SlideShare une entreprise Scribd logo
1  sur  23
Securing and Optimization
          of Linux Servers

                    and
      Hacking Techniques
Introduction
“The Linux Based
Services that
Mean Business
Securing Internet”




   Securing and optimization of Linux Server and Hacking Techniques
Network-Level Attacks
                                Session Hijacking:




Securing and optimization of Linux Server and Hacking Techniques
Network-Level Attacks(Cont…)
                                Packet Sniffing:
                                 Packet sniffer is a piece of software that grabs all of the
                                 traffic flowing
                                Dsniff –n –i 1




Securing and optimization of Linux Server and Hacking Techniques
Gathering and Parsing Packets
                                DNS Cache Poisoning


                                DNS ID Spoofing




                                DNS Hides Poisoning




Securing and optimization of Linux Server and Hacking Techniques
Gathering and Parsing Packets (Cont..)
                                The ARP Cache poisoning:




Securing and optimization of Linux Server and Hacking Techniques
Gathering and Parsing Packets (Cont..)
                                IP Address Spoofing Variations




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks
                                TCP Connections




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           Abusing TCP: The Traditional SYN Flood




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           The Development of Bandwidth Attacks




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           DOS




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           DDOS




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           Distributed Reflection DOS




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           Packet path diffusion




Securing and optimization of Linux Server and Hacking Techniques
Denial of Service Attacks (Cont…)

                           Diffusing the path




Securing and optimization of Linux Server and Hacking Techniques
Web Application Attacks

                                Web Spoofing


                                SQL Injection: Manipulating Back-end
                                 Databases


                                Cross-Site Scripting




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks


                                Password Cracking With L0phtCrack
                                Buffer Overflows in Depth
                                Examples of remote root exploit through
                                 buffer overflow
                                Root Kits




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Buffer Overflows in Depth


                                Stuffing more data into a buffer than it can handle
                                Overwrites the return address of a function
                                Switches the execution flow to the hacker code




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Process Memory Region




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Examples of remote root exploit through buffer overflow


                                      QPOP 3.0beta AUTH remote root stack overflow


                                      BIND 8.2 - 8.2.2 remote root exploit




Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Root Kits
                                Rootkit name are combination from two words, “root
                                 and “kit”
                                collection of tools that enable attacker to keep the
                                 root power


                           Type of Rootkit


                                Application rootkit - established at the application
                                 layer.
                                Kernel rootkit - establish more deep into kernel
                                 layer.



Securing and optimization of Linux Server and Hacking Techniques
Operating System and Application-Level Attacks

                           Application Rootkit
                                Programs replace to hide attacker presence.
                                          Examples ls,ps,top,du,find,ifconfig,lsof
                                Network Daemons with backdoor
                                Sniffer Program


                           Kernel Rootkit
                                Hiding processes.
                                Hiding files
                                Hiding the sniffer.
                                Hiding the File System


Securing and optimization of Linux Server and Hacking Techniques
.999

Contenu connexe

Tendances

Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding FirewallsLikan Patra
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefitsAnthony Daniel
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And PreventionNicholas Davis
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
Using Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionUsing Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionSagar Uday Kumar
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS securityClarejenson
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection Systemjohnb0118
 

Tendances (20)

Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Using Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionUsing Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion Detection
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
NIDS ppt
NIDS pptNIDS ppt
NIDS ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 

Similaire à Day3

The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
The Golden Ticket: Docker and High Security Microservices by Aaron GrattafioriThe Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
The Golden Ticket: Docker and High Security Microservices by Aaron GrattafioriDocker, Inc.
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Mohamed Loey
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Osecarrow
 
ADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdfADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdfCert Hippo
 
Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guidewensheng wei
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismGlobal Micro Solutions
 
Security Enhancements using Routers and Switches
Security Enhancements using Routers and SwitchesSecurity Enhancements using Routers and Switches
Security Enhancements using Routers and SwitchesMallikarjunarao Kosuri
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesInformation Technology
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 

Similaire à Day3 (20)

Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
The Golden Ticket: Docker and High Security Microservices by Aaron GrattafioriThe Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
ADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdfADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdf
 
Network security
Network securityNetwork security
Network security
 
Hafnium attack
Hafnium attackHafnium attack
Hafnium attack
 
Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guide
 
Linux quick reference
Linux quick reference Linux quick reference
Linux quick reference
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
淺談探索 Linux 系統設計之道
淺談探索 Linux 系統設計之道 淺談探索 Linux 系統設計之道
淺談探索 Linux 系統設計之道
 
Security Enhancements using Routers and Switches
Security Enhancements using Routers and SwitchesSecurity Enhancements using Routers and Switches
Security Enhancements using Routers and Switches
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
 
Nos Windows
Nos WindowsNos Windows
Nos Windows
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Cisel1 d
Cisel1 dCisel1 d
Cisel1 d
 
SERVICE AGGREMENT IT
SERVICE AGGREMENT ITSERVICE AGGREMENT IT
SERVICE AGGREMENT IT
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Day3

  • 1. Securing and Optimization of Linux Servers and Hacking Techniques
  • 2. Introduction “The Linux Based Services that Mean Business Securing Internet” Securing and optimization of Linux Server and Hacking Techniques
  • 3. Network-Level Attacks  Session Hijacking: Securing and optimization of Linux Server and Hacking Techniques
  • 4. Network-Level Attacks(Cont…)  Packet Sniffing: Packet sniffer is a piece of software that grabs all of the traffic flowing  Dsniff –n –i 1 Securing and optimization of Linux Server and Hacking Techniques
  • 5. Gathering and Parsing Packets  DNS Cache Poisoning  DNS ID Spoofing  DNS Hides Poisoning Securing and optimization of Linux Server and Hacking Techniques
  • 6. Gathering and Parsing Packets (Cont..)  The ARP Cache poisoning: Securing and optimization of Linux Server and Hacking Techniques
  • 7. Gathering and Parsing Packets (Cont..)  IP Address Spoofing Variations Securing and optimization of Linux Server and Hacking Techniques
  • 8. Denial of Service Attacks  TCP Connections Securing and optimization of Linux Server and Hacking Techniques
  • 9. Denial of Service Attacks (Cont…) Abusing TCP: The Traditional SYN Flood Securing and optimization of Linux Server and Hacking Techniques
  • 10. Denial of Service Attacks (Cont…) The Development of Bandwidth Attacks Securing and optimization of Linux Server and Hacking Techniques
  • 11. Denial of Service Attacks (Cont…) DOS Securing and optimization of Linux Server and Hacking Techniques
  • 12. Denial of Service Attacks (Cont…) DDOS Securing and optimization of Linux Server and Hacking Techniques
  • 13. Denial of Service Attacks (Cont…) Distributed Reflection DOS Securing and optimization of Linux Server and Hacking Techniques
  • 14. Denial of Service Attacks (Cont…) Packet path diffusion Securing and optimization of Linux Server and Hacking Techniques
  • 15. Denial of Service Attacks (Cont…) Diffusing the path Securing and optimization of Linux Server and Hacking Techniques
  • 16. Web Application Attacks  Web Spoofing  SQL Injection: Manipulating Back-end Databases  Cross-Site Scripting Securing and optimization of Linux Server and Hacking Techniques
  • 17. Operating System and Application-Level Attacks  Password Cracking With L0phtCrack  Buffer Overflows in Depth  Examples of remote root exploit through buffer overflow  Root Kits Securing and optimization of Linux Server and Hacking Techniques
  • 18. Operating System and Application-Level Attacks Buffer Overflows in Depth  Stuffing more data into a buffer than it can handle  Overwrites the return address of a function  Switches the execution flow to the hacker code Securing and optimization of Linux Server and Hacking Techniques
  • 19. Operating System and Application-Level Attacks Process Memory Region Securing and optimization of Linux Server and Hacking Techniques
  • 20. Operating System and Application-Level Attacks Examples of remote root exploit through buffer overflow  QPOP 3.0beta AUTH remote root stack overflow  BIND 8.2 - 8.2.2 remote root exploit Securing and optimization of Linux Server and Hacking Techniques
  • 21. Operating System and Application-Level Attacks Root Kits  Rootkit name are combination from two words, “root and “kit”  collection of tools that enable attacker to keep the root power Type of Rootkit  Application rootkit - established at the application layer.  Kernel rootkit - establish more deep into kernel layer. Securing and optimization of Linux Server and Hacking Techniques
  • 22. Operating System and Application-Level Attacks Application Rootkit  Programs replace to hide attacker presence. Examples ls,ps,top,du,find,ifconfig,lsof  Network Daemons with backdoor  Sniffer Program Kernel Rootkit  Hiding processes.  Hiding files  Hiding the sniffer.  Hiding the File System Securing and optimization of Linux Server and Hacking Techniques
  • 23. .999