Sponsored Content
Special Forums Cybersecurity How can someone hack into a Linux server ? Post 302840239 by csorhand on Monday 5th of August 2013 03:38:23 AM
Old 08-05-2013
ParanoiaUser,

Thieves always love open doors open windows and open roof. in servers if you install many applications/service it will also OPENS a lots of PORTS(which hackers love). although your server is secure in terms of patches, security tweaks, best security practice, the open ports / application /service will give way to hackers messing your server.

close the services you dont need and only open the thing you need.
 

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Hack CPU Utilization

Hi friends, I am currently working on an issue where i should write a program which utilizes Cpu as specified by the user. The function should be provided with an argument ( how much percentage of CPU has to be utilized by the process ) for example CPU(75) should utilize 75% of CPU. The function... (11 Replies)
Discussion started by: nerdychandru
11 Replies

2. Solaris

tty hack

hi all, what i want to do when user open terminal like tty5 and do his work i want to see his terminal how can i do this (1 Reply)
Discussion started by: xxmasrawy
1 Replies

3. IP Networking

how to hack linux driver to delay incoming packets

hello, can anyone suggest how to delay the incoming packets ?? or how the packets are prossed inside the kernal and a way to make the packets wait a while?? it wud be vry helpful regards sameer (7 Replies)
Discussion started by: sameer kulkarni
7 Replies

4. Red Hat

Hack a centos Linux box

HI, I have a Centos linux box and there is interface connect to internet. I stop the iptables in this box . After a few day , I find the linux box have been hacked and install some perl script into the box . Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies

5. Homework & Coursework Questions

Configure the AD Window server with Linux server(google Authenticator is installed)

Hi my name is Manju. ->I have configure the two way authentication on my linux server. ->Now I am able to apply two way authenticator on particuler user. ->Now I want to map this linux server to my AD server. ->Kindly tell me how to map AD(Active Directory) with this linux server. ... (2 Replies)
Discussion started by: manjusharma128
2 Replies
PAM_SELINUX(8)							 Linux-PAM Manual						    PAM_SELINUX(8)

NAME
pam_selinux - PAM module to set the default security context SYNOPSIS
pam_selinux.so [close] [debug] [open] [nottys] [verbose] [select_context] [env_params] [use_current_range] DESCRIPTION
In a nutshell, pam_selinux sets up the default security context for the next execed shell. When an application opens a session using pam_selinux, the shell that gets executed will be run in the default security context, or if the user chooses and the pam file allows the selected security context. Also the controlling tty will have it's security context modified to match the users. Adding pam_selinux into a pam file could cause other pam modules to change their behavior if the exec another application. The close and open option help mitigate this problem. close option will only cause the close portion of the pam_selinux to execute, and open will only cause the open portion to run. You can add pam_selinux to the config file twice. Add the pam_selinux close as the executes the open pass through the modules, pam_selinux open_session will happen last. When PAM executes the close pass through the modules pam_selinux close_session will happen first. OPTIONS
close Only execute the close_session portion of the module. debug Turns on debugging via syslog(3). open Only execute the open_session portion of the module. nottys Do not try to setup the ttys security context. verbose attempt to inform the user when security context is set. select_context Attempt to ask the user for a custom security context role. If MLS is on ask also for sensitivity level. env_params Attempt to obtain a custom security context role from PAM environment. If MLS is on obtain also sensitivity level. This option and the select_context option are mutually exclusive. The respective PAM environment variables are SELINUX_ROLE_REQUESTED, SELINUX_LEVEL_REQUESTED, and SELINUX_USE_CURRENT_RANGE. The first two variables are self describing and the last one if set to 1 makes the PAM module behave as if the use_current_range was specified on the command line of the module. use_current_range Use the sensitivity level of the current process for the user context instead of the default level. Also suppresses asking of the sensitivity level from the user or obtaining it from PAM environment. MODULE TYPES PROVIDED
Only the session module type is provided. RETURN VALUES
PAM_AUTH_ERR Unable to get or set a valid context. PAM_SUCCESS The security context was set successfully. PAM_USER_UNKNOWN The user is not known to the system. EXAMPLES
auth required pam_unix.so session required pam_permit.so session optional pam_selinux.so SEE ALSO
pam.conf(5), pam.d(5), pam(8) AUTHOR
pam_selinux was written by Dan Walsh <dwalsh@redhat.com>. Linux-PAM Manual 06/16/2009 PAM_SELINUX(8)
All times are GMT -4. The time now is 02:05 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy