Summary


Recap

  • Linux is gaining popularity and is fast becoming a stable industry strength OS.

  • Once the IP address of a target system is known, an attacker can begin port scanning, looking for holes in the system for gaining access. Nmap being a popular tool.

  • Password cracking tools are available for Linux as well.

  • Sniffers as well as Packet assembly/analyzing tools for Linux provide attackers with the edge that they have dealing with other OSs.

  • Attackers with root privileges can engage in session hijacking as well.

  • Trojans, backdoors, worms are also prevalent in the Linux environment.

  • As with any other system, a well developed integrated procedure is to be put in place to counter the threats that exist.




Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 109

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net