Results 1 to 6 of 6

Thread: What are the vulnerabilities on Linux server?

  1. #1
    Join Date
    Jun 2009

    What are the vulnerabilities on Linux server?

    With the expansion of Linux enterprise applications, there are a large number of Web servers using the Linux operating system. Linux server's security features are more and more attention. Attack on the Linux server is defined as: attack is a device intended to obstruct, damage, weaken, and undermine the security of Linux serverís unauthorized behavior. Attacks can range from denial of service until they are completely the harm and destruction of Linux servers. On Linux there are many types of server attacks so I need to know the information related to the vulnerabilities of Linux server.

  2. #2
    Join Date
    Nov 2005

    Re: What are the vulnerabilities on Linux server?

    As the proliferation of DoS attack tools, and the protocol layer against defects in short-term cannot change the fact that, DoS has become the most widely circulated, the most difficult to prevent the attack. Denial of service attacks include distributed denial of service attacks, distributed reflective denial of service attacks, DNS distributed denial of service attacks, FTP attacks. Most denial of service attack resulting in relatively low-risk, even those that might cause the system to restart the attack was only a temporary problem. Such attacks to a large extent different from those who want to control access to network attacks, generally does not affect data security, but the denial of service attacks will continue for a long time, very tough.

  3. #3
    Join Date
    May 2008

    Re: What are the vulnerabilities on Linux server?

    According to me there is no one absolute way to stop such attacks. But this does not mean that we should be stopping it, in addition to emphasis on individual hosts from being used to enhance the importance of the protection, strengthening the management of the server is a very important part. Verify that the software must be installed and filtering capabilities to test the text of the paper addresses the real source address. In addition several denial of service can be used for the following measures: closure of unnecessary services, restrictions on Synchronization half-open connections at the same time, shorten the Synchronization half-time of the connection time out and promptly update the system patch.

  4. #4
    Dr. V Guest

    Local non-authorized users to access their files read and write permissions

    Local user is defined as any local network machines have a password, so in a drive has a directory of users. Get into their local users unauthorized file read and write permission to pose a danger to a large extent depend on whether the issue has been the key to access files. Any local user unfettered access to the temporary files directory (/ tmp) are dangerous, it can potentially lead to the laying of a path to the next level of attack.

  5. #5
    Join Date
    Jan 2008

    Re: What are the vulnerabilities on Linux server?

    Your password attack is the main attack, damage; passwords are the most common attack methods. Password crackers are used to describe the use or non-use tool to penetrate the case of networks, systems or resources to unlock password-protected resources in a term. Users often ignore their passwords; the password policy is difficult to be implemented. Hackers have a variety of tools can defeat technology and society protected by password. Include: a dictionary attack (Dictionary attack), blended attacks (Hybrid attack), and brute-force attacks (Brute force attack). Once the hackers have the user's password, he will have a lot of the user's privileges. Password conjecture is manually entered password or through a series of good general procedure to obtain the original password. Some users choose simple passwords - such as birthdays, anniversaries and spouse's name, but do not follow you should use letters, numbers, mixed use rules. For hackers to guess the birthday of a string of eight characters of data not take long.

  6. #6
    Join Date
    May 2008

    Re: What are the vulnerabilities on Linux server?

    TCP / IP is the continuous theft of the actual network sniffer, note that if you are sure that someone pick up your own network sniffer, you can find some verification tools. This tool is called time domain reflectometry measurement device (Time Domain Reflect meter, TDR). TDR transmission of electromagnetic waves and changes measured. A TDR connected to the network, able to detect unauthorized access to network data equipment. However, many small and medium company does not have such expensive tools.

Similar Threads

  1. What are vulnerabilities in HTML5 or is completely secure
    By Macon in forum Software Development
    Replies: 9
    Last Post: 17-10-2012, 11:52 AM
  2. Web server Vulnerabilities Patches
    By hRYHORIY in forum Windows Software
    Replies: 5
    Last Post: 20-06-2011, 10:17 PM
  3. Some vulnerabilities in Web applications
    By AAeruJa in forum Technology & Internet
    Replies: 5
    Last Post: 01-02-2011, 04:17 PM
  4. Need to know about the vulnerabilities of asp website
    By KennedII in forum Technology & Internet
    Replies: 5
    Last Post: 13-03-2010, 11:09 PM
  5. Multiple Vulnerabilities in Opera
    By Big Fish in forum Networking & Security
    Replies: 1
    Last Post: 02-09-2008, 01:35 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts