Hacking Linux and MacOS

Slides:



Advertisements
Similar presentations
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE.
Advertisements

Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
Vulnerability Analysis Borrowed from the CLICS group.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
Computer Security and Penetration Testing
Linux Deploy This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device. The.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
SAFE AND SOUND. INTRODUCTION Elements of Security Auditing Elements of Security Auditing Applications to Customers Network Applications to Customers Network.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
Hands-On Ethical Hacking and Network Defense
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 4 Manage Software for SUSE Linux Enterprise Server.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Linux Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Linux Package Management Dr. Michael L. Collard 1.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
--Harish Reddy Vemula Distributed Denial of Service.
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Final Project: Advanced Security Blade IPS and DLP blades.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
PRESENTED BY ALI NASIR BITF13M040 AMMAR HAIDER BITF13M016 SHOIAB BAJWA BITF13M040 AKHTAR YOUNAS BITF13M019.
1 COP 4343 Unix System Administration Unit 1: –Linux OS structure –Distributions –Hardware inventory –Disks and partitions –Installation steps –Boot loader.
Linux Kernel Security (SELinux vs AppArmor vs Grsecurity)
Common System Exploits Tom Chothia Computer Security, Lecture 17.
INF526: Secure Systems Administration Student Presentations And Review for Final Prof. Clifford Neuman Lecture July 2016 OHE100C.
Defining your requirements for a successful security (and compliance
[blank page for bug work-around]
Jen Beveridge and Joe Kolenda
Penetration Testing Scanning
Seminar On Ethical Hacking Submitted To: Submitted By:
Penetration Testing: Concepts,Attacks and Defence Stratagies
Working at a Small-to-Medium Business or ISP – Chapter 8
Linux Security Presenter: Dolev Farhi |
Certified Ethical Hacker Exam Question
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
COP 4343 Unix System Administration
The Linux Operating System
CompTIA Server+ Certification (Exam SK0-004)
Secure Software Confidentiality Integrity Data Security Authentication
Penetration Testing Karen Miller.
Hacking Unix/Linux.
Everything You Need To Know About Penetration Testing.
Intro to Ethical Hacking
IS3440 Linux Security Unit 8 Software Management
Hacking Windows Damian Gordon.
Computer Security Damian Gordon.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Hacking Linux and MacOS Damian Gordon

System Vulnerabilities Typical impacts are: Leaks of information Cracked passwords Corrupted databases Systems taken offline

Hacking Tools Rapid7 Nexpose Nmap https://www.rapid7.com/products/nexpose/ Port scanning, OS enumeration Nmap https://nmap.org/

Hacking Tools Kali Linux NetScanTools Pro https://www.kali.org/ Digital forensics and penetration testing NetScanTools Pro https://www.netscantools.com Port scanning, OS enumeration

Countermeasures Linux has a built-in firewall called iptables, and its successor nftables. Intrusion Prevention Systems (IPS) like PortSentry https://sourceforge.net/projects/portsentryctl/ Audit tools like SNARE(System iNtrusion Analysis and Reporting Environment) https://sourceforge.net/projects/snare/

File Sharing Linux uses NFS (Network File System) to share files across the network. This means it is vulnerable to attacks. If hackers can get access to this directory /etc/exports/ they can take full control of the system. You have to make sure it is safe.

File Sharing You should also monitor traffic using the firewall, port 111 is for NFS. Use both blacklists and whitelists to limit access to hosts. Make sure /etc/exports/ and /etc/hosts/ are configured properly.

Distribution Updates In Linux, different distributions have different tools: Distribution Tool Description Red Hat RPM Packet Manager Free and open-source package management system Up2date Downloads and installs new software and upgrades the operating system Debian Dpkg Used for installing, updating and deleting packages Slackware Pkgtool SUSE Yast2 A setup and configuration tool