A penetration test of red Hat Enterprise Linux 5.4 under BT5

Source: Internet
Author: User
Tags linux

Theory with practice is the best way to learn, we know how to penetrate the attack at the same time, someone to start to try to simulate a real attack.

Infiltration, when we found that a certain machine opened some ports, you can think of how to use the relevant service vulnerabilities to launch attacks.

The success of each attack depends on the operating system of the target host. The installed Service Pack (ServicePack) version and language type, while also relying on the successful bypassing of data Execution Protection (dep:dataexecutionprevention). DEP is designed to protect against buffer overflows. It renders the program stack as read-only, preventing shellcode from being maliciously placed on the stack and executing, but we can bypass DEP protection with some complex stack operations.

The essence of attack infiltration is to fully identify the security weaknesses in the target system, and to find the corresponding attack for the weakness, and obtain the access rights of the system.

1. For operating system penetration

In the previous experiment has been explained, do not know can go to see.

2. Infiltration of installed service packs

Use Nmap to detect the target machine amount, scan the port and the version number of the service used

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.