02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

48 Chapter 2 ■ System Fundamentals<br />

■<br />

■<br />

■<br />

A primary concern among Mac users, and a benefit to the hacking community, is the<br />

Mac owner mind-set that Macs aren’t susceptible to viruses or attack. It is an interesting<br />

stance considering that the thing they are claiming to be naturally impervious from<br />

attack is, well, a computer! Even in my own painful years as a system administrator,<br />

the culture is similar even at the enterprise level. I remember calling our national office<br />

for guidance on group policies for our newly acquired Apple desktops. Answer: “Um,<br />

well, we don’t have any policies to apply or a method of applying them.”<br />

Feature-rich out-of-the-box performance for many Apples creates quite a juicy attack<br />

surface for those looking to break in. Features such as 802.11 wireless and Bluetooth<br />

connectivity are all standard in an out-of-the-box installation, and such features are all<br />

on the table for a potential doorway in.<br />

Apple devices simply don’t play well on a Windows domain. Yep, I said it. I’m sure<br />

some would fervently disagree, but Apple on a Windows domain is like spreading butter<br />

on toast outside in December in Grand Forks, North Dakota. Some features will<br />

play nicely, but the majority of those integral features will be a bit hokey. The point<br />

here is when stuff begins to get too hokey, administrators and users alike will begin to<br />

circumvent the normal processes (for example, appropriate login procedures).<br />

Linux<br />

Enter our open source favorite, Linux, which is not a completely foolproof operating system<br />

but one with a reputation for being a much more secure player in the OS category than<br />

Windows or Apple. As we saw with firewalls, the equipment—or in this case the operating<br />

system—is only as secure as the administrator configuring it. With Linux, this is particularly<br />

true because the OS does expect users to know what they are doing.<br />

The OS has done a good job of separating administrative tasks from user accounts.<br />

Linux users aren’t usually running under the administrative account as superuser or root.<br />

This substantially reduces system risk by segregating these functions.<br />

Open source is a double-edged sword. The open source community works hard to ferret<br />

out even the smallest issue in different iterations of Linux, but open source also means<br />

it’s open. Anybody and everybody are privy to the source code. Because it is open source,<br />

Linux is almost always in a beta format to one degree or another. With constant work<br />

being done on each release, the beta testers of these releases end up being you and me.<br />

Windows has tackled the issue of user account versus Administrative<br />

account functionality for quite some time. Most users used to log in as<br />

local administrator 90 percent of the time simply because user account<br />

actions were so limited. User Account Control (UAC), which was introduced<br />

in Windows Vista, is Microsoft’s answer to this issue.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!