Securing Linux systems and applications; understanding Linux security features.
2
votes
2answers
47 views
How can I use nmap to distinguish between a normal linux machine and an android device?
According to this link: here, nmap 5.2 onwards is now supposed to detect android smartphones. I am using nmap 6.01 but it only identifies android devices as running a linux kernel.
4
votes
3answers
50 views
Can the root of a system access to unencrypted data when using a double tunnel?
I connect to a DMZ gateway system (B) which is not secured. From this machine (B) I can connect to the final destination (C).
A-->B-->C
I created a ssh tunnel from A to B and forwarding the port 22 ...
4
votes
3answers
233 views
What key does Linux use when storing user passwords?
Linux typically stores user names and password hashes in /etc/passwd or /etc/shadow.
Now lets say I have an old CentOS distro and I want to attempt to recover a user's password (it's in a legal, ...
3
votes
1answer
37 views
Do public keys make Kerberos more secure (RFC4556)?
We're using IPA to centralize our authentication and I found an option to add a public key for each user. After doing a little research I found this to be an extension to Kerberos 5, RFC4556.
From my ...
2
votes
1answer
78 views
Victim system's internet connection slow after ARP spoof?
I've been using Nemesis 1.4 to test ARP spoofing on a local victim machine. I've been spoofing both the victim machine and the default gateway to ARP redirect to my machine.
Spoofing victim's source ...
0
votes
2answers
59 views
Any open source software firewall with country based ip blocking feature? [closed]
I am looking for an open source firewall with country based ip blocking feature for Linux OS.
7
votes
2answers
90 views
How a malware executes remote payload
Let's assume a malware was installed (on a UNIX-based platform) with some social engineering tricks. The original installed code itself may be benign, but the only malicious activity is that the ...
0
votes
0answers
132 views
Open Source (Software Firewall + Unified Threat Management - UTM) for an Linux Dedicated Server Hosting [closed]
I am newbie in managing Linux Dedicated server. I am looking for Best Open source Unified Threat Management solution with Firewall Support and it should need to be managing through an web GUI ...
1
vote
2answers
60 views
Changing IP ID generation of a server
I've seen plenty about Idle Scans and incremental IP IDs on the net, but I have trouble finding a "solution" to the problem. Is there a way to "set" IP IDs for example to all zeros or is it coded into ...
2
votes
5answers
119 views
Security purpose of asking admin password to mount partition on Linux
So I divided my 250GB laptop drive into 2 partitions and some swap. On the second partition which is an ext4 60GB partition I installed Fedora 17. On the other bigger NTFS partition I've got Win XP ...
2
votes
1answer
65 views
Using mysql root account to execute root commands
Suppose that I have full root access to mysql databases, but not root user shell (linux). How can I use the full root access to mysql databases to execute root commands?
0
votes
1answer
71 views
NGINX / HTTP TRACE
I have a http server Nginx with HTTP TRACE Enabled.
A single nmap --script=http-methods.nse host.name give this result :
Not shown: 988 closed ports
PORT STATE SERVICE VERSION
[...]
...
0
votes
2answers
103 views
How to defeat ASLR in linux kernel? [closed]
Possible Duplicate:
Stack Overflows - Defeating Canaries, ASLR, DEP, NX
is there anyway to disable ASLR in Linux kernel 2.6.32-71.el6.x86_64, with Apache privileges??
I tried this commands:
...
4
votes
3answers
147 views
Securing Debian Apache PHP Server
I have Debian Apache PHP server. I want to secure him after the classic installation process.
My usual steps are :
List item
update all packages
remove all unnecessary services like named, portmap, ...
6
votes
2answers
116 views
Is privilege escalation possible when shell is under www user?
So, suppose that someone obtained a shell of a remote machine (of course via Internet). But the (linux) shell is under www user. Would there be any way of trying privilege escalation?