Download presentation
Presentation is loading. Please wait.
1
Hacking Linux and MacOS
Damian Gordon
2
System Vulnerabilities
Typical impacts are: Leaks of information Cracked passwords Corrupted databases Systems taken offline
3
Hacking Tools Rapid7 Nexpose Nmap
Port scanning, OS enumeration Nmap
4
Hacking Tools Kali Linux NetScanTools Pro https://www.kali.org/
Digital forensics and penetration testing NetScanTools Pro Port scanning, OS enumeration
5
Countermeasures Linux has a built-in firewall called iptables, and its successor nftables. Intrusion Prevention Systems (IPS) like PortSentry Audit tools like SNARE(System iNtrusion Analysis and Reporting Environment)
6
File Sharing Linux uses NFS (Network File System) to share files across the network. This means it is vulnerable to attacks. If hackers can get access to this directory /etc/exports/ they can take full control of the system. You have to make sure it is safe.
7
File Sharing You should also monitor traffic using the firewall, port 111 is for NFS. Use both blacklists and whitelists to limit access to hosts. Make sure /etc/exports/ and /etc/hosts/ are configured properly.
8
Distribution Updates In Linux, different distributions have different tools: Distribution Tool Description Red Hat RPM Packet Manager Free and open-source package management system Up2date Downloads and installs new software and upgrades the operating system Debian Dpkg Used for installing, updating and deleting packages Slackware Pkgtool SUSE Yast2 A setup and configuration tool
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.