Alpine Security and Rescue: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{{obsolete|The config-builder.py script this page references is no longer available at the linked location.}} | |||
The Alpine Security flavor (or short Alpine Security) provides a toolset to work on security auditing, forensics, system rescue, and teaching security testing methodologies. The tool list contains packages for code analysis, forensics and data recovery, reconnaissance, network statistics, VoIP, wireless lan, and IDS. The focus of Alpine Rescue is system maintenance, backup, and rescue tasks. | The Alpine Security flavor (or short Alpine Security) provides a toolset to work on security auditing, forensics, system rescue, and teaching security testing methodologies. The tool list contains packages for code analysis, forensics and data recovery, reconnaissance, network statistics, VoIP, wireless lan, and IDS. The focus of Alpine Rescue is system maintenance, backup, and rescue tasks. | ||
Revision as of 03:05, 30 May 2023
This material is obsolete ... The config-builder.py script this page references is no longer available at the linked location. (Discuss) |
The Alpine Security flavor (or short Alpine Security) provides a toolset to work on security auditing, forensics, system rescue, and teaching security testing methodologies. The tool list contains packages for code analysis, forensics and data recovery, reconnaissance, network statistics, VoIP, wireless lan, and IDS. The focus of Alpine Rescue is system maintenance, backup, and rescue tasks.
The target is not to start a competition with the Fedora Security Lab or Kali. But rather make it easy to use the particular tools with Alpine Linux in a small, non GUI, and Busybox-based system.
Package list
With the simple python-based config-builder script those pages can be transformed into a plaintext file for the usage with alpine-iso. For details please read this page.
Vulnerable test systems
Alpine Linux is a security-oriented Linux distribution. This made it a perfect base for hosting vulnerable web applications. In the list below you will find documentation about the installation and setup of such applications.