<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Amurphy7</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Amurphy7"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Amurphy7"/>
	<updated>2026-05-02T08:54:16Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=15634</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=15634"/>
		<updated>2011-12-15T21:00:44Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
Apache is an HTTP web server which is crucial to all web-based interactions within the operating system. When using Damn Vulnerable Linux, Apache must be started before HTTP, PHP, or MySql services become available.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. Integrated Development Environments (IDEs), applications that provide comprehensive features for software programmers, are included for many languages, ranging from Dr. Scheme to Eclipse and JEdit.&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable Linux also includes disassemblers and debuggers, which are used heavily in breakpoint testing and reverse engineering. IDA free and Ollydbg number among those disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
Slackware is RPM-based, meaning that software packages are all stored as an RPM Package Manager. By invoking &#039;&#039;rpm -qa&#039;&#039;, a list of installed RPMs is shown; within DVL, FPC (Free Pascal Compiler) is the only listed package. Free Pascal Compiler is an extensive RPM Package Manager that is often used in conjunction which Lazarus, which contains a full IDE.[13] The version of FPC used by Damn Vulnerable Linux is fpc-src-2.2.0-071105.i386.rpm, as reported by the following command:&amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;&lt;br /&gt;
rpm -qa&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lazarus contains a large host of utilities, separated into the run-time library (RTL), which contains units such as Unix, BaseUnix, and ShellAPI; and the Lazarus Component Library (LCL), which contains interface elements, such as buttons, forms, and text boxes.[11] While this is quite extensive, containing nine thousand files[12], it is the only package included in DVL. The operating system is relatively destitute compared to larger distributions such as Ubuntu, as it is focused heavily on a specialised programming environment.&lt;br /&gt;
&lt;br /&gt;
The rpm command is very useful for adding and removing packages. The following parameters are highly useful:&lt;br /&gt;
&lt;br /&gt;
To get a comprehensive list of all installed packages, as well as their version number and release date[14]:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;rpm -qa&amp;lt;/source&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To uninstall a specific package[14]:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;rpm -e &amp;lt;packagename&amp;gt;&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To install a specific package[14]:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;rpm -ivh &amp;lt;packagename&amp;gt;&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To update a previously-installed package[14]:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;rpm -Uvh &amp;lt;packagename&amp;gt;&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The rpm command can also be used to request a list of installed files by a rpm, by invoking the following command:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;rpm -ql fpc-src-2.2.0-071105&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;/lib/libc.so.6 --version&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;/bin/bash --version&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;uname -a&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;/bin/ls --version&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;/bin/ps --version&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;mysql -V&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;httpd -V&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;ssh -V&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;konqueror -v&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;konqueror -v&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || &amp;lt;source lang=&amp;quot;cpp&amp;quot;&amp;gt;konqueror -v&amp;lt;/source&amp;gt; ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience. Specifically, 1337 is usually inferred as numerical-representation of &amp;quot;leet&amp;quot;, or elite.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
As a Slackware-based distribution, DVL uses BSD style init (as opposed to System V) to initialize the system. By reading /etc/inittab, it is apparent that the default runlevel is set to 3. inittab then tells the system to use /etc/rc.d/rc.S for initialization.&lt;br /&gt;
&lt;br /&gt;
/etc/rc.d/rc.S begins by mounting /proc (/sbin/mount -v proc /proc -n -t proc).&lt;br /&gt;
&lt;br /&gt;
It then starts udev, mounts sysfs, and checks for a forced filesystem check on the root filesystem (to see if fsck must be run due to an improper shutdown). If no fsck is required, it continues by setting the system time (from the hardware clock), and configures plug-and-play devices. &lt;br /&gt;
&lt;br /&gt;
Then it proceeds to load any required kernel modules (for hardware such as the ethernet or sound cards), and configures runtime kernel parameters. Next, it checks for a forced fsck on any non-root filesystems, and then mounts non-root filesystems in fstab. It then enables swapping (/sbin/swapon -a), and cleans up temporary files and ensures the integrity of the temp folder (creating /tmp/.ICE-unix and /tmp/.Xll-unix if they are not present).&lt;br /&gt;
&lt;br /&gt;
Next, it attempts to umount and remove any leftover files in /initrd, before creating a fresh utmp file. The MOTD is then set to reflect the current kernel level, and checks if there are any System V init scripts to be run at the current runlevel. &lt;br /&gt;
&lt;br /&gt;
Source: inittab file&lt;br /&gt;
&lt;br /&gt;
Due to the BSD-style initialization, the actual kernel modules are run from /etc/rc.d/rc.modules, and are explicitly loaded via modprobe[10].&lt;br /&gt;
&lt;br /&gt;
As opposed to System V convention (which uses /etc/rc.d/rc(runlevel).d/ directories to house scripts), the primary script in DVL is run from /etc/rc.d/rc.M. This defines the system hostname, activates PCMCIA support, activates the firewall, starts network services, launches Inetd and OpenSSH, Bind, NIS, and NFS; starts system logging, smartd, cron, atd, MySQL, Apache, Samba, and any System V init scripts that have been added.[10]&lt;br /&gt;
&lt;br /&gt;
==Init Script Startup==&lt;br /&gt;
[[File:Dvl_processes.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Running Processes]]&lt;br /&gt;
The specific process executing order during initialisation is as follows:&lt;br /&gt;
&lt;br /&gt;
Init(8) is run, resulting in:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;	/etc/rc.d/rc.M is executed, which in turn starts the following processes:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/syslogd: this is started by rc.M, by calling rc.syslog start&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			/usr/sbin/klogd: syslog then starts klog if it is a SMP kernel&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		inet1: this is started by rc.M&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			dhcpcd: this is then started by inet1 if it is not already running, and set to eth0		&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/cupsd is started by rc.M, by calling rc.cups start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/crond is started by rc.M			&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/acpid: this is started by rc.M, by calling acpid start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		rc.M then calls the rc.slax extension&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			/bin/sh: this is started by rc.slax&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;			/bin/bash: this is started by rc.slax&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/libexec/mysqld: this is started by rc.M by calling rc.mysqld start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/gpm: this is started by rc.M, by calling rc.gpm start&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
[10]http://openskill.info/infobox.php?IDbox=1042&lt;br /&gt;
&lt;br /&gt;
[11]http://wiki.lazarus.freepascal.org/Installing_Lazarus#Installing_using_rpms&lt;br /&gt;
&lt;br /&gt;
[12]http://rpm.pbone.net/index.php3/stat/6/idpl/14565894/dir/other/com/fpc-src-2.2.0-071105.i386.rpm&lt;br /&gt;
&lt;br /&gt;
[13]http://wiki.lazarus.freepascal.org/Overview_of_Free_Pascal_and_Lazarus&lt;br /&gt;
&lt;br /&gt;
[14]http://www.linuxforums.org/forum/installation/2165-add-remove-packages-not-removing.html&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=15011</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=15011"/>
		<updated>2011-11-25T04:45:27Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* Major Package Versions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
Slackware is RPM-based, meaning that software packages are all stored as an RPM Package Manager. By invoking &#039;&#039;rpm -qa&#039;&#039;, a list of installed RPMs is shown; within DVL, FPC (Free Pascal Compiler) is the only listed package. Free Pascal Compiler is an extensive RPM Package Manager that is often used in conjunction which Lazarus, which contains a full IDE.[13] The version of FPC used by Damn Vulnerable Linux is fpc-src-2.2.0-071105.i386.rpm, as reported by &#039;&#039;rpm -qa&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Lazarus contains a large host of utilities, separated into the run-time library (RTL), which contains units such as Unix, BaseUnix, and ShellAPI; and the Lazarus Component Library (LCL), which contains interface elements, such as buttons, forms, and text boxes.[11] While this is quite extensive, containing nine thousand files[12], it is the only package included in DVL. The operating system is relatively destitute compared to larger distributions such as Ubuntu, as it is focused heavily on a specialised programming environment.&lt;br /&gt;
&lt;br /&gt;
The rpm command is very useful for adding and removing packages. The following parameters are highly useful:&lt;br /&gt;
&lt;br /&gt;
rpm -qa lists all installed packages as well as their version number and release date.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -e &amp;lt;packagename&amp;gt; uninstalls a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -ivh &amp;lt;packagename&amp;gt; installs a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -Uvh &amp;lt;packagename&amp;gt; updates an already-installed package.[14]&lt;br /&gt;
&lt;br /&gt;
The rpm command can also be used to request a list of installed files by a rpm, by invoking &#039;&#039;rpm -ql fpc-src-2.2.0-071105&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience. Specifically, 1337 is usually inferred as numerical-representation of &amp;quot;leet&amp;quot;, or elite.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
As a Slackware-based distribution, DVL uses BSD style init (as opposed to System V) to initialize the system. By reading /etc/inittab, it is apparent that the default runlevel is set to 3. inittab then tells the system to use /etc/rc.d/rc.S for initialization.&lt;br /&gt;
&lt;br /&gt;
/etc/rc.d/rc.S begins by mounting /proc (/sbin/mount -v proc /proc -n -t proc).&lt;br /&gt;
&lt;br /&gt;
It then starts udev, mounts sysfs, and checks for a forced filesystem check on the root filesystem (to see if fsck must be run due to an improper shutdown). If no fsck is required, it continues by setting the system time (from the hardware clock), and configures plug-and-play devices. &lt;br /&gt;
&lt;br /&gt;
Then it proceeds to load any required kernel modules (for hardware such as the ethernet or sound cards), and configures runtime kernel parameters. Next, it checks for a forced fsck on any non-root filesystems, and then mounts non-root filesystems in fstab. It then enables swapping (/sbin/swapon -a), and cleans up temporary files and ensures the integrity of the temp folder (creating /tmp/.ICE-unix and /tmp/.Xll-unix if they are not present).&lt;br /&gt;
&lt;br /&gt;
Next, it attempts to umount and remove any leftover files in /initrd, before creating a fresh utmp file. The MOTD is then set to reflect the current kernel level, and checks if there are any System V init scripts to be run at the current runlevel. &lt;br /&gt;
&lt;br /&gt;
Source: inittab file&lt;br /&gt;
&lt;br /&gt;
Due to the BSD-style initialization, the actual kernel modules are run from /etc/rc.d/rc.modules, and are explicitly loaded via modprobe[10].&lt;br /&gt;
&lt;br /&gt;
As opposed to System V convention (which uses /etc/rc.d/rc(runlevel).d/ directories to house scripts), the primary script in DVL is run from /etc/rc.d/rc.M. This defines the system hostname, activates PCMCIA support, activates the firewall, starts network services, launches Inetd and OpenSSH, Bind, NIS, and NFS; starts system logging, smartd, cron, atd, MySQL, Apache, Samba, and any System V init scripts that have been added.[10]&lt;br /&gt;
&lt;br /&gt;
==Init Script Startup==&lt;br /&gt;
[[File:Dvl_processes.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Running Processes]]&lt;br /&gt;
The specific process executing order during initialisation is as follows:&lt;br /&gt;
&lt;br /&gt;
Init(8) is run, resulting in:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;	/etc/rc.d/rc.M is executed, which in turn starts the following processes:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/syslogd: this is started by rc.M, by calling rc.syslog start&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			/usr/sbin/klogd: syslog then starts klog if it is a SMP kernel&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		inet1: this is started by rc.M&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			dhcpcd: this is then started by inet1 if it is not already running, and set to eth0		&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/cupsd is started by rc.M, by calling rc.cups start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/crond is started by rc.M			&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/acpid: this is started by rc.M, by calling acpid start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		rc.M then calls the rc.slax extension&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			/bin/sh: this is started by rc.slax&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;			/bin/bash: this is started by rc.slax&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/libexec/mysqld: this is started by rc.M by calling rc.mysqld start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/gpm: this is started by rc.M, by calling rc.gpm start&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
[10]http://openskill.info/infobox.php?IDbox=1042&lt;br /&gt;
&lt;br /&gt;
[11]http://wiki.lazarus.freepascal.org/Installing_Lazarus#Installing_using_rpms&lt;br /&gt;
&lt;br /&gt;
[12]http://rpm.pbone.net/index.php3/stat/6/idpl/14565894/dir/other/com/fpc-src-2.2.0-071105.i386.rpm&lt;br /&gt;
&lt;br /&gt;
[13]http://wiki.lazarus.freepascal.org/Overview_of_Free_Pascal_and_Lazarus&lt;br /&gt;
&lt;br /&gt;
[14]http://www.linuxforums.org/forum/installation/2165-add-remove-packages-not-removing.html&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=15010</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=15010"/>
		<updated>2011-11-25T04:42:02Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* Init Script Startup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
Slackware is RPM-based, meaning that software packages are all stored as an RPM Package Manager. By invoking &#039;&#039;rpm -qa&#039;&#039;, a list of installed RPMs is shown; within DVL, FPC (Free Pascal Compiler) is the only listed package. Free Pascal Compiler is an extensive RPM Package Manager that is often used in conjunction which Lazarus, which contains a full IDE.[13] The version of FPC used by Damn Vulnerable Linux is fpc-src-2.2.0-071105.i386.rpm, as reported by &#039;&#039;rpm -qa&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Lazarus contains a large host of utilities, separated into the run-time library (RTL), which contains units such as Unix, BaseUnix, and ShellAPI; and the Lazarus Component Library (LCL), which contains interface elements, such as buttons, forms, and text boxes.[11] While this is quite extensive, containing nine thousand files[12], it is the only package included in DVL. The operating system is relatively destitute compared to larger distributions such as Ubuntu, as it is focused heavily on a specialised programming environment.&lt;br /&gt;
&lt;br /&gt;
The rpm command is very useful for adding and removing packages. The following parameters are highly useful:&lt;br /&gt;
&lt;br /&gt;
rpm -qa lists all installed packages as well as their version number and release date.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -e &amp;lt;packagename&amp;gt; uninstalls a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -ivh &amp;lt;packagename&amp;gt; installs a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -Uvh &amp;lt;packagename&amp;gt; updates an already-installed package.[14]&lt;br /&gt;
&lt;br /&gt;
The rpm command can also be used to request a list of installed files by a rpm, by invoking &#039;&#039;rpm -ql fpc-src-2.2.0-071105&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
As a Slackware-based distribution, DVL uses BSD style init (as opposed to System V) to initialize the system. By reading /etc/inittab, it is apparent that the default runlevel is set to 3. inittab then tells the system to use /etc/rc.d/rc.S for initialization.&lt;br /&gt;
&lt;br /&gt;
/etc/rc.d/rc.S begins by mounting /proc (/sbin/mount -v proc /proc -n -t proc).&lt;br /&gt;
&lt;br /&gt;
It then starts udev, mounts sysfs, and checks for a forced filesystem check on the root filesystem (to see if fsck must be run due to an improper shutdown). If no fsck is required, it continues by setting the system time (from the hardware clock), and configures plug-and-play devices. &lt;br /&gt;
&lt;br /&gt;
Then it proceeds to load any required kernel modules (for hardware such as the ethernet or sound cards), and configures runtime kernel parameters. Next, it checks for a forced fsck on any non-root filesystems, and then mounts non-root filesystems in fstab. It then enables swapping (/sbin/swapon -a), and cleans up temporary files and ensures the integrity of the temp folder (creating /tmp/.ICE-unix and /tmp/.Xll-unix if they are not present).&lt;br /&gt;
&lt;br /&gt;
Next, it attempts to umount and remove any leftover files in /initrd, before creating a fresh utmp file. The MOTD is then set to reflect the current kernel level, and checks if there are any System V init scripts to be run at the current runlevel. &lt;br /&gt;
&lt;br /&gt;
Source: inittab file&lt;br /&gt;
&lt;br /&gt;
Due to the BSD-style initialization, the actual kernel modules are run from /etc/rc.d/rc.modules, and are explicitly loaded via modprobe[10].&lt;br /&gt;
&lt;br /&gt;
As opposed to System V convention (which uses /etc/rc.d/rc(runlevel).d/ directories to house scripts), the primary script in DVL is run from /etc/rc.d/rc.M. This defines the system hostname, activates PCMCIA support, activates the firewall, starts network services, launches Inetd and OpenSSH, Bind, NIS, and NFS; starts system logging, smartd, cron, atd, MySQL, Apache, Samba, and any System V init scripts that have been added.[10]&lt;br /&gt;
&lt;br /&gt;
==Init Script Startup==&lt;br /&gt;
[[File:Dvl_processes.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Running Processes]]&lt;br /&gt;
The specific process executing order during initialisation is as follows:&lt;br /&gt;
&lt;br /&gt;
Init(8) is run, resulting in:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;	/etc/rc.d/rc.M is executed, which in turn starts the following processes:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/syslogd: this is started by rc.M, by calling rc.syslog start&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			/usr/sbin/klogd: syslog then starts klog if it is a SMP kernel&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		inet1: this is started by rc.M&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			dhcpcd: this is then started by inet1 if it is not already running, and set to eth0		&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/cupsd is started by rc.M, by calling rc.cups start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/crond is started by rc.M			&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/acpid: this is started by rc.M, by calling acpid start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		rc.M then calls the rc.slax extension&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;			/bin/sh: this is started by rc.slax&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;			/bin/bash: this is started by rc.slax&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/libexec/mysqld: this is started by rc.M by calling rc.mysqld start&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;		/usr/sbin/gpm: this is started by rc.M, by calling rc.gpm start&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
[10]http://openskill.info/infobox.php?IDbox=1042&lt;br /&gt;
&lt;br /&gt;
[11]http://wiki.lazarus.freepascal.org/Installing_Lazarus#Installing_using_rpms&lt;br /&gt;
&lt;br /&gt;
[12]http://rpm.pbone.net/index.php3/stat/6/idpl/14565894/dir/other/com/fpc-src-2.2.0-071105.i386.rpm&lt;br /&gt;
&lt;br /&gt;
[13]http://wiki.lazarus.freepascal.org/Overview_of_Free_Pascal_and_Lazarus&lt;br /&gt;
&lt;br /&gt;
[14]http://www.linuxforums.org/forum/installation/2165-add-remove-packages-not-removing.html&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:Dvl_processes.png&amp;diff=15009</id>
		<title>File:Dvl processes.png</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:Dvl_processes.png&amp;diff=15009"/>
		<updated>2011-11-25T04:39:28Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=15008</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=15008"/>
		<updated>2011-11-25T04:36:33Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
Slackware is RPM-based, meaning that software packages are all stored as an RPM Package Manager. By invoking &#039;&#039;rpm -qa&#039;&#039;, a list of installed RPMs is shown; within DVL, FPC (Free Pascal Compiler) is the only listed package. Free Pascal Compiler is an extensive RPM Package Manager that is often used in conjunction which Lazarus, which contains a full IDE.[13] The version of FPC used by Damn Vulnerable Linux is fpc-src-2.2.0-071105.i386.rpm, as reported by &#039;&#039;rpm -qa&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Lazarus contains a large host of utilities, separated into the run-time library (RTL), which contains units such as Unix, BaseUnix, and ShellAPI; and the Lazarus Component Library (LCL), which contains interface elements, such as buttons, forms, and text boxes.[11] While this is quite extensive, containing nine thousand files[12], it is the only package included in DVL. The operating system is relatively destitute compared to larger distributions such as Ubuntu, as it is focused heavily on a specialised programming environment.&lt;br /&gt;
&lt;br /&gt;
The rpm command is very useful for adding and removing packages. The following parameters are highly useful:&lt;br /&gt;
&lt;br /&gt;
rpm -qa lists all installed packages as well as their version number and release date.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -e &amp;lt;packagename&amp;gt; uninstalls a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -ivh &amp;lt;packagename&amp;gt; installs a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -Uvh &amp;lt;packagename&amp;gt; updates an already-installed package.[14]&lt;br /&gt;
&lt;br /&gt;
The rpm command can also be used to request a list of installed files by a rpm, by invoking &#039;&#039;rpm -ql fpc-src-2.2.0-071105&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
As a Slackware-based distribution, DVL uses BSD style init (as opposed to System V) to initialize the system. By reading /etc/inittab, it is apparent that the default runlevel is set to 3. inittab then tells the system to use /etc/rc.d/rc.S for initialization.&lt;br /&gt;
&lt;br /&gt;
/etc/rc.d/rc.S begins by mounting /proc (/sbin/mount -v proc /proc -n -t proc).&lt;br /&gt;
&lt;br /&gt;
It then starts udev, mounts sysfs, and checks for a forced filesystem check on the root filesystem (to see if fsck must be run due to an improper shutdown). If no fsck is required, it continues by setting the system time (from the hardware clock), and configures plug-and-play devices. &lt;br /&gt;
&lt;br /&gt;
Then it proceeds to load any required kernel modules (for hardware such as the ethernet or sound cards), and configures runtime kernel parameters. Next, it checks for a forced fsck on any non-root filesystems, and then mounts non-root filesystems in fstab. It then enables swapping (/sbin/swapon -a), and cleans up temporary files and ensures the integrity of the temp folder (creating /tmp/.ICE-unix and /tmp/.Xll-unix if they are not present).&lt;br /&gt;
&lt;br /&gt;
Next, it attempts to umount and remove any leftover files in /initrd, before creating a fresh utmp file. The MOTD is then set to reflect the current kernel level, and checks if there are any System V init scripts to be run at the current runlevel. &lt;br /&gt;
&lt;br /&gt;
Source: inittab file&lt;br /&gt;
&lt;br /&gt;
Due to the BSD-style initialization, the actual kernel modules are run from /etc/rc.d/rc.modules, and are explicitly loaded via modprobe[10].&lt;br /&gt;
&lt;br /&gt;
As opposed to System V convention (which uses /etc/rc.d/rc(runlevel).d/ directories to house scripts), the primary script in DVL is run from /etc/rc.d/rc.M. This defines the system hostname, activates PCMCIA support, activates the firewall, starts network services, launches Inetd and OpenSSH, Bind, NIS, and NFS; starts system logging, smartd, cron, atd, MySQL, Apache, Samba, and any System V init scripts that have been added.[10]&lt;br /&gt;
&lt;br /&gt;
==Init Script Startup==&lt;br /&gt;
&lt;br /&gt;
The specific process executing order during initialisation is as follows:&lt;br /&gt;
&lt;br /&gt;
Init(8) is run, resulting in:&lt;br /&gt;
&lt;br /&gt;
	/etc/rc.d/rc.M is executed, which in turn starts the following processes:&lt;br /&gt;
&lt;br /&gt;
1)		/usr/sbin/syslogd: this is started by rc.M, by calling rc.syslog start&lt;br /&gt;
&lt;br /&gt;
1.1)			/usr/sbin/klogd: syslog then starts klog if it is a SMP kernel&lt;br /&gt;
&lt;br /&gt;
2)		inet1: this is started by rc.M&lt;br /&gt;
&lt;br /&gt;
2.1)			dhcpcd: this is then started by inet1 if it is not already running, and set to eth0		&lt;br /&gt;
&lt;br /&gt;
3)		/usr/sbin/cupsd is started by rc.M, by calling rc.cups start&lt;br /&gt;
&lt;br /&gt;
4)		/usr/sbin/crond is started by rc.M			&lt;br /&gt;
&lt;br /&gt;
5)		/usr/sbin/acpid: this is started by rc.M, by calling acpid start&lt;br /&gt;
&lt;br /&gt;
6)		rc.M then calls the rc.slax extension&lt;br /&gt;
&lt;br /&gt;
6.1)			/bin/sh: this is started by rc.slax&lt;br /&gt;
&lt;br /&gt;
6.2)			/bin/bash: this is started by rc.slax&lt;br /&gt;
&lt;br /&gt;
7)		/usr/libexec/mysqld: this is started by rc.M by calling rc.mysqld start&lt;br /&gt;
&lt;br /&gt;
8)		/usr/sbin/gpm: this is started by rc.M, by calling rc.gpm start&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
[10]http://openskill.info/infobox.php?IDbox=1042&lt;br /&gt;
&lt;br /&gt;
[11]http://wiki.lazarus.freepascal.org/Installing_Lazarus#Installing_using_rpms&lt;br /&gt;
&lt;br /&gt;
[12]http://rpm.pbone.net/index.php3/stat/6/idpl/14565894/dir/other/com/fpc-src-2.2.0-071105.i386.rpm&lt;br /&gt;
&lt;br /&gt;
[13]http://wiki.lazarus.freepascal.org/Overview_of_Free_Pascal_and_Lazarus&lt;br /&gt;
&lt;br /&gt;
[14]http://www.linuxforums.org/forum/installation/2165-add-remove-packages-not-removing.html&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13712</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13712"/>
		<updated>2011-11-14T02:17:54Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* Software Packaging */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
Slackware is RPM-based, meaning that software packages are all stored as an RPM Package Manager. By invoking &#039;&#039;rpm -qa&#039;&#039;, a list of installed RPMs is shown; within DVL, FPC (Free Pascal Compiler) is the only listed package. Free Pascal Compiler is an extensive RPM Package Manager that is often used in conjunction which Lazarus, which contains a full IDE.[13] The version of FPC used by Damn Vulnerable Linux is fpc-src-2.2.0-071105.i386.rpm, as reported by &#039;&#039;rpm -qa&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Lazarus contains a large host of utilities, separated into the run-time library (RTL), which contains units such as Unix, BaseUnix, and ShellAPI; and the Lazarus Component Library (LCL), which contains interface elements, such as buttons, forms, and text boxes.[11] While this is quite extensive, containing nine thousand files[12], it is the only package included in DVL. The operating system is relatively destitute compared to larger distributions such as Ubuntu, as it is focused heavily on a specialised programming environment.&lt;br /&gt;
&lt;br /&gt;
The rpm command is very useful for adding and removing packages. The following parameters are highly useful:&lt;br /&gt;
&lt;br /&gt;
rpm -qa lists all installed packages as well as their version number and release date.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -e &amp;lt;packagename&amp;gt; uninstalls a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -ivh &amp;lt;packagename&amp;gt; installs a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -Uvh &amp;lt;packagename&amp;gt; updates an already-installed package.[14]&lt;br /&gt;
&lt;br /&gt;
The rpm command can also be used to request a list of installed files by a rpm, by invoking &#039;&#039;rpm -ql fpc-src-2.2.0-071105&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
As a Slackware-based distribution, DVL uses BSD style init (as opposed to System V) to initialize the system. By reading /etc/inittab, it is apparent that the default runlevel is set to 3. inittab then tells the system to use /etc/rc.d/rc.S for initialization.&lt;br /&gt;
&lt;br /&gt;
/etc/rc.d/rc.S begins by mounting /proc (/sbin/mount -v proc /proc -n -t proc).&lt;br /&gt;
&lt;br /&gt;
It then starts udev, mounts sysfs, and checks for a forced filesystem check on the root filesystem (to see if fsck must be run due to an improper shutdown). If no fsck is required, it continues by setting the system time (from the hardware clock), and configures plug-and-play devices. &lt;br /&gt;
&lt;br /&gt;
Then it proceeds to load any required kernel modules (for hardware such as the ethernet or sound cards), and configures runtime kernel parameters. Next, it checks for a forced fsck on any non-root filesystems, and then mounts non-root filesystems in fstab. It then enables swapping (/sbin/swapon -a), and cleans up temporary files and ensures the integrity of the temp folder (creating /tmp/.ICE-unix and /tmp/.Xll-unix if they are not present).&lt;br /&gt;
&lt;br /&gt;
Next, it attempts to umount and remove any leftover files in /initrd, before creating a fresh utmp file. The MOTD is then set to reflect the current kernel level, and checks if there are any System V init scripts to be run at the current runlevel. &lt;br /&gt;
&lt;br /&gt;
Source: inittab file&lt;br /&gt;
&lt;br /&gt;
Due to the BSD-style initialization, the actual kernel modules are run from /etc/rc.d/rc.modules, and are explicitly loaded via modprobe[10].&lt;br /&gt;
&lt;br /&gt;
As opposed to System V convention (which uses /etc/rc.d/rc(runlevel).d/ directories to house scripts), the primary script in DVL is run from /etc/rc.d/rc.M. This defines the system hostname, activates PCMCIA support, activates the firewall, starts network services, launches Inetd and OpenSSH, Bind, NIS, and NFS; starts system logging, smartd, cron, atd, MySQL, Apache, Samba, and any System V init scripts that have been added.[10]&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
[10]http://openskill.info/infobox.php?IDbox=1042&lt;br /&gt;
&lt;br /&gt;
[11]http://wiki.lazarus.freepascal.org/Installing_Lazarus#Installing_using_rpms&lt;br /&gt;
&lt;br /&gt;
[12]http://rpm.pbone.net/index.php3/stat/6/idpl/14565894/dir/other/com/fpc-src-2.2.0-071105.i386.rpm&lt;br /&gt;
&lt;br /&gt;
[13]http://wiki.lazarus.freepascal.org/Overview_of_Free_Pascal_and_Lazarus&lt;br /&gt;
&lt;br /&gt;
[14]http://www.linuxforums.org/forum/installation/2165-add-remove-packages-not-removing.html&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13707</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13707"/>
		<updated>2011-11-14T02:14:24Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
Slackware is RPM-based, meaning that software packages are all stored as an RPM Package Manager. By invoking &#039;&#039;rpm -qa&#039;&#039;, a list of installed RPMs is shown; within DVL, FPC (Free Pascal Compiler) is the only listed package. Free Pascal Compiler is an extensive RPM Package Manager that is often used in conjunction which Lazarus, which contains a full IDE.[13] The version of FPC used by Damn Vulnerable Linux is fpc-src-2.2.0-071105.i386.rpm, as reported by &#039;&#039;rpm -qa&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Lazarus contains a large host of utilities, separated into the run-time library (RTL), which contains units such as Unix, BaseUnix, and ShellAPI; and the Lazarus Component Library (LCL), which contains interface elements, such as buttons, forms, and text boxes.[11]&lt;br /&gt;
&lt;br /&gt;
The rpm command is very useful for adding and removing packages. The following parameters are highly useful:&lt;br /&gt;
&lt;br /&gt;
rpm -qa lists all installed packages as well as their version number and release date.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -e &amp;lt;packagename&amp;gt; uninstalls a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -ivh &amp;lt;packagename&amp;gt; installs a specific package.[14]&lt;br /&gt;
&lt;br /&gt;
rpm -Uvh &amp;lt;packagename&amp;gt; updates an already-installed package.[14]&lt;br /&gt;
&lt;br /&gt;
The rpm command can also be used to request a list of installed files by a rpm, by invoking &#039;&#039;rpm -ql fpc-src-2.2.0-071105&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
As a Slackware-based distribution, DVL uses BSD style init (as opposed to System V) to initialize the system. By reading /etc/inittab, it is apparent that the default runlevel is set to 3. inittab then tells the system to use /etc/rc.d/rc.S for initialization.&lt;br /&gt;
&lt;br /&gt;
/etc/rc.d/rc.S begins by mounting /proc (/sbin/mount -v proc /proc -n -t proc).&lt;br /&gt;
&lt;br /&gt;
It then starts udev, mounts sysfs, and checks for a forced filesystem check on the root filesystem (to see if fsck must be run due to an improper shutdown). If no fsck is required, it continues by setting the system time (from the hardware clock), and configures plug-and-play devices. &lt;br /&gt;
&lt;br /&gt;
Then it proceeds to load any required kernel modules (for hardware such as the ethernet or sound cards), and configures runtime kernel parameters. Next, it checks for a forced fsck on any non-root filesystems, and then mounts non-root filesystems in fstab. It then enables swapping (/sbin/swapon -a), and cleans up temporary files and ensures the integrity of the temp folder (creating /tmp/.ICE-unix and /tmp/.Xll-unix if they are not present).&lt;br /&gt;
&lt;br /&gt;
Next, it attempts to umount and remove any leftover files in /initrd, before creating a fresh utmp file. The MOTD is then set to reflect the current kernel level, and checks if there are any System V init scripts to be run at the current runlevel. &lt;br /&gt;
&lt;br /&gt;
Source: inittab file&lt;br /&gt;
&lt;br /&gt;
Due to the BSD-style initialization, the actual kernel modules are run from /etc/rc.d/rc.modules, and are explicitly loaded via modprobe[10].&lt;br /&gt;
&lt;br /&gt;
As opposed to System V convention (which uses /etc/rc.d/rc(runlevel).d/ directories to house scripts), the primary script in DVL is run from /etc/rc.d/rc.M. This defines the system hostname, activates PCMCIA support, activates the firewall, starts network services, launches Inetd and OpenSSH, Bind, NIS, and NFS; starts system logging, smartd, cron, atd, MySQL, Apache, Samba, and any System V init scripts that have been added.[10]&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
[10]http://openskill.info/infobox.php?IDbox=1042&lt;br /&gt;
&lt;br /&gt;
[11]http://wiki.lazarus.freepascal.org/Installing_Lazarus#Installing_using_rpms&lt;br /&gt;
&lt;br /&gt;
[12]http://rpm.pbone.net/index.php3/stat/6/idpl/14565894/dir/other/com/fpc-src-2.2.0-071105.i386.rpm&lt;br /&gt;
&lt;br /&gt;
[13]http://wiki.lazarus.freepascal.org/Overview_of_Free_Pascal_and_Lazarus&lt;br /&gt;
&lt;br /&gt;
[14]http://www.linuxforums.org/forum/installation/2165-add-remove-packages-not-removing.html&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13706</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13706"/>
		<updated>2011-11-14T02:13:41Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
Slackware is RPM-based, meaning that software packages are all stored as an RPM Package Manager. By invoking &#039;&#039;rpm -qa&#039;&#039;, a list of installed RPMs is shown; within DVL, FPC (Free Pascal Compiler) is the only listed package. Free Pascal Compiler is an extensive RPM Package Manager that is often used in conjunction which Lazarus, which contains a full IDE.[13] The version of FPC used by Damn Vulnerable Linux is fpc-src-2.2.0-071105.i386.rpm, as reported by &#039;&#039;rpm -qa&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Lazarus contains a large host of utilities, separated into the run-time library (RTL), which contains units such as Unix, BaseUnix, and ShellAPI; and the Lazarus Component Library (LCL), which contains interface elements, such as buttons, forms, and text boxes.[11]&lt;br /&gt;
&lt;br /&gt;
The rpm command is very useful for adding and removing packages. The following parameters are highly useful:&lt;br /&gt;
&lt;br /&gt;
rpm -qa lists all installed packages as well as their version number and release date.[14]&lt;br /&gt;
rpm -e &amp;lt;packagename&amp;gt; uninstalls a specific package.[14]&lt;br /&gt;
rpm -ivh &amp;lt;packagename&amp;gt; installs a specific package.[14]&lt;br /&gt;
rpm -Uvh &amp;lt;packagename&amp;gt; updates an already-installed package.[14]&lt;br /&gt;
&lt;br /&gt;
The rpm command can also be used to request a list of installed files by a rpm, by invoking &#039;&#039;rpm -ql fpc-src-2.2.0-071105&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
As a Slackware-based distribution, DVL uses BSD style init (as opposed to System V) to initialize the system. By reading /etc/inittab, it is apparent that the default runlevel is set to 3. inittab then tells the system to use /etc/rc.d/rc.S for initialization.&lt;br /&gt;
&lt;br /&gt;
/etc/rc.d/rc.S begins by mounting /proc (/sbin/mount -v proc /proc -n -t proc).&lt;br /&gt;
&lt;br /&gt;
It then starts udev, mounts sysfs, and checks for a forced filesystem check on the root filesystem (to see if fsck must be run due to an improper shutdown). If no fsck is required, it continues by setting the system time (from the hardware clock), and configures plug-and-play devices. &lt;br /&gt;
&lt;br /&gt;
Then it proceeds to load any required kernel modules (for hardware such as the ethernet or sound cards), and configures runtime kernel parameters. Next, it checks for a forced fsck on any non-root filesystems, and then mounts non-root filesystems in fstab. It then enables swapping (/sbin/swapon -a), and cleans up temporary files and ensures the integrity of the temp folder (creating /tmp/.ICE-unix and /tmp/.Xll-unix if they are not present).&lt;br /&gt;
&lt;br /&gt;
Next, it attempts to umount and remove any leftover files in /initrd, before creating a fresh utmp file. The MOTD is then set to reflect the current kernel level, and checks if there are any System V init scripts to be run at the current runlevel. &lt;br /&gt;
&lt;br /&gt;
Source: inittab file&lt;br /&gt;
&lt;br /&gt;
Due to the BSD-style initialization, the actual kernel modules are run from /etc/rc.d/rc.modules, and are explicitly loaded via modprobe[10].&lt;br /&gt;
&lt;br /&gt;
As opposed to System V convention (which uses /etc/rc.d/rc(runlevel).d/ directories to house scripts), the primary script in DVL is run from /etc/rc.d/rc.M. This defines the system hostname, activates PCMCIA support, activates the firewall, starts network services, launches Inetd and OpenSSH, Bind, NIS, and NFS; starts system logging, smartd, cron, atd, MySQL, Apache, Samba, and any System V init scripts that have been added.[10]&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
[10]http://openskill.info/infobox.php?IDbox=1042&lt;br /&gt;
&lt;br /&gt;
[11]http://wiki.lazarus.freepascal.org/Installing_Lazarus#Installing_using_rpms&lt;br /&gt;
&lt;br /&gt;
[12]http://rpm.pbone.net/index.php3/stat/6/idpl/14565894/dir/other/com/fpc-src-2.2.0-071105.i386.rpm&lt;br /&gt;
&lt;br /&gt;
[13]http://wiki.lazarus.freepascal.org/Overview_of_Free_Pascal_and_Lazarus&lt;br /&gt;
&lt;br /&gt;
[14]http://www.linuxforums.org/forum/installation/2165-add-remove-packages-not-removing.html&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13672</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13672"/>
		<updated>2011-11-14T01:20:10Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
As a Slackware-based distribution, DVL uses BSD style init (as opposed to System V) to initialize the system. By reading /etc/inittab, it is apparent that the default runlevel is set to 3. inittab then tells the system to use /etc/rc.d/rc.S for initialization.&lt;br /&gt;
&lt;br /&gt;
/etc/rc.d/rc.S begins by mounting /proc (/sbin/mount -v proc /proc -n -t proc).&lt;br /&gt;
&lt;br /&gt;
It then starts udev, mounts sysfs, and checks for a forced filesystem check on the root filesystem (to see if fsck must be run due to an improper shutdown). If no fsck is required, it continues by setting the system time (from the hardware clock), and configures plug-and-play devices. &lt;br /&gt;
&lt;br /&gt;
Then it proceeds to load any required kernel modules (for hardware such as the ethernet or sound cards), and configures runtime kernel parameters. Next, it checks for a forced fsck on any non-root filesystems, and then mounts non-root filesystems in fstab. It then enables swapping (/sbin/swapon -a), and cleans up temporary files and ensures the integrity of the temp folder (creating /tmp/.ICE-unix and /tmp/.Xll-unix if they are not present).&lt;br /&gt;
&lt;br /&gt;
Next, it attempts to umount and remove any leftover files in /initrd, before creating a fresh utmp file. The MOTD is then set to reflect the current kernel level, and checks if there are any System V init scripts to be run at the current runlevel. &lt;br /&gt;
&lt;br /&gt;
Source: inittab file&lt;br /&gt;
&lt;br /&gt;
Due to the BSD-style initialization, the actual kernel modules are run from /etc/rc.d/rc.modules, and are explicitly loaded via modprobe[10].&lt;br /&gt;
&lt;br /&gt;
As opposed to System V convention (which uses /etc/rc.d/rc(runlevel).d/ directories to house scripts), the primary script in DVL is run from /etc/rc.d/rc.M. This defines the system hostname, activates PCMCIA support, activates the firewall, starts network services, launches Inetd and OpenSSH, Bind, NIS, and NFS; starts system logging, smartd, cron, atd, MySQL, Apache, Samba, and any System V init scripts that have been added.[10]&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
[10]http://openskill.info/infobox.php?IDbox=1042&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13655</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13655"/>
		<updated>2011-11-14T00:38:23Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Part 2=&lt;br /&gt;
==Software Packaging==&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
As Damn Vulnerable Linux is designed to be vulnerable, it makes heavy use of legacy code. This fundamental attribute is also evident within the packages included with the operating system. The authors do not make any effort to modify the source code of the original code, instead intentionally selecting packages that are either known to be exploitable themselves, or complement other exploitable software. It is with this in mind that each of the software packages are chosen to be included in the operating system.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;Note: The HTTPD version was likely chosen because of the significance of its version number among the target audience.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13647</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13647"/>
		<updated>2011-11-14T00:15:51Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || 4.7.3 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13645</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13645"/>
		<updated>2011-11-14T00:15:11Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || 2.14 || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || 4.2 || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || 3.1.1 || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| GNU CoreUtils || 5.97 || 8.14 || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || 3.2.8 || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 5.0.24a || 5.5.17 || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || 2.2.21 || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || 5.9 || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || - || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || 4.7.4 || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || 4.7 || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13642</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=13642"/>
		<updated>2011-11-14T00:04:39Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
==Major Package Versions==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Software !! Version(Date) !! Most Recent Version !! Command Used&lt;br /&gt;
|-&lt;br /&gt;
| libc || 2.3.6 || - || /lib/libc.so.6 --version ||&lt;br /&gt;
|-&lt;br /&gt;
| bash || 3.1.17(2005) || - || /bin/bash --version ||&lt;br /&gt;
|-&lt;br /&gt;
| kernel || 2.6.20-BT-PwnSauce(2007) || - || uname -a ||&lt;br /&gt;
|-&lt;br /&gt;
| ls || 5.97 || - || /bin/ls --version ||&lt;br /&gt;
|-&lt;br /&gt;
| procps || 3.2.7 || - || /bin/ps --version ||&lt;br /&gt;
|-&lt;br /&gt;
| MySQL || 14.12 Distrib 5.0.24a || - || mysql -V ||&lt;br /&gt;
|-&lt;br /&gt;
| HTPPD || Apache 1.3.37 || - || httpd -V ||&lt;br /&gt;
|-&lt;br /&gt;
| SSH || OpenSSH 4.4pl (2006) || - || ssh -V ||&lt;br /&gt;
|-&lt;br /&gt;
| Konqueror || 3.5.3(2005) || - || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| Qt || 3.3.6 || - || konqueror -v ||&lt;br /&gt;
|-&lt;br /&gt;
| KDE || 3.5.3 || - || konqueror -v ||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_Distribution_Sign-up_2011&amp;diff=10699</id>
		<title>COMP 3000 Distribution Sign-up 2011</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_Distribution_Sign-up_2011&amp;diff=10699"/>
		<updated>2011-10-16T21:52:17Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sign up for the distribution you want to report on here.  Note that others are also editing  page so verify that the page hasn&#039;t been mangled after you make your changes.  To help with this, try to only edit the section for the appropriate alphabet range (e.g., Ubuntu should go under T-V).&lt;br /&gt;
&lt;br /&gt;
Note that no more than two people may sign up for each distribution.  If two people sign up for a distribution, you two &#039;&#039;&#039;should be working together&#039;&#039;&#039; on a joint report.  If you are not working together, then note that the person who picked the distribution gets a 10% bonus: that person, after all, did the work to find the distribution.&lt;br /&gt;
&lt;br /&gt;
Please sign up with your wiki name (which, generally, should be the same as your connect username).  See [http://www.distrowatch.com Distrowatch] to see what distributions are out there.  Also, search for types of operating system distributions.&lt;br /&gt;
&lt;br /&gt;
Please &#039;&#039;&#039;do not&#039;&#039;&#039; sign up for a major distribution.  This includes but is not limited to the major distributions listed by Distrowatch.  Pick out something specialized and obscure!  If in doubt, please email the instructors and TAs.&lt;br /&gt;
&lt;br /&gt;
If you are submitting your report on the wiki, please add a link to it as shown in the example.  Please title the page using the name of your distribution, not your name.&lt;br /&gt;
&lt;br /&gt;
Further information on the report is [[COMP 3000 Distribution Report Specifications 2011|here]].&lt;br /&gt;
&lt;br /&gt;
Example entry:&lt;br /&gt;
&lt;br /&gt;
* [http://www.ubuntu.com Ubuntu]: asomayaj, snetimar ([[COMP 3000 2011 Report: Ubuntu|Report]])&lt;br /&gt;
&lt;br /&gt;
==Distributions A-D==&lt;br /&gt;
[http://alpinelinux.org/ Alpine Linux]: mevans&lt;br /&gt;
&lt;br /&gt;
[http://www.apodio.org/ APODIO]: mbrowna ([[COMP 3000 2011 Report: APODIO|Report]])&lt;br /&gt;
&lt;br /&gt;
BackTrack: dcarson&lt;br /&gt;
&lt;br /&gt;
[http://Caine-Live.net/ CAINE Linux]: nyoung2 ([[COMP 3000 2011 Report: CAINE|Report]])&lt;br /&gt;
&lt;br /&gt;
Chromium OS(Chrome OS): baathari&lt;br /&gt;
&lt;br /&gt;
[http://crunchbanglinux.org/ CrunchBang]: drewmartin ([[COMP 3000 2011 Report: CrunchBang|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://crux.nu/ CRUX]: zzhou6&lt;br /&gt;
&lt;br /&gt;
Damn Small Linux: MartyV&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable Linux: amurphy7 , vsanthir ([[COMP 3000 2011 Report: Damn Vulnerable Linux|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.doudoulinux.org/ DoudouLinux]:fmcyamwe,tchopel&lt;br /&gt;
&lt;br /&gt;
==Distributions E-H==&lt;br /&gt;
&lt;br /&gt;
[http://www.funtoo.org/ Funtoo]: porter.nicolas&lt;br /&gt;
&lt;br /&gt;
[http://www.gentoo.org/ Gentoo]: Bobbybobbets&lt;br /&gt;
&lt;br /&gt;
[http://www.gobolinux.org/ GoboLinux]: NameGoesHere&lt;br /&gt;
&lt;br /&gt;
[http://haiku-os.org/ Haiku]: nhoda, thildebr&lt;br /&gt;
&lt;br /&gt;
[http://hannahmontana.sourceforge.net/Site/Home.html Hannah Montana Linux]: ksubedi&lt;br /&gt;
&lt;br /&gt;
==Distributions I-M==&lt;br /&gt;
Incognito Live System: bwernik&lt;br /&gt;
&lt;br /&gt;
[http://www.inquisitor.ru/ Inquisitor]: atchekan ([[COMP 3000 2011 Report - Part 1 of 3: Inquisitor|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.jolicloud.com/ Joli OS (Jolicloud)]: nkathrad tsukasa19&lt;br /&gt;
&lt;br /&gt;
[http://www.dee.su/liberte/ Liberté Linux]: Murals&lt;br /&gt;
&lt;br /&gt;
[http://www.spi.dod.mil/lipose.htm Lightweight Portable Security]: jeckhard&lt;br /&gt;
&lt;br /&gt;
[http://linhes.org/bugs/ LinHes]:jmarcha1 ([[COMP 3000 2011 Report: LinHES|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://live.linux-gamers.net/ linuX-Gamers Live]: dlpkelly&lt;br /&gt;
&lt;br /&gt;
Linux Mangaka One: AsoCchahal ([[COMP 3000 2011 Report: AsoCchahal|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://lubuntu.net/ Lubuntu]: falaskar, jboucha2 ([[COMP 3000 2011 Report: Lubuntu|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.lunar-linux.org/ Lunar Linux]: rwolfe&lt;br /&gt;
&lt;br /&gt;
[http://www.menuetos.net/ MenuetOS]: Caesar, Vangelis&lt;br /&gt;
&lt;br /&gt;
[http://puppylinux.org/wikka/LegacyOS/ Legacy OS]:rnyssanb&lt;br /&gt;
&lt;br /&gt;
[http://macpup.org/ Macpup]: kbyrd, rcarrot1 ([[COMP 3000 2011 Report: Macpup|Report]])&lt;br /&gt;
&lt;br /&gt;
==Distributions N-P==&lt;br /&gt;
&lt;br /&gt;
[http://partedmagic.com/doku.php Parted Magic]: erhodes&lt;br /&gt;
&lt;br /&gt;
[http://perllinux.sourceforge.net/ Perl/Linux]:ttian1&lt;br /&gt;
&lt;br /&gt;
Privatix Live-System: gbooth, sbrett ([[COMP 3000 2011 Report: Privatix|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://puppylinux.org/ Puppy Linux]: mwooff, jnrahme ([[COMP 3000 2011 Report: PuppyLinux|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.pinguyos.com/ PinguyOS]: ssivara, uramazan (pdawod)&lt;br /&gt;
&lt;br /&gt;
[http://www.en.poseidonlinux.org/ Poseidon Linux]: 36chambers&lt;br /&gt;
&lt;br /&gt;
PC-BSD : todetoyi, qliu1 ([[COMP 3000 2011 Report: qliu|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.parsix.org/ Parsix GNU/Linux]: tzhang1, jzhang&lt;br /&gt;
&lt;br /&gt;
[http://www.puredyne.org/ Puredyne]: Carlton&lt;br /&gt;
&lt;br /&gt;
==Distributions Q-S==&lt;br /&gt;
[http://qubes-os.org/Home.html Qubes]:&lt;br /&gt;
&lt;br /&gt;
[http://bkhome.org/quirky/ Quirky]: Qingming_no_lisca&lt;br /&gt;
&lt;br /&gt;
[http://www.swiftlinux.org/ Swift Linux]: mabadeer, Yliu11([[COMP 3000 2011 Yunpeng Liu&#039;s Report: Swift Linux|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.salineos.com/ SalineOS]: drhill ([[COMP 3000 2011 Drhill&#039;s Report: SalineOS 1.4|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.slackware.com/ Slackware]: sturnbu5 ([[COMP 3000 2011 Report: Slackware 13.37|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.slax.org/ SLAX]: Andre Song&lt;br /&gt;
&lt;br /&gt;
[http://www.slitaz.org/en/ SliTaz]: Bobbybobbets&lt;br /&gt;
&lt;br /&gt;
[http://sourcemage.org/projects/source-mage/wiki Source Mage]: deadlytea ([[COMP 3000 2011 Report: Source Mage|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.stresslinux.org/sl/ StressLinux]: achaddad&lt;br /&gt;
&lt;br /&gt;
[http://sourceforge.net/projects/suicide-linux/ Suicide-Linux]:&lt;br /&gt;
&lt;br /&gt;
[http://www.sabayon.org/ Sabayon Linux]: mabdirah, selmoafi&lt;br /&gt;
&lt;br /&gt;
==Distributions T-W==&lt;br /&gt;
[http://tails.boum.org/index.en.html/ TAILS]: Khorrus&lt;br /&gt;
&lt;br /&gt;
[http://bellard.org/tcc/tccboot.html TCCBOOT: TinyCC Boot Loader]:&lt;br /&gt;
&lt;br /&gt;
[http://distro.ibiblio.org/tinycorelinux/welcome.html/ Tiny Core Linux ]: aadegbem ([[Comp 3000 2011 Report: Tiny Core Linux|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.minimalinux.org/ttylinux/ ttylinux]: kmacmart&lt;br /&gt;
&lt;br /&gt;
Vector: judethedude,Lkuate ([[ VectorLinux|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.planetwatt.com/ wattOS]: JPAL&lt;br /&gt;
&lt;br /&gt;
[http://ubuntustudio.org/ Ubuntu Studio]: Chashem and Jbyford ([[Editing COMP 3000 2011 Report: Ubuntu Studio|Report]])&lt;br /&gt;
&lt;br /&gt;
==Distributions X-Z==&lt;br /&gt;
[http://www.zentyal.com/ Zentyal]: cyu3 ([[COMP 3000 2011 Report: Zentyal|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.zenwalk.org/ Zenwalk]: mgizbert ([[Editing COMP 3000 2011 Report: Zenwalk|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://http://www.zeroshell.net/ ZeroShell]: bvardal ([[Editing COMP 3000 2011 Report: ZeroShell|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.zorin-os.com/ Zorin]: awillman&lt;br /&gt;
&lt;br /&gt;
[http://www.xbmc.org/ XBMC]: awallac1, ketsiagb&lt;br /&gt;
&lt;br /&gt;
[http://www.xubuntu.org/ Xubuntu]: ernibek, Komarova&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10698</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10698"/>
		<updated>2011-10-16T21:51:09Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
[[File:Starthttpd.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Starting the HTTPD service]]&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 5: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:Starthttpd.png&amp;diff=10697</id>
		<title>File:Starthttpd.png</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:Starthttpd.png&amp;diff=10697"/>
		<updated>2011-10-16T21:49:28Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10696</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10696"/>
		<updated>2011-10-16T21:48:52Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
[[File:Useridx.png|thumb|right|&#039;&#039;&#039;Figure 4: &#039;&#039;&#039;Retrieving the md5 password hash]]&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:Useridx.png&amp;diff=10695</id>
		<title>File:Useridx.png</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:Useridx.png&amp;diff=10695"/>
		<updated>2011-10-16T21:46:56Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10694</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10694"/>
		<updated>2011-10-16T21:45:43Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* Usage Evaluation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
Damn Vulnerable Linux comes packaged with a large collection and assortment of tutorials, as well as their solutions. In this basic usage evaluation, I will examine the board51 package.&lt;br /&gt;
&lt;br /&gt;
As web tutorials are accessed through localhost, to begin the tutorial necessitates first launching Apache, via the HTTPD shortcut on the desktop.&lt;br /&gt;
&lt;br /&gt;
===Board51 System===&lt;br /&gt;
While there are many exploits detailed within DVL, this evaluation will characterize the operations of the board51 admin attack. As Damn Vulnerable Linux conveniently provides outdated software, this is an example of an attack that will not work on live pages - the error has since been fixed.&lt;br /&gt;
&lt;br /&gt;
The 51 scripts software provide a forum, board and news system, and were previously found at www.laforge-groups.de. This security attack exploits the data storage system used by the software, primarily by retrieving the md5 hashes of user accounts and passwords from the storage file.&lt;br /&gt;
&lt;br /&gt;
===The Breach===&lt;br /&gt;
By default, board51 stores the md5 hashes of user accounts in a public file, with read access available to everyone. To access this information, an attacker needs only browse to /boarddata/data/user.idx, and then proceed to decrypt the md5 hash.&lt;br /&gt;
&lt;br /&gt;
===Prevention===&lt;br /&gt;
The administrator of a board51 website can prevent this attack by changing the privileges to the data folder and its files through chmod.&lt;br /&gt;
&lt;br /&gt;
===Overall Evaluation===&lt;br /&gt;
Damn Vulnerable Linux is very effective at presenting a testbed for exploiting real cases of security flaws. It accomplishes its stated goal of teaching the importance of security, and displays the cruciality of reinforcing every component of software.&lt;br /&gt;
&lt;br /&gt;
The ease-of-use is phenomenal, and the quantity of historical exploits from live software solidifies DVL as an essential learning tool for all security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10633</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10633"/>
		<updated>2011-10-16T20:42:37Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* Basic Operation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
The graphical interface offered by DVL is very minimalistic and utilitarian. The desktop itself is populated solely with shortcuts to services, to provide a quick way to enable/disable various components - SSH, Apache, Mysql, PHP, etc. - or quick access to development environments such as C++ and Java.&lt;br /&gt;
&lt;br /&gt;
The bottom menu panel contains a typical ‘start’ menu, as well as fast access to the terminal, two browsers (Firefox and Konqueror) and a text editor.&lt;br /&gt;
&lt;br /&gt;
The ‘start’ menu further mirrors the icons on the desktop, organized in a ‘Services’ category, as well as providing shortcuts to the training material and other tools.&lt;br /&gt;
&lt;br /&gt;
The overall organization of utilities is superb, as is the variety and quantity included. IDEs for many languages are evident, ranging from Dr. Scheme to Eclipse and JEdit; IDA free and Ollydbg also number among the disassemblers and debuggers that are provided. DVL contains all the necessary development software that its users require.&lt;br /&gt;
&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10626</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10626"/>
		<updated>2011-10-16T20:28:26Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* VMware Player Settings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system. This should take between 10 and 30 seconds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10525</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10525"/>
		<updated>2011-10-16T16:01:04Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* VMware Player Settings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10524</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10524"/>
		<updated>2011-10-16T16:00:20Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* VMware Player Settings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10523</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10523"/>
		<updated>2011-10-16T16:00:02Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* VMware Player Settings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|centre|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10522</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10522"/>
		<updated>2011-10-16T15:59:43Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* VMware Player Settings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10521</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10521"/>
		<updated>2011-10-16T15:58:18Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI Alternative]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10520</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10520"/>
		<updated>2011-10-16T15:57:59Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI Alternative]]&lt;br /&gt;
&lt;br /&gt;
~&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10518</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10518"/>
		<updated>2011-10-16T15:57:21Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: /* Installation / Startup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
To install Damn Vulnerable Linux, make sure to obtan the most recent ISO file from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
===VMware Player Settings===&lt;br /&gt;
[[File:DSL_img1.jpg|thumb|right|&#039;&#039;&#039;Figure 1: &#039;&#039;&#039;VMware Guest OS Settings]]&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Using VMware Player, Create a new virtual machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Choose the option to install from disc image file, and browse to find the ISO location on your machine.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When VMware prompts for the guest operating system, select ‘Linux’ and then ‘Other Linux 2.4.x kernel’ before proceeding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;When naming the virtual machine, enter ‘DVL’ and select next. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;The default disk capacity and hardware settings are sufficient, so proceed through these stages without making any changes. Click Finish.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Click enter to boot the system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;After the system successfully boots, login as ‘root’ with password ‘toor’. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;To switch from the command line to a graphical interface, type ‘startx’.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:DSL_img2.jpg|thumb|left|&#039;&#039;&#039;Figure 2: &#039;&#039;&#039;Login Screen After Successful Boot]]&lt;br /&gt;
[[File:DSL_img3.jpg|thumb|&#039;&#039;&#039;Figure 3: &#039;&#039;&#039;Starting The GUI Alternative]]&lt;br /&gt;
&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:DSL_img3.jpg&amp;diff=10195</id>
		<title>File:DSL img3.jpg</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:DSL_img3.jpg&amp;diff=10195"/>
		<updated>2011-10-14T20:15:53Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:DSL_img2.jpg&amp;diff=10194</id>
		<title>File:DSL img2.jpg</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:DSL_img2.jpg&amp;diff=10194"/>
		<updated>2011-10-14T20:15:46Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:DSL_img1.jpg&amp;diff=10184</id>
		<title>File:DSL img1.jpg</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=File:DSL_img1.jpg&amp;diff=10184"/>
		<updated>2011-10-14T20:09:55Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10133</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10133"/>
		<updated>2011-10-14T19:38:34Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
Damn Vulnerable Linux (DVL) is a Slax-based, live-DVD Linux distribution designed as a sandbox for security testers. DVL intentionally includes outdated and exploitable software, providing its users with the necessary tools to practice security intrusion.[1]&lt;br /&gt;
&lt;br /&gt;
===OS Inheritance===&lt;br /&gt;
Damn Vulnerable Linux is based on Slax[1], a popular bootable CD Linux distribution with a modular design. Slax provides a vast compact collection of pre-installed software and a well-designed user interface.[5]&lt;br /&gt;
&lt;br /&gt;
Initial versions of DVL closely resembled Damn Small Linux, as the developers used the established techniques of DSL to provide small-sized (150MB) ISO releases.[4] The operating system also made use of the Linux 2.4 kernel in use by Damn Small Linux, as it provided additional security exploits that were fixed in later kernels.[4]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
Damn Vulnerable Linux was conceived and primarily developed by Dr. Thorsten Schneider, who integrated it into his university lectures on software security at Bielefeld University, Germany.[1] [3]&lt;br /&gt;
&lt;br /&gt;
Schneider, then a member of the International Institute for Training, Assessment, and Certification (IITAC)[2], partnered with colleague Kryshaam of the French Reverse Engineering Team with the goal of creating a “plug-and-play system” that had “all the required tools installed” for training purposes, simply necessitating that the user to “run DVL in a virtual machine” to begin active learning.[4]&lt;br /&gt;
&lt;br /&gt;
While initial releases maintained a close relationship to Damn Small Linux, the developers later decided to model the operating system after Backtrack 2.0. The latest release, Damn Vulnerable Linux 1.5: Infectious Disease, is downloadable as a 1.8GB ISO file.[6]&lt;br /&gt;
&lt;br /&gt;
===Target Audience===&lt;br /&gt;
Damn Vulnerable Linux began as a functional tool for teaching students the importance of security. With its public release, Dr. Schneider and Kryshaam decided to continue this functionality, packaging a large collection of “tools, workbooks, text tutorials, and exploits” along with the operating system.[4] They later released their own mini-lectures on the main website, in the form of video tutorials. The first of these detailed how to cause a buffer overflow error.[4]&lt;br /&gt;
&lt;br /&gt;
As with many Linux distributions, once in public domain DVL quickly found itself as the centerpiece of various community discussion groups. Users found alternative uses for the operating system, including as a secondary tool for testing the security exploitation and intrusion devices of Backtrack.[7]&lt;br /&gt;
&lt;br /&gt;
===Obtaining A Copy===&lt;br /&gt;
The main website for Damn Vulnerable Linux has been offline for several months, reportedly having been taken offline due to German security laws.[9] It is possible to obtain an ISO copy of Damn Vulnerable Linux from Sourceforge.[6]&lt;br /&gt;
&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://distrowatch.com/table.php?distribution=dvl&lt;br /&gt;
&lt;br /&gt;
[2] http://web.archive.org/web/20070303043619/http://www.damnvulnerablelinux.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=21&amp;amp;Itemid=36&lt;br /&gt;
&lt;br /&gt;
[3]http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-201007&lt;br /&gt;
&lt;br /&gt;
[4]http://web.archive.org/web/20090206193556/http://linux.com/articles/60267&lt;br /&gt;
&lt;br /&gt;
[5]http://distrowatch.com/table.php?distribution=slax&lt;br /&gt;
&lt;br /&gt;
[6]http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/&lt;br /&gt;
&lt;br /&gt;
[7]http://forums.hak5.org/index.php?showtopic=11389&lt;br /&gt;
&lt;br /&gt;
[8]http://www.damnvulnerablelinux.com&lt;br /&gt;
[9]http://www.reddit.com/r/linux/comments/fid3k/damn_vulnerable_linux_is_gone/&lt;br /&gt;
&lt;br /&gt;
notes: dont have a box to properly install dsl on and attempt to break in with bt3&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_Distribution_Sign-up_2011&amp;diff=10117</id>
		<title>COMP 3000 Distribution Sign-up 2011</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_Distribution_Sign-up_2011&amp;diff=10117"/>
		<updated>2011-10-14T17:32:13Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sign up for the distribution you want to report on here.  Note that others are also editing  page so verify that the page hasn&#039;t been mangled after you make your changes.  To help with this, try to only edit the section for the appropriate alphabet range (e.g., Ubuntu should go under T-V).&lt;br /&gt;
&lt;br /&gt;
Note that no more than two people may sign up for each distribution.  If two people sign up for a distribution, you two &#039;&#039;&#039;should be working together&#039;&#039;&#039; on a joint report.  If you are not working together, then note that the person who picked the distribution gets a 10% bonus: that person, after all, did the work to find the distribution.&lt;br /&gt;
&lt;br /&gt;
Please sign up with your wiki name (which, generally, should be the same as your connect username).  See [http://www.distrowatch.com Distrowatch] to see what distributions are out there.  Also, search for types of operating system distributions.&lt;br /&gt;
&lt;br /&gt;
Please &#039;&#039;&#039;do not&#039;&#039;&#039; sign up for a major distribution.  This includes but is not limited to the major distributions listed by Distrowatch.  Pick out something specialized and obscure!  If in doubt, please email the instructors and TAs.&lt;br /&gt;
&lt;br /&gt;
If you are submitting your report on the wiki, please add a link to it as shown in the example.  Please title the page using the name of your distribution, not your name.&lt;br /&gt;
&lt;br /&gt;
Further information on the report is [[COMP 3000 Distribution Report Specifications 2011|here]].&lt;br /&gt;
&lt;br /&gt;
Example entry:&lt;br /&gt;
&lt;br /&gt;
* [http://www.ubuntu.com Ubuntu]: asomayaj, snetimar ([[COMP 3000 2011 Report: Ubuntu|Report]])&lt;br /&gt;
&lt;br /&gt;
==Distributions A-D==&lt;br /&gt;
[http://alpinelinux.org/ Alpine Linux]: mevans&lt;br /&gt;
&lt;br /&gt;
[http://www.apodio.org/ APODIO]: mbrowna ([[COMP 3000 2011 Report: APODIO|Report]])&lt;br /&gt;
&lt;br /&gt;
BackTrack: dcarson&lt;br /&gt;
&lt;br /&gt;
CAINE Linux: nyoung2&lt;br /&gt;
&lt;br /&gt;
Chromium OS(Chrome OS): baathari&lt;br /&gt;
&lt;br /&gt;
CrunchBang: drewmartin&lt;br /&gt;
&lt;br /&gt;
[http://crux.nu/ CRUX]: zzhou6&lt;br /&gt;
&lt;br /&gt;
Damn Small Linux: MartyV&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable Linux: amurphy7&lt;br /&gt;
&lt;br /&gt;
[http://www.doudoulinux.org/ DoudouLinux]:fmcyamwe,tchopel&lt;br /&gt;
&lt;br /&gt;
==Distributions E-H==&lt;br /&gt;
&lt;br /&gt;
[http://www.funtoo.org/ Funtoo]: porter.nicolas&lt;br /&gt;
&lt;br /&gt;
[http://www.gentoo.org/ Gentoo]: Bobbybobbets&lt;br /&gt;
&lt;br /&gt;
[http://www.gobolinux.org/ GoboLinux]: NameGoesHere&lt;br /&gt;
&lt;br /&gt;
[http://haiku-os.org/ Haiku]: nhoda, thildebr&lt;br /&gt;
&lt;br /&gt;
[http://hannahmontana.sourceforge.net/Site/Home.html Hannah Montana Linux]: ksubedi&lt;br /&gt;
&lt;br /&gt;
==Distributions I-M==&lt;br /&gt;
Incognito Live System: bwernik&lt;br /&gt;
&lt;br /&gt;
[http://www.inquisitor.ru/ Inquisitor]: atchekan&lt;br /&gt;
&lt;br /&gt;
[http://www.jolicloud.com/ Joli OS (Jolicloud)]: nkathrad tsukasa19&lt;br /&gt;
&lt;br /&gt;
[http://www.dee.su/liberte/ Liberté Linux]: Murals, ttian1&lt;br /&gt;
&lt;br /&gt;
[http://www.spi.dod.mil/lipose.htm Lightweight Portable Security]: jeckhard&lt;br /&gt;
&lt;br /&gt;
[http://linhes.org/bugs/ LinHes]:jmarcha1&lt;br /&gt;
&lt;br /&gt;
[http://live.linux-gamers.net/ linuX-Gamers Live]: dlpkelly&lt;br /&gt;
&lt;br /&gt;
Linux Mangaka One: AsoCchahal ([[COMP 3000 2011 Report: AsoCchahal|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://lubuntu.net/ Lubuntu]: falaskar&lt;br /&gt;
&lt;br /&gt;
[http://www.lunar-linux.org/ Lunar Linux]: rwolfe, qliu1&lt;br /&gt;
&lt;br /&gt;
[http://www.menuetos.net/ MenuetOS]: Caesar, Vangelis&lt;br /&gt;
&lt;br /&gt;
[http://puppylinux.org/wikka/LegacyOS/ Legacy OS]:rnyssanb&lt;br /&gt;
&lt;br /&gt;
[http://macpup.org/ Macpup]: kbyrd, rcarrot1 ([[COMP 3000 2011 Report: Macpup|Report]])&lt;br /&gt;
&lt;br /&gt;
==Distributions N-P==&lt;br /&gt;
&lt;br /&gt;
Oracle Linux : vsanthir&lt;br /&gt;
&lt;br /&gt;
[http://partedmagic.com/doku.php Parted Magic]: erhodes&lt;br /&gt;
&lt;br /&gt;
[http://perllinux.sourceforge.net/ Perl/Linux]:&lt;br /&gt;
&lt;br /&gt;
Privatix Live-System: gbooth, sbrett ([[COMP 3000 2011 Report: Privatix|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://puppylinux.org/ Puppy Linux]: mwooff, jnrahme&lt;br /&gt;
&lt;br /&gt;
[http://www.pinguyos.com/ PinguyOS]: ssivara, pdawod&lt;br /&gt;
&lt;br /&gt;
[http://www.en.poseidonlinux.org/ Poseidon Linux]: 36chambers&lt;br /&gt;
&lt;br /&gt;
PC-BSD : todetoyi&lt;br /&gt;
&lt;br /&gt;
[http://www.pinguyos.com/ PinguyOS]: uramazan&lt;br /&gt;
&lt;br /&gt;
[http://www.parsix.org/ Parsix GNU/Linux]: tzhang1&lt;br /&gt;
&lt;br /&gt;
[http://www.puredyne.org/ Puredyne]: Carlton&lt;br /&gt;
&lt;br /&gt;
==Distributions Q-S==&lt;br /&gt;
[http://qubes-os.org/Home.html Qubes]:&lt;br /&gt;
&lt;br /&gt;
[http://bkhome.org/quirky/ Quirky]: Qingming_no_lisca&lt;br /&gt;
&lt;br /&gt;
[http://www.swiftlinux.org/ Swift Linux]: mabadeer, Yliu11([[COMP 3000 2011 Yunpeng Liu&#039;s Report: Swift Linux|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.salineos.com/ SalineOS]: drhill ([[COMP 3000 2011 Drhill&#039;s Report: SalineOS 1.4|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.slitaz.org/en/ SliTaz]: Bobbybobbets&lt;br /&gt;
&lt;br /&gt;
[http://sourcemage.org/projects/source-mage/wiki Source Mage]: deadlytea&lt;br /&gt;
&lt;br /&gt;
[http://www.stresslinux.org/sl/ StressLinux]: achaddad&lt;br /&gt;
&lt;br /&gt;
[http://sourceforge.net/projects/suicide-linux/ Suicide-Linux]:&lt;br /&gt;
&lt;br /&gt;
==Distributions T-W==&lt;br /&gt;
[http://tails.boum.org/index.en.html/ TAILS]: Khorrus&lt;br /&gt;
&lt;br /&gt;
[http://bellard.org/tcc/tccboot.html TCCBOOT: TinyCC Boot Loader]:&lt;br /&gt;
&lt;br /&gt;
Tiny Core Linux: aadegbem&lt;br /&gt;
&lt;br /&gt;
[http://www.minimalinux.org/ttylinux/ ttylinux]: kmacmart&lt;br /&gt;
&lt;br /&gt;
Vector: judethedude,Lkuate&lt;br /&gt;
&lt;br /&gt;
[http://www.planetwatt.com/ wattOS]: JPAL&lt;br /&gt;
&lt;br /&gt;
[http://ubuntustudio.org/ Ubuntu Studio]: Chashem and Jbyford ([[Editing COMP 3000 2011 Report: Ubuntu Studio|Report]])&lt;br /&gt;
&lt;br /&gt;
==Distributions X-Z==&lt;br /&gt;
[http://www.zentyal.com/ Zentyal]: cyu3 ([[Editing COMP 3000 2011 Report: Zentyal|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.zenwalk.org/ Zenwalk]: mgizbert ([[Editing COMP 3000 2011 Report: Zenwalk|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://http://www.zeroshell.net/ ZeroShell]: bvardal ([[Editing COMP 3000 2011 Report: ZeroShell|Report]])&lt;br /&gt;
&lt;br /&gt;
[http://www.zorin-os.com/ Zorin]: awillman&lt;br /&gt;
&lt;br /&gt;
[http://www.xbmc.org/ XBMC]: awallac1, ketsiagb&lt;br /&gt;
&lt;br /&gt;
[http://www.xubuntu.org/ Xubuntu]: ernibek, Komarova&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10116</id>
		<title>COMP 3000 2011 Report: Damn Vulnerable Linux</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_2011_Report:_Damn_Vulnerable_Linux&amp;diff=10116"/>
		<updated>2011-10-14T17:31:42Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: Created page with &amp;quot;=Part I= ==Background== ==Installation / Startup== ==Basic Operation== ==Usage Evaluation== ==References==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Part I=&lt;br /&gt;
==Background==&lt;br /&gt;
==Installation / Startup==&lt;br /&gt;
==Basic Operation==&lt;br /&gt;
==Usage Evaluation==&lt;br /&gt;
==References==&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_Distribution_Sign-up_2011&amp;diff=9948</id>
		<title>COMP 3000 Distribution Sign-up 2011</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=COMP_3000_Distribution_Sign-up_2011&amp;diff=9948"/>
		<updated>2011-10-06T19:15:55Z</updated>

		<summary type="html">&lt;p&gt;Amurphy7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sign up for the distribution you want to report on here.  Note that others are also editing this page so verify that the page hasn&#039;t been mangled after you make your changes.  To help with this, try to only edit the section for the appropriate alphabet range (e.g., Ubuntu should go under T-V).&lt;br /&gt;
&lt;br /&gt;
Note that no more than two people may sign up for each distribution.  Please sign up with your wiki name (which, generally, should be the same as your connect username).  See [http://www.distrowatch.com Distrowatch] to see what distributions are out there.  Also, search for types of operating system distributions.&lt;br /&gt;
&lt;br /&gt;
Please &#039;&#039;&#039;do not&#039;&#039;&#039; sign up for a major distribution.  This includes but is not limited to the major distributions listed by Distrowatch.  Pick out something specialized and obscure!  If in doubt, please email the instructors and TAs.&lt;br /&gt;
&lt;br /&gt;
Example entry:&lt;br /&gt;
&lt;br /&gt;
* [http://www.ubuntu.com Ubuntu]: asomayaj, snetimar&lt;br /&gt;
&lt;br /&gt;
==Distributions A-D==&lt;br /&gt;
BackTrack: dcarson, amurphy7&lt;br /&gt;
&lt;br /&gt;
CAINE Linux: nyoung2&lt;br /&gt;
&lt;br /&gt;
Chromium OS(Chrome OS): baathari, dneray&lt;br /&gt;
&lt;br /&gt;
CrunchBang: drewmartin&lt;br /&gt;
&lt;br /&gt;
Damn Small Linux: MartyV&lt;br /&gt;
&lt;br /&gt;
[http://www.doudoulinux.org/ DoudouLinux]:fmcyamwe,tchopel&lt;br /&gt;
&lt;br /&gt;
==Distributions E-H==&lt;br /&gt;
&lt;br /&gt;
[http://www.funtoo.org/ Funtoo]: porter.nicolas&lt;br /&gt;
&lt;br /&gt;
[http://haiku-os.org/ Haiku]: nhoda, thildebr&lt;br /&gt;
&lt;br /&gt;
==Distributions I-M==&lt;br /&gt;
Incognito Live System: bwernik&lt;br /&gt;
&lt;br /&gt;
[http://www.inquisitor.ru/ Inquisitor]: atchekan&lt;br /&gt;
&lt;br /&gt;
[http://www.jolicloud.com/ Joli OS (Jolicloud)]: nkathrad&lt;br /&gt;
&lt;br /&gt;
[http://www.dee.su/liberte/ Liberté Linux]: Murals&lt;br /&gt;
&lt;br /&gt;
[http://www.spi.dod.mil/lipose.htm/ Lightweight Portable Security]: jeckhard&lt;br /&gt;
&lt;br /&gt;
[http://linhes.org/bugs/ LinHes]:jmarcha1&lt;br /&gt;
&lt;br /&gt;
Linux Mangaka One: AsoCchahal&lt;br /&gt;
&lt;br /&gt;
[http://www.lunar-linux.org/ Lunar Linux]: rwolfe, qliu1&lt;br /&gt;
&lt;br /&gt;
[http://www.menuetos.net/ MenuetOS]: Caesar, Vangelis(San4o Pan4o)&lt;br /&gt;
&lt;br /&gt;
[http://puppylinux.org/wikka/LegacyOS/ Legacy OS]:rnyssanb&lt;br /&gt;
&lt;br /&gt;
==Distributions N-P==&lt;br /&gt;
&lt;br /&gt;
Privatix Live-System: gbooth, sbrett&lt;br /&gt;
&lt;br /&gt;
[http://puppylinux.org/ Puppy Linux]: mwooff, jnrahme&lt;br /&gt;
&lt;br /&gt;
[http://www.pinguyos.com/ PinguyOS]: ssivara&lt;br /&gt;
&lt;br /&gt;
[http://www.en.poseidonlinux.org/ Poseidon Linux]: 36chambers&lt;br /&gt;
&lt;br /&gt;
PC-BSD : todetoyi&lt;br /&gt;
&lt;br /&gt;
[http://www.pinguyos.com/ PinguyOS]: uramazan&lt;br /&gt;
&lt;br /&gt;
==Distributions Q-S==&lt;br /&gt;
[http://www.swiftlinux.org/ Swift Linux]: mabadeer, Yliu11&lt;br /&gt;
&lt;br /&gt;
[http://www.salineos.com/ SalineOS]: drhill&lt;br /&gt;
&lt;br /&gt;
[http://sourcemage.org/projects/source-mage/wiki Source Mage]: deadlytea&lt;br /&gt;
&lt;br /&gt;
[http://www.stresslinux.org/sl/ StressLinux]: achaddad&lt;br /&gt;
&lt;br /&gt;
==Distributions T-V==&lt;br /&gt;
[http://tails.boum.org/index.en.html/ TAILS]: Khorrus&lt;br /&gt;
&lt;br /&gt;
Tiny Core Linux: aadegbem&lt;br /&gt;
&lt;br /&gt;
[http://www.minimalinux.org/ttylinux/ ttylinux]: kmacmart&lt;br /&gt;
&lt;br /&gt;
Vector: judethedude,Lkuate&lt;br /&gt;
&lt;br /&gt;
==Distributions X-Z==&lt;br /&gt;
[http://www.zentyal.com/ Zentyal]: cyu3&lt;br /&gt;
&lt;br /&gt;
ZeroShell: bvardal&lt;br /&gt;
&lt;br /&gt;
[http://www.zorin-os.com/ Zorin]: awillman, jboucha2&lt;br /&gt;
&lt;br /&gt;
[http://www.xbmc.org/ XBMC]: awallac1, ketsiagb&lt;br /&gt;
&lt;br /&gt;
Xubuntu: ernibek, Komarova&lt;/div&gt;</summary>
		<author><name>Amurphy7</name></author>
	</entry>
</feed>