From Fedora Project Wiki
No edit summary
No edit summary
Line 38: Line 38:
| <references/>
| <references/>
|-
|-
| '''Nmap tests''': Port scanning, OS detection, version detection, script scanning, and traceroute
| '''Nmap''': testing port scanning, OS detection, version detection, script scanning, and traceroute
| {{result|pass|athmane}} <ref>GUI zenmap not tested.</ref>
| {{result|pass|athmane}} <ref>GUI zenmap not tested.</ref>
| <references/>
| <references/>
|-
|-
| '''Wireshark tests'''
| '''Wireshark''' tests
| {{result|fail|athmane|708250}}
| {{result|fail|athmane|708250}}
| <references/>
| <references/>
|-
|-
| '''Nikto tests''': Web server scan
| '''Nikto''': test a web server scan  
| {{result|pass|athmane}} <ref>HTTPS Scan fail (SSL support not available)</ref>
| {{result|pass|athmane}} <ref>HTTPS Scan fail (SSL support not available)</ref>
| <references/>
| <references/>
|-
|-
| '''OpenVAS tests''': generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html.
| '''OpenVAS ''': generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html.
| {{result|pass|athmane}} <ref>As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)</ref><ref>Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87</ref>
| {{result|pass|athmane}} <ref>As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)</ref><ref>Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87</ref>
| <references/>
| <references/>
|-
|-
| '''Ratproxy tests''': ran with various options, tested a web application and generated a report with ratproxy-report
| '''Ratproxy''': ran with various options, tested a web application and generated a report with ratproxy-report
| {{result|pass|athmane}}
| {{result|pass|athmane}}
| <references/>
| <references/>

Revision as of 13:33, 27 May 2011

Test Case Security_Lab References
QA:Testcase_Mediakit_ISO_Size
Pass pass athmane
[1]
  1. Used: Fedora-15-i686-Live-Security.iso
QA:Testcase_Mediakit_ISO_Checksums
Pass pass athmane
[1]
  1. Used: Fedora-15-i686-Live-Security.iso
QA:TestCases/Install_Source_Live_Image
Pass pass athmane
[1]
  1. Used: Fedora-15-i686-Live-Security.iso
QA:Testcase_desktop_browser
Pass pass athmane
QA:Testcase_desktop_updates
Pass pass athmane
[1]
  1. tested with YUM, PackageKit test skipped
QA:Testcase_desktop_login
Pass pass athmane
QA:Testcase_desktop_panel_basic
Pass pass athmane
QA:Testcase_desktop_error_checks
Pass pass athmane
[1]
  1. accessibility: lxterminal background is opaque.
QA:Testcase_desktop_menus
Warning warn athmane
[1]
  1. Security Lab Menu: GUI applications are launched from terminal because Exec (in security-*.desktop files) is prefixed with gnome-terminal, eg: Exec=gnome-terminal -e "sh -c 'openvas-client; bash'"
Nmap: testing port scanning, OS detection, version detection, script scanning, and traceroute
Pass pass athmane
[1]
  1. GUI zenmap not tested.
Wireshark tests
Fail fail athmane [1]
  1. RHBZ #708250
Nikto: test a web server scan
Pass pass athmane
[1]
  1. HTTPS Scan fail (SSL support not available)
OpenVAS : generated a new certificate, added a new openvas user, started openvas-scanner service, sync-ed new NVTs, restarted openvas-scanner, connected with openvas-client, performed a scan and finally exported the report to html.
Pass pass athmane
[1][2]
  1. As usual openvas-scanner service take a while to start for the first time (seems was loading NVTs)
  2. Performance during the scan of 1 host; CPU: 50%, Mem usage: 515M/623M, SWAP usage: 111M/1215M load average: 4.25, 3.20, 1.87
Ratproxy: ran with various options, tested a web application and generated a report with ratproxy-report
Pass pass athmane
Tcpdump: sniff network traffic .
Pass pass athmane
Hping3: basic tests
Pass pass athmane
nc (netcat): try to listen to a IP:PORT, connect to IP:PORT, port scanning tested with a given range.
Pass pass athmane
Medusa: brute-forcing a remote ssh server, with a provided list of accounts and passwords.
Pass pass athmane
httping: httping a web server, both HTTP and HTTPS protocols tested.
Pass pass athmane
Rkhunter: updated database (there was no updates), then searched for rootkits.
Pass pass athmane
[1] [2]
  1. CPU usage <= 20%
  2. a warning raised about SSH protocol v1 being allowed