SlideShare a Scribd company logo
Hands-On Ethical Hacking and Network Defense Chapter 9 Linux Operating System Vulnerabilities
Objectives Describe the fundamentals of the Linux operating system Describe the vulnerabilities of the Linux operating system Describe Linux remote attacks Explain countermeasures for protecting the Linux operating system
Review of Linux Fundamentals Linux is a version of UNIX Usually available free Red Hat Includes documentation and support for a fee Linux creates default directories
Linux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
Linux Exploration Demo See link Ch 9b
Linux File System Provides directory structure Establishes a file-naming convention Includes utilities to compress or encrypt files Provides for both file and data integrity Enables error recovery Stores information about files and folders *NIX systems store information about files in information nodes (inodes)
inodes Information stored in an inode An inode number Owner of the file Group the file belongs to Size of the file Date the file was created Date the file was last modified or read There is a fixed number of inodes By default, one inode per 4 KB of disk space
Mounting  In Windows, each device has a letter A: for floppy, C: for hard disk, and so on *NIX mounts a file system (usually a drive) as a subfile system of the root file system / mount  command is used to mount file systems or to display currently mounted file systems df  command displays disk usage of mounted file systems
mount and df in Ubuntu
*NIX File System History Minix file system Max. size 64 MB, Max. file name 14 chars Extended File System (Ext) Max. size 2 GB, Max. file name 256 chars Second Extended File System (Ext2fs) Max. size 4 TB, better performance and stability Third Extended File System (Ext3fs) Journaling—recovers from crashes better
Linux Commands
Linux Operating System Vulnerabilities
Getting Help Many of these commands have multiple parameters and additional functionality Use these commands to get help.  (Replace  command  with the command you want help with, such as  ifconfig ) command  --help man  command
Linux OS Vulnerabilities UNIX has been around for quite some time Attackers have had plenty of time to discover vulnerabilities in *NIX systems Enumeration tools can also be used against Linux systems Nessus can be used to enumerate Linux systems
Nessus Scanning a Linux Server
Linux OS Vulnerabilities (continued) Nessus can be used to Discover vulnerabilities related to SMB and NetBIOS Discover other vulnerabilities Enumerate shared resources
Linux OS Vulnerabilities (continued) Test Linux computer against common known vulnerabilities Review the CVE and CAN information See links Ch 9m, n, o
Linux Operating System Vulnerabilities
Remote Access Attacks on Linux Systems Differentiate between local attacks and remote attacks Remote attacks are harder to perform  Attacking a network remotely requires Knowing what system a remote user is operating The attacked system’s password and login accounts
Footprinting an Attacked System Footprinting techniques Used to find out information about a target system Determining the OS version the attacked computer is running Check newsgroups for details on posted messages Knowing a company’s e-mail address makes the search easier
Other Footprinting Tools Whois databases DNS zone transfers Nessus Port scanning tools
Using Social Engineering to Attack Remote Linux Systems Goal To get OS information from company employees Common techniques Urgency Quid pro quo Status quo Kindness Position Train your employees about social engineering techniques
Trojans Trojan programs spread as E-mail attachments Fake patches or security fixes that can be downloaded from the Internet Trojan program functions Allow for remote administration Create a FTP server on attacked machine Steal passwords Log all keys a user enters, and e-mail results to the attacker
Trojans Trojan programs can use legitimate outbound ports Firewalls and IDSs cannot identify this traffic as malicious Example: Sheepshank uses HTTP GETs It is easier to protect systems from already identified Trojan programs See links Ch 9e, f, g
Installing Trojan Programs (continued) Rootkits Contain Trojan binary programs ready to be installed by an intruder with root access to the system Replace legitimate commands with Trojan programs Hides the tools used for later attacks Example: LRK5
LRK5 See Links Ch 9h, i, j
Rootkit Detectors Security testers should check their Linux systems for rootkits Rootkit Hunter (Link Ch 9l) Chkrootkit (Link Ch 9l) Rootkit Profiler (Link Ch 9k)
Demonstration of rkhunter sudo apt-get install rkhunter sudo rkhunter -c
Creating Buffer Overflow Programs Buffer overflows write code to the OS’s memory Then run some type of program Can elevate the attacker’s permissions to the level of the owner Security testers should know what a buffer overflow program looks like
Creating Buffer Overflow Programs (continued) A C program that causes a buffer overflow
Creating Buffer Overflow Programs (continued) The program compiles, but returns the following error
Creating Buffer Overflow Programs (continued) A C code snippet that fills the stack with shell code
Avoiding Buffer Overflows Write code that avoids functions known to have buffer overflow vulnerabilities strcpy() strcat() sprintf() gets() Configure OS to not allow code in the stack to run any other executable code in the stack Some compilers like gcc warn programmers when dangerous functions are used
Using Sniffers to Gain Access to Remote Linux Systems Sniffers work by setting a network card adapter in promiscuous mode NIC accepts all packets that traverse the network cable Attacker can analyze packets and learn user names and passwords Avoid using protocols such as Telnet, HTTP, and FTP that send data in clear text Sniffers Tcpdump, Ethereal (now Wireshark)
Countermeasures Against Linux Remote Attacks Measures include User awareness training Keeping current on new kernel releases and security updates
User Awareness Training Social Engineering Users must be told not to reveal information to outsiders Make customers aware that many exploits can be downloaded from Web sites Teach users to be suspicious of people asking questions about the system they are using Verify caller’s identity Call back technique
Keeping Current Never-ending battle  New vulnerabilities are discovered daily New patches are issued to fix new vulnerabilities Installing these fixes is essential to protecting your system Many OSs are shipped with automated tools for updating your systems
Linux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
Ad

More Related Content

What's hot (20)

Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
Rajan Kandel
 
operating system structure
operating system structureoperating system structure
operating system structure
Waseem Ud Din Farooqui
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
Mark John Lado, MIT
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Memory management
Memory managementMemory management
Memory management
Rajni Sirohi
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Sowmya Jyothi
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Linux commands
Linux commandsLinux commands
Linux commands
Mannu Khani
 
Linux security
Linux securityLinux security
Linux security
trilokchandra prakash
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
Wayne Jones Jnr
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
Nishant Munjal
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
Deepanshu Gajbhiye
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
subhsikha
 
System Administration
System AdministrationSystem Administration
System Administration
Free Open Source Software Technology Lab
 
Linux ppt
Linux pptLinux ppt
Linux ppt
lincy21
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Linux privilege escalation
Linux privilege escalationLinux privilege escalation
Linux privilege escalation
SongchaiDuangpan
 
Linux User Management
Linux User ManagementLinux User Management
Linux User Management
Gaurav Mishra
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
Ashita Agrawal
 

Viewers also liked (20)

Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
pankaj009
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
Mohamed Gad
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
Kernel TLV
 
Linux Hardening
Linux HardeningLinux Hardening
Linux Hardening
Michael Boelen
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In Linux
Ahmed Mekkawy
 
Linux fundamentals commands
Linux fundamentals commandsLinux fundamentals commands
Linux fundamentals commands
Sau Putt
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
SecurityTube.Net
 
linux os-basics,Devops training in Hyderabad
linux os-basics,Devops training in Hyderabadlinux os-basics,Devops training in Hyderabad
linux os-basics,Devops training in Hyderabad
Devops Trainer
 
Linux training
Linux trainingLinux training
Linux training
Parker Fong
 
8.1.intro unix
8.1.intro unix8.1.intro unix
8.1.intro unix
southees
 
Linux Fundamental
Linux FundamentalLinux Fundamental
Linux Fundamental
Gong Haibing
 
intro unix/linux 03
intro unix/linux 03intro unix/linux 03
intro unix/linux 03
duquoi
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
Ajit Gaddam
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
Raghu nath
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
Love Steven
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 
Linux security (outline)
Linux security (outline)Linux security (outline)
Linux security (outline)
R.Harish Navnit
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
pankaj009
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
Mohamed Gad
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
Kernel TLV
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In Linux
Ahmed Mekkawy
 
Linux fundamentals commands
Linux fundamentals commandsLinux fundamentals commands
Linux fundamentals commands
Sau Putt
 
linux os-basics,Devops training in Hyderabad
linux os-basics,Devops training in Hyderabadlinux os-basics,Devops training in Hyderabad
linux os-basics,Devops training in Hyderabad
Devops Trainer
 
8.1.intro unix
8.1.intro unix8.1.intro unix
8.1.intro unix
southees
 
intro unix/linux 03
intro unix/linux 03intro unix/linux 03
intro unix/linux 03
duquoi
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
Ajit Gaddam
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
Raghu nath
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
Love Steven
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 
Linux security (outline)
Linux security (outline)Linux security (outline)
Linux security (outline)
R.Harish Navnit
 
Ad

Similar to Linux Operating System Vulnerabilities (20)

Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Eric Vanderburg
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
haile468688
 
prateekporwal
prateekporwalprateekporwal
prateekporwal
prateekporwal
 
Ch1 linux basics
Ch1 linux basicsCh1 linux basics
Ch1 linux basics
chandranath06
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
Vi Tính Hoàng Nam
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
Raja Waseem Akhtar
 
App A
App AApp A
App A
Wayne Jones Jnr
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
onu9
 
UNIX.ppt
UNIX.pptUNIX.ppt
UNIX.ppt
DivyaKS18
 
Ch01
Ch01Ch01
Ch01
Mike Qaissaunee
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
rahmanitayulia
 
Host security
Host securityHost security
Host security
Nguyen Tam
 
Host security
Host securityHost security
Host security
Nguyen Tam
 
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
KesavanT10
 
PPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptxPPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptx
saurabhthege
 
Unix seminar
Unix seminarUnix seminar
Unix seminar
Ajeet Kushwaha
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
Sudharsan S
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
Rama .
 
Basics of Linux Commands, Git and Github
Basics of Linux Commands, Git and GithubBasics of Linux Commands, Git and Github
Basics of Linux Commands, Git and Github
Devang Garach
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
Veeral Bhateja
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Eric Vanderburg
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
haile468688
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
Raja Waseem Akhtar
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
onu9
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
rahmanitayulia
 
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
KesavanT10
 
PPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptxPPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptx
saurabhthege
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
Sudharsan S
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
Rama .
 
Basics of Linux Commands, Git and Github
Basics of Linux Commands, Git and GithubBasics of Linux Commands, Git and Github
Basics of Linux Commands, Git and Github
Devang Garach
 
Ad

More from Information Technology (20)

Web303
Web303Web303
Web303
Information Technology
 
Sql Server Security Best Practices
Sql Server Security Best PracticesSql Server Security Best Practices
Sql Server Security Best Practices
Information Technology
 
SAN
SANSAN
SAN
Information Technology
 
SAN Review
SAN ReviewSAN Review
SAN Review
Information Technology
 
SQL 2005 Disk IO Performance
SQL 2005 Disk IO PerformanceSQL 2005 Disk IO Performance
SQL 2005 Disk IO Performance
Information Technology
 
RAID Review
RAID ReviewRAID Review
RAID Review
Information Technology
 
Review of SQL
Review of SQLReview of SQL
Review of SQL
Information Technology
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
Information Technology
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
Information Technology
 
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2
Information Technology
 
MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1
Information Technology
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
Information Technology
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
Information Technology
 
WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007
Information Technology
 
SharePoint Topology
SharePoint Topology SharePoint Topology
SharePoint Topology
Information Technology
 
Sharepoint Deployments
Sharepoint DeploymentsSharepoint Deployments
Sharepoint Deployments
Information Technology
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
Information Technology
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
Information Technology
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
Information Technology
 
Migration from ASP to ASP.NET
Migration from ASP to ASP.NETMigration from ASP to ASP.NET
Migration from ASP to ASP.NET
Information Technology
 

Recently uploaded (20)

Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 

Linux Operating System Vulnerabilities

  • 1. Hands-On Ethical Hacking and Network Defense Chapter 9 Linux Operating System Vulnerabilities
  • 2. Objectives Describe the fundamentals of the Linux operating system Describe the vulnerabilities of the Linux operating system Describe Linux remote attacks Explain countermeasures for protecting the Linux operating system
  • 3. Review of Linux Fundamentals Linux is a version of UNIX Usually available free Red Hat Includes documentation and support for a fee Linux creates default directories
  • 6. Linux Exploration Demo See link Ch 9b
  • 7. Linux File System Provides directory structure Establishes a file-naming convention Includes utilities to compress or encrypt files Provides for both file and data integrity Enables error recovery Stores information about files and folders *NIX systems store information about files in information nodes (inodes)
  • 8. inodes Information stored in an inode An inode number Owner of the file Group the file belongs to Size of the file Date the file was created Date the file was last modified or read There is a fixed number of inodes By default, one inode per 4 KB of disk space
  • 9. Mounting In Windows, each device has a letter A: for floppy, C: for hard disk, and so on *NIX mounts a file system (usually a drive) as a subfile system of the root file system / mount command is used to mount file systems or to display currently mounted file systems df command displays disk usage of mounted file systems
  • 10. mount and df in Ubuntu
  • 11. *NIX File System History Minix file system Max. size 64 MB, Max. file name 14 chars Extended File System (Ext) Max. size 2 GB, Max. file name 256 chars Second Extended File System (Ext2fs) Max. size 4 TB, better performance and stability Third Extended File System (Ext3fs) Journaling—recovers from crashes better
  • 14. Getting Help Many of these commands have multiple parameters and additional functionality Use these commands to get help. (Replace command with the command you want help with, such as ifconfig ) command --help man command
  • 15. Linux OS Vulnerabilities UNIX has been around for quite some time Attackers have had plenty of time to discover vulnerabilities in *NIX systems Enumeration tools can also be used against Linux systems Nessus can be used to enumerate Linux systems
  • 16. Nessus Scanning a Linux Server
  • 17. Linux OS Vulnerabilities (continued) Nessus can be used to Discover vulnerabilities related to SMB and NetBIOS Discover other vulnerabilities Enumerate shared resources
  • 18. Linux OS Vulnerabilities (continued) Test Linux computer against common known vulnerabilities Review the CVE and CAN information See links Ch 9m, n, o
  • 20. Remote Access Attacks on Linux Systems Differentiate between local attacks and remote attacks Remote attacks are harder to perform Attacking a network remotely requires Knowing what system a remote user is operating The attacked system’s password and login accounts
  • 21. Footprinting an Attacked System Footprinting techniques Used to find out information about a target system Determining the OS version the attacked computer is running Check newsgroups for details on posted messages Knowing a company’s e-mail address makes the search easier
  • 22. Other Footprinting Tools Whois databases DNS zone transfers Nessus Port scanning tools
  • 23. Using Social Engineering to Attack Remote Linux Systems Goal To get OS information from company employees Common techniques Urgency Quid pro quo Status quo Kindness Position Train your employees about social engineering techniques
  • 24. Trojans Trojan programs spread as E-mail attachments Fake patches or security fixes that can be downloaded from the Internet Trojan program functions Allow for remote administration Create a FTP server on attacked machine Steal passwords Log all keys a user enters, and e-mail results to the attacker
  • 25. Trojans Trojan programs can use legitimate outbound ports Firewalls and IDSs cannot identify this traffic as malicious Example: Sheepshank uses HTTP GETs It is easier to protect systems from already identified Trojan programs See links Ch 9e, f, g
  • 26. Installing Trojan Programs (continued) Rootkits Contain Trojan binary programs ready to be installed by an intruder with root access to the system Replace legitimate commands with Trojan programs Hides the tools used for later attacks Example: LRK5
  • 27. LRK5 See Links Ch 9h, i, j
  • 28. Rootkit Detectors Security testers should check their Linux systems for rootkits Rootkit Hunter (Link Ch 9l) Chkrootkit (Link Ch 9l) Rootkit Profiler (Link Ch 9k)
  • 29. Demonstration of rkhunter sudo apt-get install rkhunter sudo rkhunter -c
  • 30. Creating Buffer Overflow Programs Buffer overflows write code to the OS’s memory Then run some type of program Can elevate the attacker’s permissions to the level of the owner Security testers should know what a buffer overflow program looks like
  • 31. Creating Buffer Overflow Programs (continued) A C program that causes a buffer overflow
  • 32. Creating Buffer Overflow Programs (continued) The program compiles, but returns the following error
  • 33. Creating Buffer Overflow Programs (continued) A C code snippet that fills the stack with shell code
  • 34. Avoiding Buffer Overflows Write code that avoids functions known to have buffer overflow vulnerabilities strcpy() strcat() sprintf() gets() Configure OS to not allow code in the stack to run any other executable code in the stack Some compilers like gcc warn programmers when dangerous functions are used
  • 35. Using Sniffers to Gain Access to Remote Linux Systems Sniffers work by setting a network card adapter in promiscuous mode NIC accepts all packets that traverse the network cable Attacker can analyze packets and learn user names and passwords Avoid using protocols such as Telnet, HTTP, and FTP that send data in clear text Sniffers Tcpdump, Ethereal (now Wireshark)
  • 36. Countermeasures Against Linux Remote Attacks Measures include User awareness training Keeping current on new kernel releases and security updates
  • 37. User Awareness Training Social Engineering Users must be told not to reveal information to outsiders Make customers aware that many exploits can be downloaded from Web sites Teach users to be suspicious of people asking questions about the system they are using Verify caller’s identity Call back technique
  • 38. Keeping Current Never-ending battle New vulnerabilities are discovered daily New patches are issued to fix new vulnerabilities Installing these fixes is essential to protecting your system Many OSs are shipped with automated tools for updating your systems