SlideShare una empresa de Scribd logo
1 de 23
Securing and Optimization
          of Linux Servers

                    and
      Hacking Techniques
Introduction
“The Linux Based
Services that
Mean Business
Securing Internet”




   Securing and optimization of Linux Server and Hacking Techniques
Network-Level Attacks
                                Session Hijacking:




Securing and optimization of Linux Server and Hacking Techniques
Network-Level Attacks(Cont…)
                                Packet Sniffing:
                                 Packet sniffer is a piece of software that grabs all of the
                                 traffic flowing
                                Dsniff –n –i 1




Securing and optimization of Linux Server and Hacking Techniques
Gathering and Parsing Packets
                                DNS Cache Poisoning


                                DNS ID Spoofing




                                DNS Hides Poisoning




Securing and optimization of Linux Server and Hacking Techniques
Gathering and Parsing Packets (Cont..)
                                The ARP Cache poisoning:




Securing and optimization of Linux Server and Hacking Techniques
Gathering and Parsing Packets (Cont..)
                                IP Address Spoofing Variations




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks
                                TCP Connections




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           Abusing TCP: The Traditional SYN Flood




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           The Development of Bandwidth Attacks




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           DOS




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           DDOS




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           Distributed Reflection DOS




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           Packet path diffusion




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           Diffusing the path




Securing and optimization of Linux Server and Hacking Techniques
Web Application Attacks

                                Web Spoofing


                                SQL Injection: Manipulating Back-end
                                 Databases


                                Cross-Site Scripting




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks


                                Password Cracking With L0phtCrack
                                Buffer Overflows in Depth
                                Examples of remote root exploit through
                                 buffer overflow
                                Root Kits




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Buffer Overflows in Depth


                                Stuffing more data into a buffer than it can handle
                                Overwrites the return address of a function
                                Switches the execution flow to the hacker code




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Process Memory Region




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Examples of remote root exploit through buffer overflow


                                      QPOP 3.0beta AUTH remote root stack overflow


                                      BIND 8.2 - 8.2.2 remote root exploit




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Root Kits
                                Rootkit name are combination from two words, “root
                                 and “kit”
                                collection of tools that enable attacker to keep the
                                 root power


                           Type of Rootkit


                                Application rootkit - established at the application
                                 layer.
                                Kernel rootkit - establish more deep into kernel
                                 layer.



Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Application Rootkit
                                Programs replace to hide attacker presence.
                                          Examples ls,ps,top,du,find,ifconfig,lsof
                                Network Daemons with backdoor
                                Sniffer Program


                           Kernel Rootkit
                                Hiding processes.
                                Hiding files
                                Hiding the sniffer.
                                Hiding the File System


Securing and optimization of Linux Server and Hacking Techniques
.999

Más contenido relacionado

La actualidad más candente

Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
Nicholas Davis
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
johnb0118
 

La actualidad más candente (20)

Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Using Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionUsing Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion Detection
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
NIDS ppt
NIDS pptNIDS ppt
NIDS ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 

Similar a Day3

Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guide
wensheng wei
 
Security Enhancements using Routers and Switches
Security Enhancements using Routers and SwitchesSecurity Enhancements using Routers and Switches
Security Enhancements using Routers and Switches
Mallikarjunarao Kosuri
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
Information Technology
 

Similar a Day3 (20)

Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
The Golden Ticket: Docker and High Security Microservices by Aaron GrattafioriThe Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
ADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdfADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdf
 
Network security
Network securityNetwork security
Network security
 
Hafnium attack
Hafnium attackHafnium attack
Hafnium attack
 
Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guide
 
Linux quick reference
Linux quick reference Linux quick reference
Linux quick reference
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
淺談探索 Linux 系統設計之道
淺談探索 Linux 系統設計之道 淺談探索 Linux 系統設計之道
淺談探索 Linux 系統設計之道
 
Security Enhancements using Routers and Switches
Security Enhancements using Routers and SwitchesSecurity Enhancements using Routers and Switches
Security Enhancements using Routers and Switches
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
 
Nos Windows
Nos WindowsNos Windows
Nos Windows
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Cisel1 d
Cisel1 dCisel1 d
Cisel1 d
 
SERVICE AGGREMENT IT
SERVICE AGGREMENT ITSERVICE AGGREMENT IT
SERVICE AGGREMENT IT
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

Day3

  • 1. Securing and Optimization of Linux Servers and Hacking Techniques
  • 2. Introduction “The Linux Based Services that Mean Business Securing Internet” Securing and optimization of Linux Server and Hacking Techniques
  • 3. Network-Level Attacks  Session Hijacking: Securing and optimization of Linux Server and Hacking Techniques
  • 4. Network-Level Attacks(Cont…)  Packet Sniffing: Packet sniffer is a piece of software that grabs all of the traffic flowing  Dsniff –n –i 1 Securing and optimization of Linux Server and Hacking Techniques
  • 5. Gathering and Parsing Packets  DNS Cache Poisoning  DNS ID Spoofing  DNS Hides Poisoning Securing and optimization of Linux Server and Hacking Techniques
  • 6. Gathering and Parsing Packets (Cont..)  The ARP Cache poisoning: Securing and optimization of Linux Server and Hacking Techniques
  • 7. Gathering and Parsing Packets (Cont..)  IP Address Spoofing Variations Securing and optimization of Linux Server and Hacking Techniques
  • 8. Denial of Service Attacks  TCP Connections Securing and optimization of Linux Server and Hacking Techniques
  • 9. Denial of Service Attacks (Cont…) Abusing TCP: The Traditional SYN Flood Securing and optimization of Linux Server and Hacking Techniques
  • 10. Denial of Service Attacks (Cont…) The Development of Bandwidth Attacks Securing and optimization of Linux Server and Hacking Techniques
  • 11. Denial of Service Attacks (Cont…) DOS Securing and optimization of Linux Server and Hacking Techniques
  • 12. Denial of Service Attacks (Cont…) DDOS Securing and optimization of Linux Server and Hacking Techniques
  • 13. Denial of Service Attacks (Cont…) Distributed Reflection DOS Securing and optimization of Linux Server and Hacking Techniques
  • 14. Denial of Service Attacks (Cont…) Packet path diffusion Securing and optimization of Linux Server and Hacking Techniques
  • 15. Denial of Service Attacks (Cont…) Diffusing the path Securing and optimization of Linux Server and Hacking Techniques
  • 16. Web Application Attacks  Web Spoofing  SQL Injection: Manipulating Back-end Databases  Cross-Site Scripting Securing and optimization of Linux Server and Hacking Techniques
  • 17. Operating System and Application-Level Attacks  Password Cracking With L0phtCrack  Buffer Overflows in Depth  Examples of remote root exploit through buffer overflow  Root Kits Securing and optimization of Linux Server and Hacking Techniques
  • 18. Operating System and Application-Level Attacks Buffer Overflows in Depth  Stuffing more data into a buffer than it can handle  Overwrites the return address of a function  Switches the execution flow to the hacker code Securing and optimization of Linux Server and Hacking Techniques
  • 19. Operating System and Application-Level Attacks Process Memory Region Securing and optimization of Linux Server and Hacking Techniques
  • 20. Operating System and Application-Level Attacks Examples of remote root exploit through buffer overflow  QPOP 3.0beta AUTH remote root stack overflow  BIND 8.2 - 8.2.2 remote root exploit Securing and optimization of Linux Server and Hacking Techniques
  • 21. Operating System and Application-Level Attacks Root Kits  Rootkit name are combination from two words, “root and “kit”  collection of tools that enable attacker to keep the root power Type of Rootkit  Application rootkit - established at the application layer.  Kernel rootkit - establish more deep into kernel layer. Securing and optimization of Linux Server and Hacking Techniques
  • 22. Operating System and Application-Level Attacks Application Rootkit  Programs replace to hide attacker presence. Examples ls,ps,top,du,find,ifconfig,lsof  Network Daemons with backdoor  Sniffer Program Kernel Rootkit  Hiding processes.  Hiding files  Hiding the sniffer.  Hiding the File System Securing and optimization of Linux Server and Hacking Techniques
  • 23. .999