Chapter 12

Linux

In This Chapter

arrow Examining Linux hacking tools

arrow Port scanning Linux hosts

arrow Gleaning Linux information without logging in

arrow Exploiting common vulnerabilities when logged in to Linux

arrow Minimizing Linux security risks

Linux hasn’t made inroads into businesses the way that Windows has, but Linux is present in some capacity in practically every network nonetheless. A common misconception is that Linux is more secure than Windows. However, more and more frequently, Linux and its sister variants of UNIX are prone to some of the same types of security vulnerabilities, so you can’t let your guard down.

Hackers are attacking Linux in droves because of its popularity and growing usage in today’s network environment. Because some versions of Linux are free — in the sense that you don’t have to pay for the base operating system — many organizations are installing Linux for their web servers and e-mail servers in hopes of saving money and having a more secure system. Linux has grown ...

Get Hacking For Dummies, 4th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.