Damn Vulnerable Linux
This article may have been previously nominated for deletion: Wikipedia:Articles for deletion/Damn Vulnerable Linux exists. It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it. This message has remained in place for seven days, so the article may be deleted without further notice. Find sources: "Damn Vulnerable Linux" – news · newspapers · books · scholar · JSTOR Nominator: Please consider notifying the author/project: {{subst:proposed deletion notify|Damn Vulnerable Linux|concern=No secondary sources outside of routine coverage by distro websites}} ~~~~ Timestamp: 20121010105056 10:50, 10 October 2012 (UTC) Administrators: delete |
![]() | The topic of this article may not meet Wikipedia's notability guidelines for products and services. (September 2012) |
Damn Vulnerable Linux (DVL) was a distribution of GNU/Linux geared toward computer security students. It functioned as a tool for observing and studying vulnerabilities in the Linux 2.4 kernel and popular user space software. It was available as a live DVD, and may be run through a virtual machine within any host operating system.[1]. It reportedly is no longer maintained and listed as discontinued.[2]
Pedagogy
Damn Vulnerable Linux (DVL) is a Slackware and Slax-based live DVD. DVL 1.5 is based on BackTrack 2.0 Final. The distribution, purposefully stuffed with broken, ill-configured, outdated and exploitable software, began life as a training system used during the author's university lectures. Its primary goal is to design a Linux system that is as vulnerable as possible -- in order to teach and demonstrate a variety of security topics, including reverse code engineering, buffer overflows, shell code development, web exploitation, and SQL injection.[3]
Vulnerable
Usually, when installing a new operating system the hope is that it’s as up-to-date as possible. After installation there are bound to be a few updates required, but no more than a few megabytes. Damn Vulnerable Linux is different. It is shipped in as vulnerable a state as possible. The idea behind DVL is to offer an operating system for learning and research for security students. As the DVL website explains:
"Damn Vulnerable Linux (DVL) is everything a good Linux distribution isn’t. Its developers have spent hours stuffing it with broken, ill-configured, outdated, and exploitable software that makes it vulnerable to attacks. DVL isn’t built to run on your desktop – it’s a learning tool for security students."
Old versions of software including Apache, MySQL, PHP, FTP and SSH daemons are included as well as the tools needed to exploit them such as GCC, GDB, NASM, strace, ELF, Shell, DDD, LDasm, and LIDa.
Idea
The idea for producing DVL came from Thorsten Schneider who runs the TeutoHack lab at Bielefeld University in Germany. The hacker lab includes a closed network which a laptop can be hooked up to for research into IT security, hacking, and malware. Thorsten also teaches ethical hacking such as his lecture course Ethical Hacking – Binary Auditing & RCE.
Availability
At 1.8GB the ISO can be used as a Live DVD, or installed as a virtual machine using a package like VirtualBox or VMWare. Once installed it can be used as a training environment for teaching, “reverse code engineering, buffer overflows, shellcode development, web exploitation, and SQL injection”.[4]
References
- ^ "Damn Vulnerable Linux". Retrieved October 31, 2010.
- ^ http://distrowatch.com/table.php?distribution=dvl
- ^ "DistroWatch.com: Damn Vulnerable Linux". July 14, 2010. Retrieved October 31, 2010.
- ^ "geek.com: damn vulnerable linux - the most vulnerable and exploitable operating system ever!". July 17, 2010. Retrieved September 23, 2011.