19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

228<br />

Part IV: Hacking Operating Systems<br />

more features, or uneducated users, but there seems to be a lot more that<br />

can happen in a Windows environment. That said, Linux is certainly not flawless.<br />

In addition to the password attacks I cover in Chapter 7, certain remote<br />

and local attacks are possible against Linux-based systems. In this chapter,<br />

I show you some security issues in the Linux operating system and outline<br />

some countermeasures to plug the holes so you can keep the bad guys out.<br />

Don’t let the title of this chapter fool you — a lot of this information applies<br />

to all flavors of UNIX.<br />

Understanding Linux Vulnerabilities<br />

Vulnerabilities and attacks against Linux are creating business risks in a<br />

growing number of organizations — especially e-commerce companies, network<br />

and security product vendors, and ISPs that rely on Linux for many<br />

of their systems. When Linux systems are hacked, the victim organizations<br />

can experience the same side effects as their Windows-using counterparts,<br />

including:<br />

✓ Leakage of sensitive information<br />

✓ Cracked passwords<br />

✓ Corrupted or deleted databases<br />

✓ Systems taken completely offline<br />

Choosing Tools<br />

You can use many UNIX-based security tools to test your Linux systems.<br />

Some are much better than others. I often find that my Windows-based commercial<br />

tools do as good a job as any. My favorites are as follows:<br />

✓ BackTrack Linux (www.backtrack-linux.org) toolset on a bootable<br />

CD or .iso image file<br />

✓ LanGuard (www.gfi.com/network-security-vulnerabilityscanner)<br />

for port scanning, OS enumeration, and vulnerability testing<br />

✓ NetScanTools Pro (www.netscantools.com) for port scanning, OS<br />

enumeration, and much more<br />

✓ Nmap (http://nmap.org) for OS fingerprinting and detailed port<br />

scanning<br />

✓ QualysGuard (www.qualys.com) for OS fingerprinting, port scanning,<br />

and very detailed and accurate vulnerability testing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!