Linux, the darling competitor to Microsoft – The latest flavor of UNIX is taking off in corporate networks. A common misconception is that the majority of security vulnerabilities are in the windows operating system(OS). However, Linux — and even it’s sister variant of UNIX are certainly prone of the same types security vulnerabilities as we’re starting to see more and more.
Hackers are attacking Linux in droves because of it’s popularity and growing usage in today’s network environment. Because some of Linux are free — in the sense that you don’t have to pay for base OS , many organizations installing Linux for they web servers, e-mail servers, and any kind of servers in hope to saving money. Linux has grown in popularity for other reasons as well, including the following:
- Abundant resources available, including books, websites, and consultant expertise.
- The perception that Linux is more secure that windows
- Unlikeness that Linux will get hit with as much malware as windows and it’s applications do. This is an area in which Linux excels when it comes to security, but it probably won’t stay any way.
- Uncreased buy-in from other UNIX vendors, including IBM and Sun Microsystems, Even Novell is stopping development on the mighty NetWare OS, instead opting for a Linux-based kernel.
- Growing ease to use.
Now, we go to the main articles that I will give you some information to hack Linux. Many other attacks are possible against a Linux-based system. Linux can be tested remotely without being authenticated to the system.After you login to Linux with a valid username and password, you can collect a lot of information by running security tests to see how your system might stand up to a malicious internal user in a hacker with a valid login.
I will demonstrate the vulnerabilities by using and Red Hat Linux. I use Red Hat Linux because of it’s arguably some of the popular Linux distros.
Now, about Linux vulnerabilities, when Linux system is hacked, the victim organizations can experience the same side effects as their windows using counterparts, including:
- Leakage of confidential intellectual property and customer information
- Cracked passwords
- Corrupted or deleted databases
- Systems taken completely offline.
Now I will give you some tools, you can choose the tools, so you can use many UNIX-based security tools to test your Linux systems. Some are much better than others. I often find that my windows-based commercial tools do as good job as any. My favorites as follows:
- Windows-based superscan ( http://www.foundstone.com/resources/proddesc/superscan.htm ) for ping sweeps and TCP port scanning.
- Nmap (www.insecure.org/nmap) for OS fingerprinting and more detailed port scanning
- Windows-based LANguard network security scanner (www.gfi.com/lannetscan) for port scanning, OS enumeration, and vulnerability testing
- Amap (http://packages.debian.org/unstable/net/amap) for application version mapping
- Tiger (ftp://fto.debian.org/debain/pool/mail/tiger)for automaticlly assessing local system security settings
- VLAD the scanner(www.bindview.com/services/RAZOR/Utilities/Unix-Linux/vld.cfm) to test for the SANS Topt 10 Security vulnerability testing.
- Backtrack. (www.remote-exploit.org/index.php/BackTrack) this is a distros that bootable toolset for practically every tool you can imagine — all without having to load Linux on your local system.
- For windows password hacking, there is a live cd distros named “ophcrack” it can find and show your windows password easily using a rainbow table.
Thousands of other Linux hacking and testing toools are available. And the key is to find a set of tools — preferably few as possible– that can do the job that you need to do and that you feel comfortable working with.
for file permission hacks, by default rouge programs that run with root privileges can be easily hidden. An external attacker or rouge insider may do this to hide hacking foles, such as rootkits, on the system. This can be done with SetUID and SetGID coding in their hacking programs.
About SetUID and SetGID:
In linux, there is a special file types allow programs to run with the owner’s rights:
- SetUID (for user IDs)
- SetGID (for group IDs)
SetUID and SetGID are required when a user runs a program that need a full access to the system to perform task (root / superuser). For example, when a user invokes the passwd program to change his or her password, the program is actually loaded and without root or any other user’s privileges. This is done so that the user can run the program and the program can update the password database without root’s having to get involved in the process manually.
So, there are some information, tips, and tricks to hacking Linux, if I continue to type this blog, seems I’m gonna fill this blogs with a thousand of words (lol). But, seems this is the important things that you must learn from Linux hacking. And that’s all about hacking Linux, try it at your linux, and I advice you to try it at your Virtual PC or VMware, Virtual Box is OK. But if you are some expert person Linux, you can tried it at the native OS.