19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 12-11:<br />

/etc/inittab<br />

showing<br />

the line that<br />

allows a<br />

Ctrl+Alt+<br />

Delete<br />

shutdown.<br />

Physical security hacks<br />

Chapter 12: Linux<br />

When a hacker is at the system console, anything goes, including rebooting<br />

the system (even if no one is logged in) by pressing Ctrl+Alt+Delete. After the<br />

system is rebooted, the hacker can start it in single-user mode, which allows<br />

the hacker to zero out the root password or possibly even read the entire<br />

shadow password file. I cover password cracking in Chapter 7.<br />

Countermeasures against<br />

physical security attacks<br />

Edit your /etc/inittab file and comment out (place a # sign in front of) the<br />

line that reads ca::ctrlaltdel:/sbin/shutdown -t3 -r now, shown<br />

in the last line of Figure 12-11. These changes will prevent someone from<br />

rebooting the system by pressing Ctrl+Alt+Delete. Be forewarned that this<br />

will also prevent you from legitimately using Ctrl+Alt+Delete.<br />

For Linux-based laptops, use disk encryption software, such as TrueCrypt<br />

(www.truecrypt.org), or the commercial offerings from WinMagic (www.<br />

winmagic.com) and Symantec (www.symantec.com). If you don’t, when<br />

a laptop is lost or stolen, you could very well have a data breach on your<br />

hands and all the state, federal, compliance, and disclosure law requirements<br />

that go along with it. Not good!<br />

245

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!