Lesson 11

Date: 4/17/2019
Linux Network Security
Linux System Administration


Examples of how systems get compromised


  • Cracked, stollen and sniffed passwords
  • SSH client with a sniffer on a multi-user system:
    reads user name, password and the destination host.
  • SSH brute force attack guesses user credentials.
  • Accounts with empty passwords and root privileges
  • World writable files and directories can be used for planting trojans.
  • SETUID and SETGID executables
  • Trojans
  • Stack overflow attacks on vulnerable services
  • Worms


  • Take me to the Course Website