-
[quote="Bukowski"]
Originally Posted by
false-hopes
when its installed needs locking down HARD.
so true, de"fault knoppix is definately not something you want to go on the internet with, not only you have to lock down services, try to upgrade the kernel(it's bugged) and remove a bunch of useless (suid) files too, when you don' with that, it starts to get reasonably to work with it, although you're not finished yet: you may want to secure/upgrade specific services too.
-
lol
really interesting topic
linux can protect you from windows malware (worm, virus, trojan, windows applications exploit, windows rootkits)
but there is a lot of linux rootkits around
a rootkit scan an ip adress or a range ip looking for some defined open ports (associated with known process security whole)
it logs the scan result in a file and ask you if you want to try to exploit the security wholes on the target comp
there are some root kits you can add your own exploit
so put a linux workstation directly on the internet is not so secure as it seems
my mandrake 8.1 webserver installed behind a secured debianbox was hacked two times in a year
-
Re: lol
Originally Posted by
roger_girardin
really interesting topic
linux can protect you from windows malware (worm, virus, trojan, windows applications exploit, windows rootkits)
but there is a lot of linux rootkits around
a rootkit scan an ip adress or a range ip looking for some defined open ports (associated with known process security whole)
actually, what you describe is a worm, a rootkit is a set of utilities, typically kernel level enhancements that try to hide anomalous activity. for instance, hide network connections as seen wirh netstat, processes as seen by ps, it sometimes adds a icmp backdoor etc.
-
lol
@xaoz
thanks for the help
as you can find over 70 000 windows malwares
as you can find up to 70 linux malwares, linux is a natural protection
the actuals most knows rootkit are like you have defined
but this is just a kind of rootkit
a rootkit is a tool which will give a root access on a target comp
as there many ways to try to do it, every tools attempting to do it are called rootkit
when i see debian router box's firewall log, i can see the attacks
it's very interesting too
regards
Similar Threads
-
By eadz in forum Hdd Install / Debian / Apt
Replies: 11
Last Post: 11-04-2010, 09:02 PM
-
By NetKatz in forum Hdd Install / Debian / Apt
Replies: 2
Last Post: 05-02-2004, 02:38 PM
-
By pierrevn in forum General Support
Replies: 5
Last Post: 12-12-2003, 07:34 AM
-
By Edix in forum Hdd Install / Debian / Apt
Replies: 1
Last Post: 11-10-2003, 08:20 PM
-
By kipizit in forum General Support
Replies: 1
Last Post: 11-07-2003, 03:08 AM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
ALLEN BRADLEY 1494V-DS400 SER A DISCONNECT SWITCH 3PH 400AMP 600VAC STK 5039
$1220.00
Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...
$619.99
Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc...
$419.99
Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1
$39.99
Intel Core i5-8500 3 GHz 8 GT/s LGA 1151 Desktop CPU Processor SR3XE
$49.99
AMD Ryzen 9 5950X 16-core 32-thread Desktop Processor
$319.99
Intel - Core i9-14900K 14th Gen 24-Core 32-Thread - 4.4GHz (6.0GHz Turbo) Soc...
$619.99
E5-2697V4 INTEL XOEN SR2JV 18 CORE 2.30 GHz 45M 9.6 GT/s 145W PROCESSOR CPU
$49.99
Intel Core i5-12400 Desktop Processor With HeatSink
$140.00
Intel i7-8700 Coffee Lake 3.2GHz 6-Core Max Turbo 4.6GHz Processor
$48.70