How to create a new Container and install the Panel in it:
Create a container and configure it.
Issue the following commands:
vzctl create [CTID] [options]
where
* defines an arbitrary container ID number higher than 100, which is unique on the hardware node
* –save switch tells vzctl whether to save changes into the Container configuration file.
vzctl set [CTID] [setting_name] [value] [--save]
How to install a Panel template on a Parallels Containers hardware node manually
Obtain the template from the Parallels Web site and upload it to the target Parallels Containers hardware node.
Install the application template by running a command in the following format:
rpm -Uvh [absolute path to the template]
For example, the following command installs Qmail RPM:
rpm -Uvh pp10-centos-5-x86_64-ez-3.0.0-35.prl.293476.noarch.rpm
Reference: http://parallels.com/
How to install a Panel template on a Parallels Containers hardware node.
To install a Panel template on a Parallels Containers hardware node using the vzup2date utility:
Connect to the target Parallels Containers hardware node over SSH.
Install the application template by running a command in the following format:
For EZ templates:
For standard templates:
Select the required OS and application templates and click Next to start installation.
Nikto2 web server assessment tool Install.
Nikto is a web server assessment tool. It is designed to find various default and insecure files, configurations and programs on any type of web server.
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1000 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.
Installation
Any system which supports a basic Perl installation should allow Nikto to run. For SSL support the Net::SSLeay Perl module must be installed (which in turn requires OpenSSL on the Unix platform).
Perl: http://www.cpan.org/
LibWhisker: http://www.wiretrip.net/
ActiveState Perl: http://www.activestate.com/
OpenSSL: http://www.openssl.org/
Perl modules RPC::XML::Client and RPC::XML for Metasploit logging integration
Download - http://cirt.net/nikto/nikto-2.1.3.tar.bz2
Unpack the download file:
tar -xvfz nikto-2.1.3.tar.bz2
Basic Testing
The most basic Nikto scan requires simply a host to target, since port 80 is assumed if none is specified. The host can either be an IP or a hostname of a machine, and is specified using the -h (-host) option. This will scan the IP 192.168.0.1 on TCP port 80:
perl nikto.pl -h 192.168.0.1
To check on a different port, specify the port number with the -p (-port) option. This will scan the IP 192.168.0.1 on TCP port 443:
perl nikto.pl -h 192.168.0.1 -p 443
How to install Red Hat GPG key for RPM verification.
If the Red Hat GPG key is not installed, install it from a secure, static location, such as a Red Hat installation CD-ROM or DVD.
All Red Hat Enterprise Linux packages are signed with the Red Hat GPG key. GPG stands for GNU Privacy Guard, or GnuPG, a free software package used for ensuring the authenticity of distributed files. For example, a private key (secret key) locks the package while the public key unlocks and verifies the package. If the public key distributed by Red Hat Enterprise Linux does not match the private key during RPM verification, the package may have been altered and therefore cannot be trusted.
use the following command to import it into the keyring (a database of trusted keys on the system):
rpm –import /mnt/cdrom/RPM-GPG-KEY
To display a list of all keys installed for RPM verification, execute the following command:
It is extremely important to verify the signature of the RPM files before installing them to ensure that they have not been altered from the original source of the packages. To verify all the downloaded packages at once, issue the following command:
rpm -K /tmp/updates/*.rpm