1

(0 replies, posted in General Discussion)

We decided that it is time to move on from NetSecL OS and create something with a new identity since it is different from what NetSecL OS was. Still you can find v5 on our ftp server which includes penetration tools and GrSecurity. As you probably understood URIX OS is a general purpose OS and available now on:
http://urix.us and SuseStudio.

Installation instructions: http://rsync.netsecl.com/urix_install.pdf

During the development we had a lot of positive experience with Linux as a desktop, many friends supported us with testing the OS on different hardware.

Ever since the last version of NetSecL we started  moving towards USB flash drives. URIX is a USB based distribution. Clearly Linux has become more than just a server OS and it can provide a truly good experience for desktop users. Almost all vendors provide the needed firmware and also in some cases drivers that support the hardware you use. We wrote to http://wps-community.org/ and they allowed us to include their office in our work under their terms and conditions which was a very nice. The future planned works is to include other very well known software into the  distribution under what form - installer, free appstore we will leave this as surprise until it becomes reality.

Best Regards,
NetSecL/URIX Team

2

(0 replies, posted in General Discussion)

This version of the OS is a general purpose release unlike the previous versions where you had Penetration tools and GrSecurity.

Installation Guide: http://rsync.netsecl.com/netsecl_install.pdf

Demo: https://www.youtube.com/watch?v=11bF88KF-q0

Download: http://netsecl.com/download

You can still install Grsecurity from here:
https://github.com/kdave/openSUSE-garde … E-gardened

And we will keep v5 on our FTP servers in case any penetration tools are needed.

The main idea is to devide the project in several directions:
- General Purpose OS (NetSecL OS)
- Virtualization (NetSecL VM)
- Tools (NetSecL Toolset) - in progress of renewal

Below the included applications in this version of the software.
On tests this was the RAM Consumption: 200 MB and CPU usage: 3 %
Hardware compatability

Accessories:
- Galculator
- Leafpad
- Parcellite
- PDF Mod

Graphics:
- gOCR
- Gtkam
- Image Viewer
- Pinta
- Simple Scan

Internet:
- Chromium
- Evolution
- FileZilla
- Pidgin
- Remmina (RDP, VNC, XDMCP)
- Transmission
- uGet
- Xmrt
- Zenmap

Multimedia:
- Alsa Mixer
- Brasero
- Rythmbox
- VLC

Office:
- AbiWord
- Gnumeric

System:
- GParted
- HTop
- MC
- Sensor Viewer
- Task Manager
- WireShark

Other:
-PuTTy

Wine

Have fun and comment!

Best Regards,
NetSecL Team

3

(1 replies, posted in General Discussion)

Sure Sindhu we can discuss this privately. Once I have a new release I will contact you right away!

4

(1 replies, posted in General Discussion)

You can actually from openstudio, but I believe that will take up all of you ram - suse did not think out this very well.

5

(2 replies, posted in General Discussion)

I got the release date netsecl 2.6    2/23/2010 by that time Slackware 13 was the release we have built on + current packages:
http://www.slackware.com/releasenotes/13.0.php

6

(2 replies, posted in General Discussion)

Hello Vetus,

The installation process doesn't differ from Slackware installation. Yes this version is installable, we had some versions that were live cds, but they were based on OpenSuse. Regarding the version on which the distribution is based - I will check that and get back to you.

Yuriy

7

(0 replies, posted in General Discussion)

After the last release v 5, I have decided to discontinue the project NetSecL OS. Mainly because there is not that big interest of using the distribution as a penetration testing platform, it is still available in Suse Studio so anyone wishing to continue the project is free to do so (under a different name) and clone the appliance. The project has become self-maintainable in a big part since anyone can upgrade already the packages in Suse Studio. Also not to mention that the popularity of other similar projects with bigger communities just make it unnecessary to continue the project.

When I began with ISlack it was based on Slackware and my motivation there was that it was not that user friendly, which I wanted to change and I believe I did to some degree - I got many mails about it and that made me personally happy. Also the development of the ISlack firewall was really an exciting experience which involved not only my own efforts and also other community members.

When I added GrSecurity to the ISlack project, everything changed. To be honest, I haven't had that much issues on any other operating system. The security that the GrSecurity provided was top notch, but also created many issue on the software that was being used - it was an effort to make it working on ISlack.

After this, the distribution was renamed to NetSecL many of the issues with GrSecurity were already resolved.

Suse Studio introduced a new way of creating distributions and this saved me a lot of time, that's why I later based the distribution on OpenSuse.

If you have any corporate/personal interest in the project. Please contact us on: support@netsecl.com

Some History:

About NetSecL Linux

NetSecL Linux is (maybe) the only Linux distribution with GrSecurity that was actively developed. There are some (abandoned) projects like Gentoo Hardened, Debian Hardened that used to implement GrSecurity model. GrSecurity has very strict rules and policies applied on kernel level for memory protection and against exploitation of the Linux system these is one of the reasons why it is very hard to get everything working.

About the Author

The Author of the linux distribution is Yuriy Stanchev and you can find him on:
twitter: http://twitter.com/#!/iuri_stanchev
facebook: http://www.facebook.com/yuriy.stanchev
skype: iuri.stanchev
personal blog: yuriystanchev.blogspot.com

NetSecL Firewall

The NetSecL firewall is part of NetSecL and is a script not a GUI application, it stealths all ports and protects against many scans, has snort if you would like to use it as IDS. You basically would not have to do anything just let it run (which also happens by default in NetSecL), unless you need to allow some server application trough the firewall or set some IP that the script was unable to fetch. Options are in the script itself, open it in a text editor and say Y or N to turn on or off available options.

History

The project started as a Linux distribution spread among friends and soon enough was spread in Internet by the name of ISlack. The focus of the Linux distribution was on security. Initially only configuration was hardened later on GrSecurity began playing a big role in the Linux distribution. The distribution used tgz (Slackware Linux) Packages, the current version of the Linux distribution uses rpm package management and is based on OpenSuse. Penetration testing became also one of the focuses of the Linux distribution - the distribution includes well know application as Metasploit, Wireshark, Etherape, OpenVas, Nmap as well as many console applications for penetration testing.

Version History

islack 1.0 03-May-2005 18:52

islack 1.1 02-Oct-2005 13:57

islack 1.2 17-Dec-2005 14:10

netsecl 1.3 5/20/2006

netsecl 2.0 12/17/2006

netsecl 2.1 7/16/2007

netsecl 2.3 9/28/2008

netsecl 2.4 5/17/2009

netsecl 2.6 2/23/2010

netsecl 3.0 8/17/2010

netsecl 4.0 2012/08/07

netsecl 5.0 2013/11/26   


Release Notes:

islack 1.0     03-May-2005 18:52

ISlack 's goal is to bring you a Secure System that's why servers were removed, ports were closed, all services listening for connection are closed, outgoing connections are not closed I advise you to close all ports you won't be using, for example IRC 6667 or something else, look at /etc/services.
Samba was left so you can mount Samba (Windows) shares. Many Security Related Programs for Penetration testing were included. ISlack comes with KDE 3.2.3, Gnome, Open Office, MPlayer (with almost all codecs),Mozilla FireFox and Plugins for Mozilla FireFox handling the most popular file formats (flash,pdf,avi etc.),Wine, Xmame, Hydra, Airsnort, Amap, Snort, Linux Kernel 2.6.11 and 2.4.26 and many more.

Historic: http://web.archive.org/web/200508020025 … laced.com/
_______________________________________________________________________

islack 1.1     02-Oct-2005 13:57


The Main Higlights of this release:
Tripwire, Nessus, Wifiscanner, Yersinia, Zebra, Kerberos, KDE 3.4.2, XOrg 6.8.2, Dsniff, Ettercap,
Fakeconnect, Tor, Slapt-get, Ngrep, Discover - Hardware Recognition, Open Office 1.1.4,
Kernel 2.4.31 and Kernel 2.6.12.5. Many updates. Many othere goodies. Enjoy.

Note: To use Audio recognition with ALSA you should remove audio
from discover config file (/usr/etc/discover-modprobe.conf).

_______________________________________________________________________

islack 1.2     17-Dec-2005 14:10

The Main Higlights of this release:
Grsecurity - kernels are patched with it by default, chpax, paxctl - control the
Grsecurity PAX feature, over 50 MB of new penetration tools, Open Office 2.0.0,
Kernel 2.4.32 and Kernel 2.6.14.3, many updates. Take a look at the Changelog (Changelog.txt)
Enjoy.

_______________________________________________________________________

netsecl 1.3     5/20/2006

NetSecL 1.3 is out smile. There are some important improvements in the security since ISlack 1.2. There are 2 Paranoia kernels 2.6.x and 2.4.x, they are very restrictive so please be carefull it is advisable to use them as a second kernel. I remind you that PaX Kernels are on CD 2, don't use the kernels from the bootme directory on CD 1 for a second kernel. Some of the libraries were recompiled so they can not use the stack, X was also recompiled and became a little bigger. Here are the results from paxtest:

bash-3.1# paxtest blackhat
Executable anonymous mapping : Killed
Executable bss : Killed
Executable data : Killed
Executable heap : Killed
Executable stack : Killed
Executable anonymous mapping (mprotect) : Killed
Executable bss (mprotect) : Killed
Executable data (mprotect) : Killed
Executable heap (mprotect) : Killed
Executable shared library bss (mprotect) : Killed
Executable shared library data (mprotect): Killed
Executable stack (mprotect) : Killed
Anonymous mapping randomisation test : 16 bits (guessed)
Heap randomisation test (ET_EXEC) : 13 bits (guessed)
Heap randomisation test (ET_DYN) : 25 bits (guessed)
Main executable randomisation (ET_EXEC) : 16 bits (guessed)
Main executable randomisation (ET_DYN) : 16 bits (guessed)
Shared library randomisation test : 16 bits (guessed)
Stack randomisation test (SEGMEXEC) : 23 bits (guessed)
Stack randomisation test (PAGEEXEC) : 24 bits (guessed)
Return to function (strcpy) : Vulnerable
Return to function (strcpy, RANDEXEC) : Vulnerable
Return to function (memcpy) : Vulnerable
Return to function (memcpy, RANDEXEC) : Vulnerable
Executable shared library bss : Killed
Executable shared library data : Killed
Writable text segments : Killed


The remaining vulnarabilities are ment to fail:

Quote:
protecting against this kind of attack in general is hard, but certain subtypes can be thwarted to an extent by randomization, stack layout changes (SSP and the like), etc. the general solution will need userland changes as outlined in the PaX future doc, but in the meantime and in the interest of not giving anyone a false sense of security, we included these tests and they are meant to fail.


Reference:
http://forums.grsecurity.net/viewtopic. … ght=strcpy

There is also a default script with paxpermissions that is executade on the first boot to allow some kind of usability for the system when it is used with paranoia kernels so don't get scared if you get flooded with messages on the first boot. The list is still not full, but I hope to have it full for 1.4 and make all kernels paranoid.

Clamav, Klamav and Dazuko are there now - work perfect. For all other changes check the Changelog:
ftp://mirrors.unixsol.org/netsecl/Changelog.txt

_______________________________________________________________________
netsecl 2.0     12/17/2006

NetSecL 2.0 is out! This release has packages for i486 machines up to 64 bit, it includes the NetSecL firewall that has the ability to work with Snort Inline, more than 200 updates! The security was improved thanks to the new Binutils supporting PT_PAX_FLAGS - all i486_64 packages are compiled with it. Also I have included Tork and with it you can use tor to anonymize yourself on the web. Most hardened distros still go with the X.Org 6.8.2, well guess what - we have Xorg 6.9.0. I have finally fixed most problems with the PAX permissions and we now use a generic 2.6.x kernel which is also a paranoia kernel. The hardware recognition was also improved with the new version of Discover and some additional modules.

_______________________________________________________________________

netsecl    2.1    7/16/2007

NetSecL 2.1 introduces GCC with Stack Smashing Protection, this increases the security of the compiled packages (i486_64). More than 250 Package Updates. Most networking packages are now i486_64 packages. This release fixes some unnoticed bugs in 2.0 version. Hardware recognition data was updated to the latest available. Enjoy NetSecL 2.1.
_______________________________________________________________________

netsecl 2.2    2/17/2008

NetSecL 2.2 is out! As you can see I have shrunk the distribution to 1 CD. The default desktop is Xfce from now on, but you can still run KDE applications. In this release you will find 106 updates and 20 fixes, Linux kernel 2.6.23.9 with GrSecurity also the pre-compiled kernel supports from 1 up to 8 processors. Major packages like Snort, iptables, firewall scripts and others were updated. The fixes in this release are updates as well. The mark i486_64 indicates that the package is executable from i486 machines up to 64-bit systems, it also indicates that it is compiled with Binutils that supports PT_PAX_FLAGS and with GCC with stack smashing protection
_______________________________________________________________________
netsecl 2.3    9/28/2008

As the NetSecL Project developer - I am proud to announce the release of NetSecL 2.3. And now to the main highlights:
-More improved full setup using rsync - we were able to get a full install in 5 minutes this is the fastest result for now.

The results may vary depending on the RAM you have. As for the 2 tests we conducted we got 7 min for a full setup with 1 GB of RAM and 5 min with 8 GB. However we believe that 5 min installation can be achieved on 2 GB of RAM.

-Smaller size of the ISO file - another 100 MB got melted.
-A source based portage system CruxPorts4Slack - mainly suitable for upgrade of commandline utilities from source.
-A convertion system adding PT_PAX_FLAGS to ELF binaries.
-A more advanced kernel configuration and additional modules (ndiswrapper and dazuko - fixed).
-Xorg update thanks to the excelent packages from Zenwalk. Additionally with small modifications to the xorg ati drivers, we added support for the latest ATI videocards 4850/4870. As for the xorg.conf file generation - it is turned off since the current drivers don't fully support new videocards instead a xorg.conf file with vesa driver is used and of course you can try out the default driver for your videocard.

As for the rest of the changes. The Changelog: http://mirrors.unixsol.org/netsecl/Changelog.txt.

In case someone is interested, the actual change in the code of the xorg driver - it is mentioned here:
http://opensolaris.org/jive/thread.jspa … p;tstart=0

Yuriy

_______________________________________________________________________
netsecl 2.4    5/17/2009

*X.Org drivers are updated to the latest.
*X.Org autostart is now being delayed a few seconds so you could break to the console, if it is needed - mainly handy if you need to change the driver used.
*Metasploit is updated to its latest version; Ruby is re-included;
*New kernel configuration with better support for SATA drives (IDE is still available as a module).
*New tools, like 0trace, Dmitry and Evilgrade are included in the penetration package.
*Dazuko is removed and replaced by Dazuko_FS.
* The CruxPorts4Slack portage system was used for generating all packages tagged as NetSecL packages.

_______________________________________________________________________

netsecl 2.6    2/23/2010

In the new release you will find QEMU, Servers, new penetration tools. We took our time to separate the usual network utilities and penetration tools and add them in a new section. Also you will find that now we have a section srv with some server packages in it. There are many updates to the libraries and additional bindings to perl and python that we hope will be useful for future programs included with the distribution. You will also find in the distribution ISO a VMX file that is created with VMmanager and that you can use for creating a Virtual machine - mount the ISO copy the VMX folder, unmount the ISO move it to the VMX folder (that you just copied) and start it with VMware Player. If you like to install it on a real hardware the ISO is writable on a mini DVD or DVD. For a full changelog please refer to: ftp://mirrors.unixsol.org/netsecl/Changelog.txt

_______________________________________________________________________
netsecl 3.0    8/17/2010

It was time for a change and we at NetSecL realized that, the new version of NetSecL 3.0 is a live DVD + installation based on OpenSuse. Once installed you can fully enjoy the features of GrSecurity hardened kernel and penetration tools OR if you like to do some penetration testing you can directly run all tools from the live DVD. NetSecL firewall is included as always and most of the penetration tools are ported to the new platform. Also we'd like to mention that we've got many other programs up and running with GrSecurity enabled, which is great success especially when it comes to programs like wine, OpenOffice, Vuze, Qemu and many gnome applications. The password for both admin and root user on the DVD is linux.

Warning: when you install use ext3 (tested) for root partition.

Minimal System Requirements for running the live DVD: 512 MB of RAM
Minimal System Requirements for installing:  1 GB of RAM, 5 GB partition at least (SATA  - tested)

With that said we think that the new version of NetSecL is fully function as a Desktop, Server and Penetration testing environment. No Warranty - use it on your own responsibility. Enjoy.

_______________________________________________________________________

netsecl 4.0 2012/08/07

NetSecL OS 4.0 comes with LXDE. Grsecurity kernel is updated to 3.2.21. Here is the work we have done: name change NetSecL to NetSecL OS; ported the whole system to 64-bit architecture; updated Exploit-db repository; Metasploit with GUI; Firefox; 0install integrated; Mixer, LibreOffice, GIMP, Dia, Inkscape, Evolution, Brasero and other packages included to provide the necessary tools for your office needs; Putty, Remmina, FileZilla, Pidgin and other applications for remote access and management; obsolete penetrations tools are removed.

_______________________________________________________________________

netsecl 5.0 2013/11/26

It has been a while, but we like to present NetSecL 5.0 which comes with Xfce and is based on openSUSE 12.3. We bring a new installation media - installation from a USB media; we saw that the distribution grew on size which definitely made us change the medium. All packages are compatible and updated to openSUSE 12.3 and the grsecurity 3.9.4 kernel is finally integrated into the operating system properly. Metasploit is updated to 4.7, Firefox is removed and Chromium is added, exploit-db repository is updated. The performance is slightly improved by the Xfce environment. Besides the USB installation image you can try NetSecL OS out on a virtual machine (OVA appliance). The password for both the 'root' and 'tux' user is 'linux'.

Stay tuned, we will publish an archive with all the versions for which you can get support if there is big interest.

Bye,
Yuriy

8

(5 replies, posted in Hardware )

I see, interesting. Well if you need any help let me know. From what you wrote I understand you already have installed it successfully after the CPU change. If you have interest in something newer let me know or if you need. Any help with the old version even.

It has been a while, but we like to present to your attention NetSecL 5.0 which comes with XFCE and is based on openSuse 12.3 64 bit. We bring a new installation media - installation from USB (see the installation guide), we saw that the distribution grows on size which definitely made us change the media. All packages are compatible and updated to openSuse 12.3 and the GrSecurity 3.9.4 kernel is finally integrated into the operating system properly. Metasploit is updated to 4.7, Firefox is removed and Chromium is added, exploit-db repository is updated. The performance is slightly improved by the XFCE environment. Besides the USB installation image you can try NetSecL OS out on a virtual machine (OVA appliance), that is available on Suse Studio.

The password for both the root and tux user is linux.

Notes on Metasploit:
Before executing: msfconsole from apps be sure to start postgres (not as root)

Check the installation guide: http://rsync.netsecl.com/netsecl_install.pdf
Some eye-candy: http://rsync.netsecl.com/NetSecL_release.pdf
The tools-list: http://rsync.netsecl.com/tools_netsecl.pdf

Credits go to:
http://ftp.twaren.net/Linux/OpenSuSE/re … rsecurity/

Minimal System Requirements for installing:  1 GB of RAM, 5 GB partition at least (SATA  - tested, should work on IDE too).

Enjoy,
The NetSecL Team

10

(5 replies, posted in Hardware )

This seems pretty good hardware - I really don't get why you would use older version of the distribution. Is there any reason? I would suggest using the new version, actually I'm currently working on a new version based on Opensuse 12.3 so anything compatible with that is OK. I can share a beta with you if you are interested? And as far as I searched from the components you choose most are - so I would suggest checking on that on google. The most important parts are the MB/Chipset as support and the video, but I don't think you will have any issues if you do the research on OpenSuse first.

11

(5 replies, posted in Hardware )

What kind of legacy hardware do you have/plan to have?

12

(10 replies, posted in Debuging)

Great, good that it works. About the log it is either the logging service or grsecurity blocking it, might be an option in the kernel - but I don't belive that. I will look into it, thanks for noticing and happy using. If you find anything else let me know.

13

(10 replies, posted in Debuging)

Ok, try now. I have built in the video driver inside the kernel. If it doesn't work again we'll at least know it is not from the graphic card. Try again the recovery mode of the kernel and if you get again no signal, please notice what is the last you see it might be helpful to understand the issue if it is not from the graphic driver.

https://susestudio.com/a/EmL6GN/secured-os-32-bit

14

(10 replies, posted in Debuging)

Ok, thanks. I will now try to recompile a kernel that firs more your configuration and lets hope this time it will work for you and other that have similar configurations.

15

(10 replies, posted in Debuging)

OK, I guess I will have to dig a bit. Do this - boot with the normal kernel and then open a terminal and issue lsmod and paste the output here.

EDIT: I made some research now and it seems both of your hardware have intel cards and intel chipsets when you give me the output of lsmod I will know exactly waht modules you will need and I will recompile the kernel.

16

(10 replies, posted in Debuging)

Try now, i tested and at least here it runs:
https://susestudio.com/a/EmL6GN/secured-os-32-bit

Also if it doesn't work try this from the Boot Menu> Advanced options> Grsecurity (failsafe) <- I think it was the second option in the menu for GrSecurity

17

(10 replies, posted in Debuging)

Hi,

So I have few questions about your problems:
1. What is your configuration, mainboard+videocard?
2. You said you were able to start with GrSecurity - how exactly, did you put any boot flags or anything?
3. I will now build a version without ATI&Nvidia video drivers and you will test. I will post the link here.
4. How big is your flash drive?

Thank you,
Yuriy

18

(98 replies, posted in Hardware )

Well the repository AND the up to date package are included so the problem is elsewhere (maybe the newest driver doesn't support the video-card). Maybe also the legacy package should be included. OK well good luck with school then smile. I will close this topic. See you later.

19

(98 replies, posted in Hardware )

Btw about the flash:
http://get.adobe.com/flashplayer/comple … %29_64-bit

20

(98 replies, posted in Hardware )

This is what is added already in what you have (4.1.12):
fglrx64_xpic_SUSE122     8.982-1     AMD ATI fglrx
nvidia-computeG02     304.43-20.1     nvidia 12.2
nvidia-gfxG01-kmp-default     173.14.35_k3.4.6_2.10-16.1     nvidia 12.2
nvidia-gfxG02-kmp-default     304.43_k3.4.6_2.10-19.1     nvidia 12.2
nvidia-settings     270.41.06-1.27     Packman 12.2
nvidia-texture-tools     2.0.6-18.1.4     openSUSE 12.2 OSS

21

(98 replies, posted in Hardware )

I added this repository with the driver http://geeko.ioda.net/mirror/amd-fglrx/ … .2/x86_64/

I don't think it is legacy. I'm not sure why you get this. And it is latest it is from  04-Sep-2012. There is no newer package in the repository.

"Display driver files for the AMD RADEON (9500 and later), MOBILITY RADEON (M10 and later), RADEON XPRESS IGP and FireGL (Z1 and later) series of graphics accelerators. This package provides 2D display drivers, precompiled kernel modules, kernel module build environment, control panel source coude and hardware accelerated OpenGL. "

22

(98 replies, posted in Hardware )

Well smile hah Android removes flash too. I guess the move from flash to HTML5 is already in place, but I'm sure it will take some time. In the previos version NetSecL my flash worked, but now in your case I'm not sure what can be wrong - it is basicly one file (library), just has to be there.

>I now like Qubes OS the best.
Well the choice is yours.

http://www.zdnet.com/blog/open-source/n … sers/11433

23

(98 replies, posted in Hardware )

Look at this:
http://www.susegeek.com/multimedia/inst … use-linux/

24

(98 replies, posted in Hardware )

https://susestudio.com/a/EmL6GN/secured … ion=4.1.12
https://susestudio.com/a/EmL6GN/secured-os--2/
See for yourself. I don't see any image magic here. Image writer is included. And the new kernel is not included (I will include it later when I'm done compiling and testing). I'm not sure what the flash problem is and how you can fix it (maybe a flash replacement? other version of flash?), but flash won't work under GrSecurity anyway because it is not 64 bit, for some reason it cuts the 32 bit programmes and I guess also libraries.

25

(98 replies, posted in Hardware )

Hmm I guesss I removed it, but I don't remember why actualy - maybe because of YaSt >Sound. But this is good it means you have your sound configured and we are finally done smile. Cogratulations! Your sound works - it is flash problem smile