Find the answer to your Linux question:
Results 1 to 2 of 2
Enjoy an ad free experience by logging in. Not a member yet? Register.
  1. #1

    Demonstrating MAC using SELinux, Metasploit and DVL

    I would like to demonstrate how mandatory access control(implemented using SELinux) can be used to avoid most of the attacks.I have metasploit framework and Damn Vulnerable Linux.
    I am kindly requesting you to give me some ideas on how i can use these three ie SELinux,metasploit and DVL to accomplish this.
    Thanks in advance.

  2. #2
    Linux Engineer RobinVossen's Avatar
    Join Date
    Aug 2007
    The Netherlands
    Well I am not going to show you how to do it.
    Since this might be used for bad Goals.
    But, what about sending a exploit to a FTP/HTTP/SSH server to gain Full Root Control over the Box.
    When SELinux is on you cant. When not you can exploit.
    New Users, please read this..
    Google first, then ask..

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts