|
Message-Id: <201303271958.46601.tmb@65535.com>
Date: Wed, 27 Mar 2013 19:58:38 +0000
From: Tim Brown <tmb@...35.com>
To: kernel-hardening@...ts.openwall.com
Cc: Corey Bryant <coreyb@...ux.vnet.ibm.com>,
oss-security@...ts.openwall.com
Subject: Re: Security vulnerability tools
On Wednesday 27 Mar 2013 19:54:04 Corey Bryant wrote:
> Hi,
>
> I'd like to get a better understanding of tools used in the open source
> community (kernel and user space) to detect security vulnerabilities.
>
> I have a list below to get started. If anyone has any input, I'd
> appreciate it!
>
> I'll plan on updating http://oss-security.openwall.org/wiki/tools with
> anything it doesn't already have.
>
Hey Corey,
One you might want to add is unix-privesc-check from myself, @inquisb and
@pentestmonkey. There are two versions in existence:
1.x - @pentestmonkey's quick and dirty with some hacks by me
trunk - a full blown privesc check framework designed by me with contributions
from the other two, it has multiple modes of operation, a standard library
which can be leveraged for new checks and (already) enhanced capabilities.
Its not perfect yet, I still need to clean it up and port it to the commercial
UNIX platforms we support but it should give a good idea of where we're going
Once I've stabilised the API of trunk, it will become 2.x and we'll open it up
formerly for contributions.
It's on Google Code if people want to take a look:
* http://code.google.com/p/unix-privesc-check
Tim
--
Tim Brown
<mailto:tmb@...35.com>
Download attachment "signature.asc " of type "application/pgp-signature" (837 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.