Open. The packages will be installed.
Security applications
Anti-Malware
rkhunter
Rootkit Hunter (GNU GPL) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. Specifically, rkhunter is a shell script which carries out various checks on the local system to try and detect known rootkits and malware. It also performs checks to see if commands have been modified, if the system startup files have been modified, and various checks on the network interfaces, including checks for listening applications. rkhunter has been written to be as generic as possible, and so should run on most Linux and UNIX systems. It is provided with some support scripts should certain commands be missing from the system, and some of these are Perl scripts.
- Website: http://rkhunter.sourceforge.net/
- FAQ: http://rkhunter.cvs.sourceforge.net/viewvc/rkhunter/rkhunter/files/FAQ
- Mailing list: http://sourceforge.net/p/rkhunter/mailman/
- Available from repository. Requirements: Bourne Again Shell (Bash) and exim
chrootkit
chkrootkit (Free software) is a tool to locally check for signs of a rootkit. It tests the following applications: aliens, asp, bindshell, lkm, rexedcs, sniffer, w55808, wted, scalper, slapper, z2, chkutmp, amd, basename, biff, chfn, chsh, cron, crontab, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, init, killall, ldsopreload, login, ls, lsof, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, tcpdump, top, telnetd, timed, traceroute, vdir, w, and write.
- Website: http://www.chkrootkit.org/
- README: http://chkrootkit.org/README
- FAQ: http://chkrootkit.org/faq/
- Available from repository.
Encryption
gnupg
GnuPG (GNU GPL v3+) stands for GNU Privacy Guard and is a tool for secure communication and data storage. The software has two main uses. The first is to encrypt data to ensure its privacy. The second is to "sign" data so that others can determine it is authentic and unmodified. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC 2440. GnuPG is a command line tool with features for easy integration with other applications. The default public key algorithms are DSA and Elgamal, but RSA is also supported. Symmetric algorithms available are AES (with 128, 192, and 256 bit keys), 3DES, Blowfish, CAST5 and Twofish. Digest algorithms available are MD5, RIPEMD/160, SHA-1, SHA-256, SHA-384, and SHA-512. Compression algorithms available are ZIP, ZLIB, and BZIP2 (with libbz2 installed).
- Website: https://www.gnupg.org/
- Documentation: https://www.gnupg.org/documentation/index.html (includes guides, FAQ's and mailinglists)
- Available from repository.
mcrypt
mcrypt (GPLv2) is a replacement for the old crypt package and crypt command, with extensions. It allows developers to use a wide range of encryption functions, without making drastic changes to their code. It allows users to encrypt files or data streams without having to be cryptographers. The companion to mCrypt is libmcrypt, which contains the actual encryption functions themselves, and provides a standardized mechanism for accessing them.
- Website http://mcrypt.sourceforge.net/
- Available from repository.
steghide
steghide (GNU GPL) is a steganography program that is able to hide data in various kinds of image- and audio-files. Steghide employs an algorithm which is undetectable by color-frequency based statistical tests. Steghide uses a graph-theoretic approach to steganography. The default encryption algorithm is Rijndael with a key size of 128 bits (which is AES - the advanced encryption standard) in the cipher block chaining mode.
- Website: http://steghide.sourceforge.net/
- Documentation: http://steghide.sourceforge.net/documentation.php (english and spanish)
- Manual: http://steghide.sourceforge.net/documentation/manpage.php (english and spanish)
- Mailing lists: http://sourceforge.net/p/steghide/mailman/
- Available from repository. Requirements: libmhash, libmcrypt, libjpeg, zlib
stunnel
Stunnel (GNU GPL v2) is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer). It allows for securing non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Stunnel does not contain any crytographic code itself -- instead it relies on external SSL libraries.
- Website: https://www.stunnel.org/index.html
- Documentation: http://www.stunnel.org/docs.html (english and polish)
- HowTo: http://www.stunnel.org/howto.html (Installation and Authentication)
- FAQ: http://www.stunnel.org/faq.html (Troubleshooting and Applications)
- Available from repository as stunnel4.
VeraCrypt
CipherShed
Firewalls/Network Gateways
Firestarter
Firestarter (GNU General Public License) is an Open Source visual firewall program. The software aims to combine ease of use with powerful features, therefore serving both Linux desktop users and system administrators. You can use the firewall creation wizard to create a basic firewall, then streamline it further using the powerful dynamic rules modifiers. Open and close ports with a few clicks, or stealth your services giving access only to a select few. Watch the real-time hit monitor as attackers probe your machine for open ports, in vain. Firestarter makes full advantage of GNOME but also works in most environments. While it protects both the firewall host itself as well as any client hosts connected to a local network from intrusion attempts, it does not impose restrictions on the services that the protected hosts themselves can access.
- Website: http://www.fs-security.com/
- Documentation http://www.fs-security.com/docs.php
- Mailing list http://www.fs-security.com/list.php
gufw
Gufw (GNU GPL v3) is for users bamboozled by firewalls. It has an easy to use interface for setting up inbound and outbound traffic rules for apps/services and ports. It is designed for beginners.
- Website: http://gufw.org/
netfilter
Netfilter (GNU GPL v2) is a framework that provides a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. A registered callback function is then called back for every packet that traverses the respective hook within the network stack. Software inside this framework enables packet filtering, network address [and port] translation (NA[P]T) and other packet mangling. iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target).
- Website: http://www.netfilter.org/
- HOWTOs http://www.netfilter.org/documentation/index.html#documentation-howto
- FAQ http://www.netfilter.org/documentation/index.html#documentation-faq
- Mailing lists http://www.netfilter.org/mailinglists.html