From Fedora Project Wiki
No edit summary |
No edit summary |
||
(6 intermediate revisions by the same user not shown) | |||
Line 38: | Line 38: | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Nmap | | '''Nmap''': testing port scanning, OS detection, version detection, script scanning, and traceroute. ''' UPDATE: [[QA:Testcase_Nmap]]''' | ||
| {{result|pass|athmane}} <ref>GUI zenmap not tested.</ref> | | {{result|pass|athmane}} <ref>GUI zenmap not tested.</ref> | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Wireshark tests''' | | '''Wireshark''' tests ''' UPDATE: [[QA:Testcase_Wireshark]]''' | ||
| {{result|fail|athmane|708250}} | | {{result|fail|athmane|708250}} | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Nikto | | '''Nikto''': test a web server scan, '''UPDATE: [[QA:Testcase_Nikto]]''' | ||
| {{result|pass|athmane}} <ref>HTTPS Scan fail (SSL support not available)</ref> | | {{result|pass|athmane}} <ref>HTTPS Scan fail (SSL support not available)</ref> | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''OpenVAS | | '''OpenVAS ''': generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html. '''UPDATE: [[QA:Testcase_OpenVAS]]''' | ||
| {{result|pass|athmane}} <ref>As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)</ref><ref>Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87</ref> | | {{result|pass|athmane}} <ref>As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)</ref><ref>Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87</ref> | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Ratproxy | | '''Ratproxy''': ran with various options, tested a web application and generated a report with ratproxy-report | ||
| {{result|pass|athmane}} | | {{result|pass|athmane}} | ||
| <references/> | | <references/> | ||
Line 66: | Line 66: | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''nc (netcat) | | '''nc (netcat)''': try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range. | ||
| {{result|pass|athmane}} | | {{result|pass|athmane}} | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Medusa''': brute-forcing a remote ssh server, with | | '''Medusa''': brute-forcing a remote ssh server, with a provided list of accounts and passwords. | ||
| {{result|pass|athmane}} | | {{result|pass|athmane}} | ||
| <references/> | |||
|- | |||
| '''httping''': httping a web server, both HTTP and HTTPS protocols tested. '''UPDATE: [[QA:Testcase_HTTPing]]''' | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |||
| '''Rkhunter''': updated database (there was no updates), then searched for rootkits. '''UPDATE: [[QA:Testcase_Rkhunter]]''' | |||
| {{result|pass|athmane}} <ref>CPU usage <= 20% </ref> <ref>a warning raised about SSH protocol v1 being allowed </ref> | |||
| <references/> | | <references/> | ||
|- | |- | ||
|} | |} |
Latest revision as of 17:07, 31 May 2011
Test Case | Security_Lab | References |
---|---|---|
QA:Testcase_Mediakit_ISO_Size | [1] |
|
QA:Testcase_Mediakit_ISO_Checksums | [1] |
|
QA:TestCases/Install_Source_Live_Image | [1] |
|
QA:Testcase_desktop_browser | ||
QA:Testcase_desktop_updates | [1] |
|
QA:Testcase_desktop_login | ||
QA:Testcase_desktop_panel_basic | ||
QA:Testcase_desktop_error_checks | [1] |
|
QA:Testcase_desktop_menus | [1] |
|
Nmap: testing port scanning, OS detection, version detection, script scanning, and traceroute. UPDATE: QA:Testcase_Nmap | [1] |
|
Wireshark tests UPDATE: QA:Testcase_Wireshark | ||
Nikto: test a web server scan, UPDATE: QA:Testcase_Nikto | [1] |
|
OpenVAS : generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html. UPDATE: QA:Testcase_OpenVAS | [1][2] | |
Ratproxy: ran with various options, tested a web application and generated a report with ratproxy-report | ||
Tcpdump: sniff network traffic . | ||
Hping3: basic tests | ||
nc (netcat): try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range. | ||
Medusa: brute-forcing a remote ssh server, with a provided list of accounts and passwords. | ||
httping: httping a web server, both HTTP and HTTPS protocols tested. UPDATE: QA:Testcase_HTTPing | ||
Rkhunter: updated database (there was no updates), then searched for rootkits. UPDATE: QA:Testcase_Rkhunter | [1] [2] |