Language Selection

English French German Italian Portuguese Spanish

Hacking Damn Vulnerable Linux

Filed under
Linux

If you can't exploit it, you can't secure it. I don't know if that quote has been said before, but if you are deeply interested about computer security or ethical hacking, that should be your main mantra. To fully learn how to secure a computer program, you must know how to break it and find vulnerabilities. In relation to this, there is a unique Linux distribution that is primarily created to help teach you about software security, its name is Damn Vulnerable Linux (DVL).

Damn Vulnerable Linux is a Slackware-based distro that is intentionally loaded with broken, ill-configured, outdated, and exploitable software for educational purposes. It is a 1.8GB live DVD that features easily breakable versions of Apache, MySQL, PHP, and FTP and SSH daemons. It also includes a good number of tools to help users compile, debug, and break applications running on these services such as GCC, GDB, NASM, strace, ELF Shell, DDD, LDasm, LIDa, etc. You can install Damn Vulnerable Linux natively on a PC, boot it from a USB flash drive, or install it using any virtualization software.

rest here




More in Tux Machines

Today in Techrights

10 Best Free Photo Editors For Linux

Linux has come a long way in terms of the applications that are available for the platform. Whatever your specific needs are, you can be sure that there are at least a few applications available for you to use. Today, we'll look at 10 free photo editors for Linux, and I must say, there are a lot of image editing tools available. This post selects just 10 of these awesome tools and talks about them briefly looking at what makes them stand out. In no particular order, let's get started. Read
more

Security: Adobe and Apple Fail/Fare Badly

  • In spectacular fail, Adobe security team posts private PGP key on blog
    Having some transparency about security problems with software is great, but Adobe's Product Security Incident Response Team (PSIRT) took that transparency a little too far today when a member of the team posted the PGP keys for PSIRT's e-mail account—both the public and the private keys. The keys have since been taken down, and a new public key has been posted in its stead.
  • Hackers Using iCloud's Find My iPhone Feature to Remotely Lock Macs and Demand Ransom Payments
    Over the last day or two, several Mac users appear to have been locked out of their machines after hackers signed into their iCloud accounts and initiated a remote lock using Find My iPhone.  With access to an iCloud user's username and password, Find My iPhone on iCloud.com can be used to "lock" a Mac with a passcode even with two-factor authentication turned on, and that's what's going on here.

Games: Open Source Puzzle Games and SDL 2.0.6 Release

  • Improve Your Mental Mettle with These Open Source Puzzle Games
    The puzzle genre often tests problem-solving skills enhancing both analytical and critical thinking skills. Word completion, pattern recognition, logical reasoning, persistence, and sequence solving are some of the skills often required to prosper here. Some games offer unlimited time or attempts to solve a puzzle, others present time-limited exercises which increase the difficulty of the puzzle. Most puzzle games are basic in graphics but are very addictive.
  • SDL 2.0.6 Released With Vulkan Helpers, DRM/KMS Driver
    SDL 2.0.6 was released on Friday as the latest feature update for this widely-used library that allows for more cross-platform portability of applications and games centered around input, audio, and video helpers.