Chapter 12. Linux

In This Chapter

  • Examining Linux hacking tools

  • Port-scanning a Linux server

  • Gleaning Linux information without logging in

  • Exploiting common vulnerabilities when logged into Linux

  • Minimizing Linux security risks

Linux — the darling competitor to Microsoft — is the latest flavor of UNIX that is taking off in corporate networks. A common misconception is that the majority of security vulnerabilities are in the Windows operating system (OS). However, Linux — and even its sister variants of UNIX — are certainly prone to the same types security vulnerabilities as we're starting to see more and more.

Hackers are attacking Linux in droves because of its popularity and growing usage in today's network environment. Because some versions of Linux are free— in the sense that you don't have to pay for the base operating system — many organizations are installing Linux for their Web servers and e-mail servers in hopes of saving money. Linux has grown in popularity for other reasons as well, including the following:

  • Abundant resources available, including books, Web sites, and consultant expertise.

  • The perception that Linux is more secure than Windows.

  • Unlikeliness that Linux will get hit with as much malware as Windows and its applications do. This is an area in which Linux excels when it comes to security, but it probably won't stay that way.

  • Increased buy-in from other UNIX vendors, including IBM and Sun Microsystems. Even Novell is stopping development on the mighty NetWare ...

Get Hacking For Dummies®, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.