In This Chapter
Examining Linux hacking tools
Port scanning Linux hosts
Gleaning Linux information without logging in
Exploiting common vulnerabilities when logged in to Linux
Minimizing Linux security risks
Linux hasn’t made inroads into businesses the way that Windows has, but Linux is present in some capacity in practically every network nonetheless. A common misconception is that Linux is more secure than Windows. However, more and more frequently, Linux and its sister variants of UNIX are prone to some of the same types of security vulnerabilities, so you can’t let your guard down.
Hackers are attacking Linux in droves because of its popularity and growing usage in today’s network environment. Because some versions of Linux are free — in the sense that you don’t have to pay for the base operating system — many organizations are installing Linux for their web servers and e-mail servers in hopes of saving money and having a more secure system. Linux has grown ...