Linux Hacking

  • Root is always assigned the UID 0 and the GID 0.
  • The shadow file is used to protect passwords as it is only readable by root.
  • Most versions of Linux, such as Red Hat, use MD5 for password encryption.
  • Salts are needed to add a layer of randomness to the passwords.
  • Because the passwd file is world readable, passwords should be stored in the shadow file.
  • Password cracking programs such as John the Ripper work against the Linux OS; all they require is access to the encrypted passwords.
  • Linux passwords are usually salted. This means that they have had a second layer or randomness added so that no two users have the same encrypted password.
  • Rootkits can be divided into two basic types. Traditionally, rootkits replaced binaries such as ls, ifconfig, inetd, killall, login, netstat, passwd, pidof, or ps with trojaned versions. The second type of rootkit is the loadable kernel module (LKM). A kernel rootkit is loaded as a driver or kernel extension.
  • Tripwire is the most commonly used file integrity program. It performs integrity checking by using cryptographic checksums.

Evading Firewalls, IDS, and Honeypots





Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors: Michael Gregg
Simiral book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net