Introduction:
Linux is popular because, it is available for free of cost, so it was liked by the students, the developers can access and modify the source code due to its open-source nature, so it was liked by the programmers, it is having the ability to communicate with other different operating systems, so it was liked by the system administrators, and many more to put on.., but there is a potential threat w.r.t. LINUX kernel because of its open-source nature. Any hacker can easily understand the kernel architecture and thereby he can find and exploit the loopholes in the operating system and can steal the data easily. So, we will mainly concentrate on the types of attacks that can allow you to hack the Linux network.
Attacks that can be used to gain access to LINUX network:
- WORM ATTACKS
- TROJAN HORSE
- PROGRAM CODE EXPLOITS
- MIS CONFIGURED SERVICES
- SCANNING
- LOCAL HACKING
- MAN IN THE MIDDLE ATTACKS
- DOS ATTACKS
- SPOOFING
Security measures to be taken care of:
LINUX or any other operating systems are not secure straight out of the box, but we can suggest you the minimum necessary precautions to be taken to avoid getting hacked by the attackers
- To fix many of the unknown security vulnerabilities, regularly install the patches found at, https://www.linuxsecurity.com
- Configure your system according to usage.
- Always disable a service you don’t need.
- Don’t allow any unnecessary permission to any softwares.
- Always use tools like tcpd.
- Make use of good and strong passwords for all the users who are using the system.
- Check the following path on daily basis for any irregular activity and hack attempts.
- /var/adm/syslog
- /var/adm/messages