From Fedora Project Wiki
No edit summary |
No edit summary |
||
Line 66: | Line 66: | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''nc (netcat) | | '''nc (netcat)''': try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range. | ||
| {{result|pass|athmane}} | | {{result|pass|athmane}} | ||
| <references/> | | <references/> | ||
Line 74: | Line 74: | ||
| <references/> | | <references/> | ||
|- | |- | ||
| '''httping''': httping a web server, both HTTP and HTTPS protocols tested. | |||
| {{result|pass|athmane}} | |||
| <references/> | |||
|- | |- | ||
| ''' | | '''Rkhunter''': updated database (there was no updates), then searched for rootkits. | ||
| {{result|pass|athmane}} | | {{result|pass|athmane}} <ref>CPU usage <= 20% </ref> <ref>a warning raised about SSH protocol v1 being allowed </ref> | ||
| <references/> | | <references/> | ||
|- | |||
|} | |} |
Revision as of 13:31, 27 May 2011
Test Case | Security_Lab | References |
---|---|---|
QA:Testcase_Mediakit_ISO_Size | [1] |
|
QA:Testcase_Mediakit_ISO_Checksums | [1] |
|
QA:TestCases/Install_Source_Live_Image | [1] |
|
QA:Testcase_desktop_browser | ||
QA:Testcase_desktop_updates | [1] |
|
QA:Testcase_desktop_login | ||
QA:Testcase_desktop_panel_basic | ||
QA:Testcase_desktop_error_checks | [1] |
|
QA:Testcase_desktop_menus | [1] |
|
Nmap tests: Port scanning, OS detection, version detection, script scanning, and traceroute | [1] |
|
Wireshark tests | ||
Nikto tests: Web server scan | [1] |
|
OpenVAS tests: generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html. | [1][2] | |
Ratproxy tests: ran with various options, tested a web application and generated a report with ratproxy-report | ||
Tcpdump: sniff network traffic . | ||
Hping3: basic tests | ||
nc (netcat): try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range. | ||
Medusa: brute-forcing a remote ssh server, with a provided list of accounts and passwords. | ||
httping: httping a web server, both HTTP and HTTPS protocols tested. | ||
Rkhunter: updated database (there was no updates), then searched for rootkits. | [1] [2] |