19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

246<br />

Part IV: Hacking Operating Systems<br />

If you believe that someone has recently gained access to your system, either<br />

physically or by exploiting a vulnerability, such as a weak password or buffer<br />

overflow, you can use last, the program, to view the last few logins into the<br />

system to check for strange login IDs or login times. This program peruses the<br />

/var/log/wtmp file and displays the users who logged in last. You can enter<br />

last | head to view the first part of the file (the first ten lines) if you want to<br />

see the most recent logins.<br />

Performing General Security Tests<br />

Figure 12-12:<br />

Running the<br />

Tiger security-auditing<br />

tool.<br />

You can assess critical, and often overlooked, security issues on your Linux<br />

systems, such as the following:<br />

✓ Misconfigurations or unauthorized entries in the shadow password files,<br />

which could provide covert system access<br />

✓ Password complexity requirements<br />

✓ Users equivalent to root<br />

✓ Suspicious automated tasks configured in cron, the script scheduler<br />

program<br />

✓ Signature checks on system binary files<br />

✓ Checks for rootkits<br />

✓ Network configuration, including measures to prevent packet spoofing<br />

and other denial of service (DoS) attacks<br />

✓ Permissions on system log files<br />

You can do all these assessments manually — or better yet, use an automated<br />

tool to do it for you! Figure 12-12 shows the initiation of the Tiger securityauditing<br />

tool (www.nongnu.org/tiger), and Figure 12-13 shows a portion of<br />

the audit results. Talk about some great bang for no buck with this tool!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!