Linux Hacking

  • Root is always assigned the UID 0 and the GID 0.
  • The shadow file is used to protect passwords as it is only readable by root.
  • Most versions of Linux, such as Red Hat, use MD5 for password encryption.
  • Salts are needed to add a layer of randomness to the passwords.
  • Because the passwd file is world readable, passwords should be stored in the shadow file.
  • Password cracking programs such as John the Ripper work against the Linux OS; all they require is access to the encrypted passwords.
  • Linux passwords are usually salted. This means that they have had a second layer or randomness added so that no two users have the same encrypted password.
  • Rootkits can be divided into two basic types. Traditionally, rootkits replaced binaries such as ls, ifconfig, inetd, killall, login, netstat, passwd, pidof, or ps with trojaned versions. The second type of rootkit is the loadable kernel module (LKM). A kernel rootkit is loaded as a driver or kernel extension.
  • Tripwire is the most commonly used file integrity program. It performs integrity checking by using cryptographic checksums.

Evading Firewalls, IDS, and Honeypots

Part I: Exam Preparation

The Business Aspects of Penetration Testing

The Technical Foundations of Hacking

Footprinting and Scanning

Enumeration and System Hacking

Linux and Automated Security Assessment Tools

Trojans and Backdoors

Sniffers, Session Hijacking, and Denial of Service

Web Server Hacking, Web Applications, and Database Attacks

Wireless Technologies, Security, and Attacks

IDS, Firewalls, and Honeypots

Buffer Overflows, Viruses, and Worms

Cryptographic Attacks and Defenses

Physical Security and Social Engineering

Part II: Final Review

Part III: Appendixes

Appendix A. Using the ExamGear Special Edition Software

Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors: Michael Gregg © 2008-2020.
If you may any questions please contact us: