Ch 11.Linux Exploits Ready
Ch 11.Linux Exploits Ready
Weak process permissions Find processes with weak controls and inject malicious code into those processes
• Compromise end user applications and plug-ins such as OpenOffice, VNC, and
User application compromise Adobe Flash Player
• Use social engineering to get the end user to open a file or browser page
SetUID binaries Locate applications that can be run as root
Locate services that are owned by or running as root and attempt to compromise
those services
See who is in the adm group (able to monitor the system and read
getent group adm
log files)