19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 12: Linux<br />

A tool such as QualysGuard can perform the majority of the security<br />

testing needed to find flaws in Linux. Another popular commercial alternative<br />

is Rapid7’s Nexpose (www.rapid7.com/vulnerabilityscanner.jsp).<br />

✓ Nessus (www.nessus.org) for OS fingerprinting, port scanning, and vulnerability<br />

testing<br />

✓ THC-Amap (www.thc.org/thc-amap) for application version mapping<br />

Hundreds if not thousands of other Linux hacking and testing tools are available<br />

on such sites as SourceForge.net (http://sourceforge.net) and<br />

freecode.com (http://freecode.com). The key is to find a set of tools —<br />

preferably as few as possible — that can do the job that you need to do and<br />

that you feel comfortable working with.<br />

Gathering Information about<br />

Your Linux Vulnerabilities<br />

You can scan your Linux-based systems and gather information from both<br />

outside (if the system is a publicly-accessible host) and inside your network.<br />

That way, you can see what the bad guys see from both directions.<br />

System scanning<br />

Linux services — called daemons — are the programs that run on a system<br />

and serve up various services and applications for users.<br />

✓ Internet services, such as the Apache web server (httpd), telnet (telnetd),<br />

and FTP (ftpd), often give away too much information about the system,<br />

including software versions, internal IP addresses, and usernames.<br />

This information can allow hackers to exploit a known weakness in the<br />

system.<br />

✓ TCP and UDP small services, such as echo, daytime, and chargen, are<br />

often enabled by default and don’t need to be.<br />

The vulnerabilities inherent in your Linux systems depend on what services<br />

are running. You can perform basic port scans to glean information about<br />

what’s running.<br />

The NetScanTools Pro results in Figure 12-1 show many potentially vulnerable<br />

services on this Linux system, including the confirmed services of SSH, HTTP,<br />

and HTTPS.<br />

229

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!