IPv6 Penetration Testing Pen testing on IPv6 networks: In Through the Back Door
Dec 17, 2012If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.
more »Capture File Filtering with Wireshark Reading a packet capture file with Wireshark and tshark
Aug 23, 2012Wireshark doesn’t just work in real time. If you save a history of network activity in a pcap file using a tool such as tcpdump, you can filter the data with Wireshark to search for evidence.
more »Side Channel Attacks Some web applications send unnecessary information to attackers
Aug 23, 2012Sometimes error messages or log entries are too verbose for their own good, disclosing valuable information to attackers.
more »OpenVAS The OpenVAS vulnerability scanner
Aug 23, 2012The more IT infrastructure complexity increases, the more indispensable vulnerability scanners become. If you are not interested in retaining the consulting services of a professional hacker, you might want to entrust the task of detecting vulnerabilities to a specialized software tool, such as OpenVAS.
more »Security Lessons: Database Security Protecting your database
Aug 23, 2012Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.
more »HTTPS Proxy Using a Squid proxy with HTTPS
Aug 23, 2012How do you monitor the network when your client systems are connecting to secure web servers through HTTPS? We’ll show you how to keep watch using the Squid proxy server and share some inventive certificate tricks.
more »Intrusion Detection with fail2ban
May 22, 2012For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight.
more »Customizing PortSentry Do you have a sentry to keep an eye on your servers?
Apr 24, 2012PortSentry monitors your ports and lets you know when they’ve been scanned.
more »Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
SUSE Dives into the Agentic AI Pool
SUSE becomes the first open source company to adopt agentic AI with SUSE Enterprise Linux 16.
-
Linux Now Runs Most Windows Games
The latest data shows that nearly 90 percent of Windows games can be played on Linux.
-
Fedora 43 Has Finally Landed
The Fedora Linux developers have announced their latest release, Fedora 43.
-
KDE Unleashes Plasma 6.5
The Plasma 6.5 desktop environment is now available with new features, improvements, and the usual bug fixes.
-
Xubuntu Site Possibly Hacked
It appears that the Xubuntu site was hacked and briefly served up a malicious ZIP file from its download page.
-
LMDE 7 Now Available
Linux Mint Debian Edition, version 7, has been officially released and is based on upstream Debian.
-
Linux Kernel 6.16 Reaches EOL
Linux kernel 6.16 has reached its end of life, which means you'll need to upgrade to the next stable release, Linux kernel 6.17.
-
Amazon Ditches Android for a Linux-Based OS
Amazon has migrated from Android to the Linux-based Vega OS for its Fire TV.
-
Cairo Dock 3.6 Now Available for More Compositors
If you're a fan of third-party desktop docks, then the latest release of Cairo Dock with Wayland support is for you.
-
System76 Unleashes Pop!_OS 24.04 Beta
System76's first beta of Pop!_OS 24.04 is an impressive feat.
