19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 12-7:<br />

Using Nmap<br />

to check<br />

application<br />

versions.<br />

Chapter 12: Linux<br />

of accountability! So, don’t forget to look for the simple stuff. When hacking<br />

Linux, you can dig down deep into the kernel and do this and that to exploit<br />

the system, but it’s usually the little things that get you.<br />

Anonymous FTP is one of the most common vulnerabilities I find in Linux. If you<br />

must run an anonymous FTP server, make sure it’s not sharing out sensitive<br />

information to all of your internal network users, or worse, the entire world.<br />

Tools<br />

The following tools can perform more in-depth information gathering beyond<br />

port scanning to enumerate your Linux systems and see what hackers see:<br />

✓ Nmap can check for specific versions of the services loaded, as shown in<br />

Figure 12-7. Simply run Nmap with the -sV command-line switch.<br />

✓ Amap is similar to Nmap, but it has a couple of advantages:<br />

• Amap is much faster for these types of scans.<br />

• Amap can detect applications that are configured to run on nonstandard<br />

ports, such as Apache running on port 6789 instead of its<br />

default 80.<br />

The output of an Amap scan of the local host (hence, the 127.0.0.1<br />

address) is shown in Figure 12-8. Amap was run with the following<br />

options to enumerate some commonly hacked ports:<br />

• -1 makes the scan run faster.<br />

• -b prints the responses in ASCII characters.<br />

• -q skips reporting of closed ports.<br />

• 21 probes the FTP control port.<br />

• 22 probes the SSH port.<br />

• 23 probes the telnet port.<br />

• 80 probes the HTTP port.<br />

235

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!