<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Labs — Comunidade Fedora Brasil</title>
        <link>https://fedorabr.org/</link>
        <pubDate>Fri, 10 Apr 2026 11:38:49 +0000</pubDate>
        <language>pt_BR</language>
            <description>Labs — Comunidade Fedora Brasil</description>
    <atom:link href="https://fedorabr.org/categories/labs/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Desativa atualização do Kernel - VirtualBox</title>
        <link>https://fedorabr.org/discussion/656/desativa-atualizacao-do-kernel-virtualbox</link>
        <pubDate>Thu, 29 Apr 2021 11:28:23 +0000</pubDate>
        <category>Labs</category>
        <dc:creator>edivancarvalho</dc:creator>
        <guid isPermaLink="false">656@/discussions</guid>
        <description><![CDATA[<hr /><p>VirtualBox - f33</p>

<p><img src="https://fedorabr.org/uploads/editor/bh/43epbz5sg42j.png" alt="" title="" /></p>

<hr /><p>      Bom dia a todos neste tutorial irei relatar uma solução que fiz no meu ambiente de Desenvolvimento e maquina virtuais.</p>

<h2 data-id="situacao-problema">Situação problema</h2>

<p>      Em um ambiente Fedora33 onde usaremos o virtualBox instalado e funcionando corretamente onde todo o sistema está atualizado.<br />
    Ao passar do tempo surgir novas atualizações e algumas vezes possuem as atualizações do KERNEL, ao atualizar todos os pacotes incluindo a do “kernel”, o virtualBox para de funcionar pelo fator do Kernel de atualizado, muitas vezes temos que sair pesquisando para esta solucionando o problema e às vezes perdemos tempo ou ate mesmo estamos numa situação de urgência e não tem como para tudo para corrigir o erro da atualização.</p>

<h2 data-id="solucao">Solução:</h2>

<p>      Neste ponto podemos fazer uma restrição de atualização do kernel, mais os demais pacotes iram atualizar normalmente. Para fazer essa proeza faça:</p>

<pre spellcheck="false" tabindex="0">    vim /etc/dnf/dnf.conf
</pre>

<p>No final do arquivo acrescente a linha:</p>

<pre spellcheck="false" tabindex="0">    exclude=kernel-headers.x86_64
</pre>

<p>Conforme a imagem a seguir.<br /><img src="https://fedorabr.org/uploads/editor/kk/fl68vm4hng8i.png" alt="" title="" /></p>

<p>Apos salve o arquivo e faça:</p>

<pre spellcheck="false" tabindex="0">    dnf update
</pre>

<p>E você vera que o dnf.conf não ira mais buscar as atualizações do Kernel.</p>

<p><strong>IMPORTANTE:</strong> O ideal é sempre deixe seu SO atualizado</p>
]]>
        </description>
    </item>
    <item>
        <title>Fedora Security Lab (34)</title>
        <link>https://fedorabr.org/discussion/396/fedora-security-lab-34</link>
        <pubDate>Tue, 04 Feb 2020 18:48:59 +0000</pubDate>
        <category>Labs</category>
        <dc:creator>Flira00</dc:creator>
        <guid isPermaLink="false">396@/discussions</guid>
        <description><![CDATA[<p><img src="https://fedorabr.org/uploads/editor/oy/k5d8q14vlise.png" alt="" title="" /></p>

<p>A Comunidade Fedora mantém o Security Lab como uma opção  de sistema pronto para profissionais, entusiastas e estudantes da área de segurança da informação, análise forense e pentest. O Fedora Security, é uma Spin que vem agregar distribuições com essa finalidade específica como o Kali Linux, que é o mais conhecido e provavelmente o mais usado.</p>

<p>A Spin consiste em um Fedora 34, até o momento com o kernel 5.11.12, distribuída na interface XFCE 4 e mantida pela comunidade de testadores de segurança e desenvolvedores. Ela pode ser instalada normalmente como qualquer outro sistema ou funcionar direto do LiveUSB. Na instalação você pode optar pelo idioma português-br, como qualquer outro Fedora.</p>

<p>Com um menu de aplicativos específicos chamado de Security Lab, como você pode ver na imagem abaixo, há os mais diversos softwares comumente utilizados como: monitores e descobrimento de rede, ataques força bruta, captura e análise de pacotes,  injeção e análise de código em banco de dados e aplicativos web, recuperação de dados e sistemas, voip e ferramentas para redes sem fio.</p>

<p><strong>Fedora Security Lab</strong><br /><img src="https://fedorabr.org/uploads/editor/xq/gxummyvzyzlv.png" alt="" title="" /></p>

<p><strong>Fedora Security instalado com algumas aplicações abertas como o firewall, medusa, nload, wireshark, tcpjunk e etthercap</strong><br /><img src="https://fedorabr.org/uploads/editor/w4/1nfktn7sjfqv.png" alt="" title="" /></p>

<p><a rel="nofollow" href="/home/leaving?allowTrusted=1&amp;target=https%3A%2F%2Flabs.fedoraproject.org%2Fpt_BR%2Fsecurity%2F" title="Link para download do Fedora Security">Link para download do Fedora Security</a></p>

<p>Caso você necessite das aplicações específicas e/ou não goste, não queira trocar sua interface favorita pelo XFCE, é possível baixar e instalar o menu bem como as aplicações de acordo com sua necessidade. No exemplo abaixo a instalação foi feita em um na Spin Mate.</p>

<p><strong>O menu pode ser instalado com o comando:</strong><br /><code spellcheck="false" tabindex="0">sudo dnf install  security-menus</code></p>

<p><strong>Menu Security</strong><br /><img src="https://fedorabr.org/uploads/editor/14/8a9il5p5xyv0.png" alt="" title="" /></p>

<p><strong>Para instalar as aplicações:</strong><br /><code spellcheck="false" tabindex="0">sudo dnf groupinstall security-lab</code><br /><img src="https://fedorabr.org/uploads/editor/3r/iue9dxi6ovl0.png" alt="" title="" /><br /><img src="https://fedorabr.org/uploads/editor/gd/6hbsz04fqyte.png" alt="" title="" /></p>

<p>Não pude verificar se com o groupinstall foi feito a instalação de todos os softwares. Abaixo você tem a relação em ordem alfabética dos softwares inclusos no menu em uma busca feita no DNF, facilitando para você fazer instalações individuais no seu Fedora. A sintaxe compreende após o <strong>-</strong> e antes do <strong>:</strong><br />
Ex: Instalando o arpON: <code spellcheck="false" tabindex="0">sudo dnf install ArpON.x86_64</code><br />
Instalar o aircrack-ng: <code spellcheck="false" tabindex="0">sudo dnf install aircrack-ng.x86_64</code><br />
O que não tem descrição é porque não está disponível no DNF, mas isso não impede que você procure no rpmfind ou mesmo no git.</p>

<p>Link do Github - <a rel="nofollow" href="/home/leaving?allowTrusted=1&amp;target=https%3A%2F%2Fgithub.com%2Ffabaff%2Fsecurity-lab">https://github.com/fabaff/security-lab</a></p>

<p><strong>Security Menu</strong></p>

<p><strong>arpON</strong> - ArpON.x86_64 : ARP handler inspection<br /><strong>afftools</strong> - afftools.x86_64 : Utilities for afflib<br /><strong>aide</strong> - aide.x86_64 : Intrusion detection environment<br /><strong>aircrack-ng</strong> - aircrack-ng.x86_64 : 802.11 (wireless) sniffer and WEP/WPA-PSK key cracker<br /><strong>airsnort</strong> - airsnort.x86_64 : Wireless LAN (WLAN) tool which recovers encryption keys<br /><strong>argus</strong> - argus.x86_64 : Network transaction audit tool<br /><strong>arp-scan</strong> - arp-scan.x86_64 : Scanning and fingerprinting tool<br /><strong>bannergrab</strong> - bannergrab.x86_64 : A banner grabbing tool<br /><strong>binwalk</strong> - binwalk.noarch : Firmware analysis tool<br /><strong>bkhive</strong> - bkhive.x86_64 : Dump the syskey bootkey from a Windows system hive<br /><strong>bonesi</strong> - <br /><strong>bro</strong> -<br /><strong>captcp</strong> - captcp.noarch : TCP Analyzer for PCAP Files<br /><strong>chkrootkit</strong> - chkrootkit.x86_64 : Tool to locally check for signs of a rootkit<br /><strong>cmospwd</strong> - cmospwd.x86_64 : BIOS password cracker utility<br /><strong>cowpatty</strong> - cowpatty.x86_64 : WPA password cracker <br /><strong>dc3dd</strong> - dc3dd.x86_64 : Patched version of GNU dd for use in computer forensics<br /><strong>ddrescue</strong> - ddrescue.x86_64 : Data recovery tool trying hard to rescue data in case of read errors<br /><strong>dhcping</strong> - dhcping.x86_64 : DHCP daemon ping program<br /><strong>dnsenum</strong> - dnsenum.noarch : A tool to enumerate DNS info about domains<br /><strong>dnsmap</strong> - dnsmap.x86_64 : Sub-domains bruteforcer <br /><strong>dnstop</strong> - dnstop.x86_64 : Displays information about DNS traffic on your network<br /><strong>dnstracer</strong> - dnstracer.x86_64 : Trace a DNS record to its start of authority<br /><strong>driftnet</strong> - driftnet.x86_64 : Network image sniffer<br /><strong>dsniff</strong> - dsniff.x86_64 : Tools for network auditing and penetration testing<br /><strong>echoping</strong> - echoping.x86_64 : TCP performance test to measure response time of network hosts<br /><strong>etherape</strong> - etherape.x86_64 : Graphical network monitor for Unix<br /><strong>ettercap</strong> - ettercap.x86_64 : Network traffic sniffer/analyser, NCURSES interface version<br /><strong>examiner</strong> - examiner.noarch : Utility to disassemble and comment foreign executable binaries<br /><strong>firewalk</strong> - firewalk.x86_64 : Active reconnaissance network security tool<br /><strong>firstaidkit-gui</strong><br /><strong>flawfinder</strong> - flawfinder.noarch : Examines C/C++ source code for security flaws<br /><strong>foremost</strong> - foremost.x86_64 : Recover files by "carving" them from a raw disk<br /><strong>fping</strong> - fping.x86_64 : Scriptable, parallelized ping-like utility<br /><strong>goaccess</strong> - goaccess.x86_64 : Real-time web log analyzer and interactive viewer<br /><strong>gparted</strong> - gparted.x86_64 : Gnome Partition Editor<br /><strong>halberd</strong> - halberd.noarch : Tool to discover HTTP load balancers<br /><strong>hfsutils</strong> - hfsutils.x86_64 : Tools for reading and writing Macintosh HFS volumes<br /><strong>horst</strong><br /><strong>hping3</strong> - hping3.x86_64 : TCP/IP stack auditing and much more<br /><strong>htop</strong> - htop.x86_64 : Interactive process viewer<br /><strong>httpd-tools</strong> - httpd-tools.x86_64 : Tools for use with the Apache HTTP Server<br /><strong>httpie</strong> - ttpie.noarch : A Curl-like tool for humans<br /><strong>httping</strong> - httping.x86_64 : Ping alike tool for http requests<br /><strong>httpress</strong> - httpress.x86_64 : HTTP stress &amp; benchmark utility<br /><strong>httpry</strong> - httpry.x86_64 : A specialized packet sniffer designed for displaying and logging <strong>HTTPtraffic</strong><br /><strong>httrack</strong> - httrack-devel.x86_64 : Development files for httrack<br /><strong>hunt</strong> - hunt.x86_64 : Tool for demonstrating well known weaknesses in the TCP/IP  suite<br /><strong>hydra</strong> - hydra.x86_64 : Very fast network log-on cracker<br /><strong>iftop - iftop.x86_64 : Command line tool that displays bandwidth usage on an interface<br />
**inception</strong> - inception.noarch : A fireWire physical memory manipulation tool<br /><strong>iperf</strong> - iperf.x86_64 : Measurement tool for TCP/UDP bandwidth performance<br /><strong>iptraf-ng</strong> - iptraf-ng.x86_64 : A console-based network monitoring utility<br /><strong>irssi</strong> - irssi.x86_64 : Modular text mode IRC client with Perl scripting<br /><strong>john</strong> - john.x86_64 : John the Ripper password cracker<br /><strong>kismet</strong> - kismet.x86_64 : WLAN detector, sniffer and IDS<br /><strong>lbd</strong> - lbd.noarch : A DNS/HTTP load balancing detector<br /><strong>lnav</strong> - lnav.x86_64 : Curses-based tool for viewing and analyzing log files<br /><strong>lynis</strong> - lynis.noarch : Security and system auditing tool<br /><strong>macchanger</strong> - acchanger.x86_64 :An utility for viewing/manipulating the MAC address of <strong>masscan</strong> - masscan.x86_64 : This is an Internet-scale port scanner.<br /><strong>medusa</strong> - medusa.x86_64 : Parallel brute forcing password cracker<br /><strong>mtr</strong> - mtr.x86_64 : Network diagnostic tool combining 'traceroute' and 'ping'<br /><strong>nano</strong> - nano.x86_64 : A small text editor<br /><strong>nbtscan</strong> - nbtscan.x86_64 : Tool to gather NetBIOS info from Windows networks<br /><strong>ncrack</strong> - ncrack.x86_64 : A high-speed network auth cracking tool<br /><strong>nebula</strong> - nebula.x86_64 : Intrusion signature generator<br /><strong>netactview</strong> - <br /><strong>netdisco</strong> - nethogs.x86_64 : A tool resembling top for network traffic<br /><strong>nethogs</strong> - nethogs.x86_64 : A tool resembling top for network traffic<br /><strong>netsed</strong> - netsed.x86_64 : A tool to modify network packets<br /><strong>netsniff-ng</strong> - netsniff-ng.x86_64 : Packet sniffing beast<br /><strong>nfspy</strong> - nfspy.noarch : An ID-spoofing NFS client<br /><strong>nfswatch</strong> - nfswatch.x86_64 : An NFS traffic monitoring tool<br /><strong>nicstat</strong> - nicstat.x86_64 : CLI utility that prints out network statistics for all network interface<br /><strong>nikto</strong> - nikto.noarch : Web server scanner<br /><strong>nload</strong> - nload.x86_64 : A tool can monitor network traffic and bandwidth usage in real time<br /><strong>nmap-frontend</strong><br /><strong>nmap</strong> - nmap.x86_64 : Network exploration tool and security scanner<br /><strong>nmbscan</strong> - nmbscan.noarch : NMB/SMB network scanner<br /><strong>ntop</strong><br /><strong>nwipe</strong> - nwipe.x86_64 : Securely erase disks using a variety of recognized methods<br /><strong>onesixtyone</strong> - onesixtyone.x86_64 : An efficient SNMP scanner<br /><strong>openssh</strong> - openssh.x86_64 : An open source implementation of SSH protocol version 2<br /><strong>openvas-client</strong><br /><strong>ophcrack</strong> - ophcrack.x86_64 : Free Windows password cracker based on rainbow tables<br /><strong>p0f</strong> - p0f.x86_64 : Versatile passive OS fingerprinting tool<br /><strong>packETH</strong> - packETH.x86_64 : A GUI packet generator tool<br /><strong>pads</strong> - pads.x86_64 : Passive Asset Detection System<br /><strong>paris-traceroute</strong> - paris-traceroute.x86_64 : A network diagnosis and measurement tool<br /><strong>pdfcrack</strong> - pdfcrack.x86_64 : A Password Recovery Tool for PDF files<br /><strong>proxychains</strong> - proxychains-ng.x86_64 : Redirect connections through proxy servers<br /><strong>psad</strong> - psad.noarch : Port Scan Attack Detector (psad) watches for suspect traffic<br /><strong>pscan</strong> - pscan.x86_64 : Limited problem scanner for C source files<br /><strong>pwgen</strong> - pwgen.x86_64 : Automatic password generation<br /><strong>pyrit</strong> - pyrit.x86_64 : A GPGPU-driven WPA/WPA2-PSK key cracker<br /><strong>raddump</strong> - raddump.x86_64 : RADIUS packets interpreter<br /><strong>rats</strong> - rats.x86_64 : Rough Auditing Tool for Security<br /><strong>rkhunter</strong> - rkhunter.noarch : A host-based tool to scan for rootkits, backdoors and local exploits<br /><strong>safecopy</strong> - safecopy.x86_64 : Safe copying of files and partitions<br /><strong>samdump2</strong> - <br /><strong>scalpel</strong> - scalpel.x86_64 : Fast file carver working on disk images<br /><strong>scamper</strong> - scamper.x86_64 : A network measurement tool<br /><strong>scanmem</strong> - scanmem.x86_64 : Memory scanner<br /><strong>scapy</strong> - python3-scapy.noarch : Interactive packet manipulation tool and network scanner<br /><strong>scrub</strong> - scrub.x86_64 : Disk scrubbing program<br /><strong>sectool-gui<br />
**siege</strong> - siege.x86_64 : A HTTP regression testing and benchmarking utility<br /><strong>sing</strong> - sing.x86_64 : Sends fully customized ICMP packets from command line<br /><strong>sipsak</strong> - sipsak.x86_64 : SIP swiss army knife<br /><strong>skipfish</strong> - skipfish.x86_64 : Web application security scanner<br /><strong>slowhttptest</strong> - slowhttptest.x86_64 : An Application Layer DoS attack simulator<br /><strong>snmpcheck</strong> - snmpcheck.noarch : An utility to get information via SNMP protocols<br /><strong>socat</strong> - socat.x86_64 : Bidirectional data relay between two data channels ('netcat++')<br /><strong>sockperf</strong> - sockperf.x86_64 : Network benchmarking utility for testing latency and throughput<br /><strong>splint</strong> - splint.x86_64 : An implementation of the lint program<br /><strong>sqlninja</strong> - sqlninja.noarch : A tool for SQL server injection and takeover<br /><strong>srm</strong> - srm.x86_64 : Secure file deletion<br /><strong>sshscan</strong><br /><strong>ssldump</strong> - ssldump.x86_64 : An SSLv3/TLS network protocol analyzer<br /><strong>sslscan</strong> - sslscan.x86_64 : A security assessment tool for SSL<br /><strong>sslsplit</strong> - sslsplit.x86_64 : Transparent and scalable SSL/TLS interception<br />
sslstrip<br /><strong>subnetcalc</strong> - subnetcalc.x86_64 : IPv4/IPv6 Subnet Calculator<br />
sucrack - <br /><strong>swaks</strong> - swaks.noarch : Command-line SMTP transaction tester<br /><strong>sysstat</strong> - sysstat.x86_64 : Collection of performance monitoring tools for Linux<br /><strong>tcpcopy</strong> - <br /><strong>tcpdump</strong> - tcpdump.x86_64 : A network traffic monitoring tool<br /><strong>tcpflow</strong> - tcpflow.x86_64 : Network traffic recorder<br /><strong>tcpick</strong> - tcpick.x86_64 : A tcp stream sniffer, tracker and capturer<br /><strong>tcpjunk</strong> - tcpjunk.x86_64 : TCP protocols testing tool<br /><strong>tcpreen</strong> - tcpreen.x86_64 : A TCP/IP re-engineering and monitoring program<br /><strong>tcpreplay</strong> - tcpreplay.x86_64 : Replay captured network traffic<br /><strong>tcptrack</strong> - tcptrack.x86_64 : Displays information about tcp connections on a network interfaces<br /><strong>tcpxtract</strong> - tcpxtract.x86_64 : Tool for extracting files from network traffic<br /><strong>telnet</strong> - telnet.x86_64 : The client program for the Telnet remote login protocol<br /><strong>testdisk</strong> - testdisk.x86_64 : Tool to check and undelete partition, PhotoRec recovers lost files<br /><strong>tlssled</strong> - tlssled.noarch : An evaluation tool for SSL/TLS (HTTPS) web server<br /><strong>trafshow</strong> - trafshow.x86_64 : A tool for real-time network traffic visualization<br /><strong>tripwire</strong> - tripwire.x86_64 : IDS (Intrusion Detection System)<br /><strong>unhide</strong> - unhide.x86_64 : Tool to find hidden processes and TCP/UDP ports from rootkits<br /><strong>unicornscan</strong> - unicornscan.x86_64 : Scalable, accurate, flexible and efficient network probing<br /><strong>uperf</strong> - uperf.x86_64 : Network performance tool with modelling and replay support<br /><strong>vnstat</strong> - vnstat.x86_64 : Console-based network traffic monitor<br /><strong>wavemon</strong> - wavemon.x86_64 : Ncurses-based monitoring application for wireless network devices <br /><strong>wbox</strong> - wbox.x86_64 : HTTP testing tool and configuration-less HTTP server<br />
weplab - <br /><strong>wget</strong> - wget.x86_64 : A utility for retrieving files using the HTTP or FTP protocols<br /><strong>whois</strong> - whois.x86_64 : Improved WHOIS client<br /><strong>wipe</strong> - wipe.x86_64 : Secure file erasing tool<br /><strong>wireshark-gnome</strong> - wireshark.x86_64 : Network traffic analyzer<br /><strong>xmount</strong> - xmount.x86_64 : A on-the-fly convert for multiple hard disk image types<br /><strong>xprobe2</strong><br /><strong>yersinia</strong> - yersinia.x86_64 : Network protocols tester and attacker<br /><strong>zmap</strong> - zmap.x86_64 : Network scanner for Internet-wide network studies</p>
]]>
        </description>
    </item>
    <item>
        <title>----- Laboratório de segurança do Fedora -----</title>
        <link>https://fedorabr.org/discussion/262/laboratorio-de-seguranca-do-fedora</link>
        <pubDate>Thu, 29 Aug 2019 22:45:00 +0000</pubDate>
        <category>Labs</category>
        <dc:creator>kratu</dc:creator>
        <guid isPermaLink="false">262@/discussions</guid>
        <description><![CDATA[<p>Você encontrará um pouco sobre o Lab de segurança do Fedora aqui nesse arquivo !</p>
]]>
        </description>
    </item>
   </channel>
</rss>
