From Fedora Project Wiki
No edit summary |
No edit summary |
||
Line 38: | Line 38: | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Nmap | | '''Nmap''': testing port scanning, OS detection, version detection, script scanning, and traceroute | ||
| {{result|pass|athmane}} <ref>GUI zenmap not tested.</ref> | | {{result|pass|athmane}} <ref>GUI zenmap not tested.</ref> | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Wireshark | | '''Wireshark''' tests | ||
| {{result|fail|athmane|708250}} | | {{result|fail|athmane|708250}} | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Nikto | | '''Nikto''': test a web server scan | ||
| {{result|pass|athmane}} <ref>HTTPS Scan fail (SSL support not available)</ref> | | {{result|pass|athmane}} <ref>HTTPS Scan fail (SSL support not available)</ref> | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''OpenVAS | | '''OpenVAS ''': generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html. | ||
| {{result|pass|athmane}} <ref>As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)</ref><ref>Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87</ref> | | {{result|pass|athmane}} <ref>As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)</ref><ref>Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87</ref> | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''Ratproxy | | '''Ratproxy''': ran with various options, tested a web application and generated a report with ratproxy-report | ||
| {{result|pass|athmane}} | | {{result|pass|athmane}} | ||
| <references/> | | <references/> |
Revision as of 13:33, 27 May 2011
Test Case | Security_Lab | References |
---|---|---|
QA:Testcase_Mediakit_ISO_Size | [1] |
|
QA:Testcase_Mediakit_ISO_Checksums | [1] |
|
QA:TestCases/Install_Source_Live_Image | [1] |
|
QA:Testcase_desktop_browser | ||
QA:Testcase_desktop_updates | [1] |
|
QA:Testcase_desktop_login | ||
QA:Testcase_desktop_panel_basic | ||
QA:Testcase_desktop_error_checks | [1] |
|
QA:Testcase_desktop_menus | [1] |
|
Nmap: testing port scanning, OS detection, version detection, script scanning, and traceroute | [1] |
|
Wireshark tests | ||
Nikto: test a web server scan | [1] |
|
OpenVAS : generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html. | [1][2] | |
Ratproxy: ran with various options, tested a web application and generated a report with ratproxy-report | ||
Tcpdump: sniff network traffic . | ||
Hping3: basic tests | ||
nc (netcat): try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range. | ||
Medusa: brute-forcing a remote ssh server, with a provided list of accounts and passwords. | ||
httping: httping a web server, both HTTP and HTTPS protocols tested. | ||
Rkhunter: updated database (there was no updates), then searched for rootkits. | [1] [2] |