Presentation is loading. Please wait.

Presentation is loading. Please wait.

Hacking Linux and MacOS

Similar presentations


Presentation on theme: "Hacking Linux and MacOS"— Presentation transcript:

1 Hacking Linux and MacOS
Damian Gordon

2 System Vulnerabilities
Typical impacts are: Leaks of information Cracked passwords Corrupted databases Systems taken offline

3 Hacking Tools Rapid7 Nexpose Nmap
Port scanning, OS enumeration Nmap

4 Hacking Tools Kali Linux NetScanTools Pro https://www.kali.org/
Digital forensics and penetration testing NetScanTools Pro Port scanning, OS enumeration

5 Countermeasures Linux has a built-in firewall called iptables, and its successor nftables. Intrusion Prevention Systems (IPS) like PortSentry Audit tools like SNARE(System iNtrusion Analysis and Reporting Environment)

6 File Sharing Linux uses NFS (Network File System) to share files across the network. This means it is vulnerable to attacks. If hackers can get access to this directory /etc/exports/ they can take full control of the system. You have to make sure it is safe.

7 File Sharing You should also monitor traffic using the firewall, port 111 is for NFS. Use both blacklists and whitelists to limit access to hosts. Make sure /etc/exports/ and /etc/hosts/ are configured properly.

8 Distribution Updates In Linux, different distributions have different tools: Distribution Tool Description Red Hat RPM Packet Manager Free and open-source package management system Up2date Downloads and installs new software and upgrades the operating system Debian Dpkg Used for installing, updating and deleting packages Slackware Pkgtool SUSE Yast2 A setup and configuration tool


Download ppt "Hacking Linux and MacOS"

Similar presentations


Ads by Google