Information Security

Demon Linux is a penetration testing and capture the flag (CTF) red team focused distribution of Debian Linux. This distribution should be used in a virtualized environment, and should contain all of the tools commonly used for CTF and penetration testing. The Virtualization will ensure that a solid working user experience will be available to all users.

Penetration Testing

A penetration test, colloquially known as a pen test, is an authorized simulated cyber attack on a computer system, performed to evaluate the security of the system. The test is performed to identify both weaknesses (also referred to as vulnerabilities), including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths, enabling a full risk assessment to be completed.


Capture the Flag

Capture the flag (information security) is a great way to learn about methods of steganography, penetration testing, static and dynamic code analysis, data forensics and much more. Often, I find, that a lot of penetration testing resources are simply capture the flag exercises. Both are real-world methods of challenging security of data protection, CTF is just an exercise that may test mechanisms for hiding data that are used very rarely, but possible.


Contact Me

If tools that you commonly use or require for penetration testing or CTF are missing from the ISO/distribution, you can email me the request to have them added at [email protected]
2019 | [email protected] | Douglas Berdeaux