SlideShare a Scribd company logo
1 of 38
Download to read offline
Is Linux Secure?

                               Mackenzie Morgan

                               Southeast LinuxFest 2010


                                  12 June 2010




Mackenzie Morgan (SELF 2010)         Is Linux Secure?     12 June 2010   1 / 35
Introduction


Outline



1     Introduction


2     Vocabulary


3     What can still hurt me?


4     What protection is there?




    Mackenzie Morgan (SELF 2010)        Is Linux Secure?   12 June 2010   2 / 35
Introduction


Me




     Mackenzie Morgan
     Computer Science student
     Ubuntu Developer
     Kubuntu user
     http://ubuntulinuxtipstricks.blogspot.com ← find slides here




Mackenzie Morgan (SELF 2010)        Is Linux Secure?       12 June 2010   3 / 35
Introduction


This Talk




      Linux Zealot: Try Linux! It doesn’t get viruses!
      Average Person: No viruses? I’m invincible!




 Mackenzie Morgan (SELF 2010)        Is Linux Secure?    12 June 2010   4 / 35
Vocabulary


Outline



1     Introduction


2     Vocabulary


3     What can still hurt me?


4     What protection is there?




    Mackenzie Morgan (SELF 2010)       Is Linux Secure?   12 June 2010   5 / 35
Vocabulary


Malware




Malware (or “badware”) is an umbrella term for viruses, trojans, worms,
rootkits, etc.




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?       12 June 2010   6 / 35
Vocabulary


Virus




Viruses infect individual files. They spread when people share those files.




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?        12 June 2010   7 / 35
Vocabulary


Social Engineering




Social Engineering is tricking people into doing something that is bad for
security.




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?        12 June 2010   8 / 35
Vocabulary


Trojan




Trojans are malware that get installed via social engineering. . . or, well,
lying.
“I’m a fun game and totally safe! but not really, I’m actually going to steal your
passwords. . . ”




 Mackenzie Morgan (SELF 2010)         Is Linux Secure?                12 June 2010   9 / 35
Vocabulary


Worm




A worm infects other systems, automatically, usually over a network.




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?       12 June 2010   10 / 35
Vocabulary


Botnet




A botnet is a group of systems infected by malware which operate as a
collective and are controlled by a erm. . . jagoff.




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?      12 June 2010   11 / 35
Vocabulary


Botnet




A botnet is a group of systems infected by malware which operate as a
collective and are controlled by a erm. . . jagoff.
Yes, I’m from Pittsburgh. How’d you guess?




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?      12 June 2010   11 / 35
Vocabulary


Rootkit




A rootkit keeps the activities of an unauthorised user hidden so that you
can’t tell your system has been owned.




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?        12 June 2010   12 / 35
Vocabulary


Keylogger




A keylogger tracks everything you type. Yes, including passwords.
It could be hardware (see ThinkGeek), but usually software. There are
legitimate(-ish) uses.




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?       12 June 2010   13 / 35
Vocabulary


Browser-based Attack


A browser-based attack is any attack that takes place inside the web
browser. They are usually not limited to a specific OS.
Examples:
      Cross-site Scripting (XSS) – using Javascript on one webpage to steal
      data from another
      Tracking cookies – harvests the information stored in your browser by
      other websites
      Cookie jacking – stealing credentials for other websites from your
      browser’s cookies
      Click jacking – hiding clickable objects on a webpage on top of other
      objects so that you’re not clicking what you think you’re clicking



 Mackenzie Morgan (SELF 2010)       Is Linux Secure?          12 June 2010   14 / 35
Vocabulary


Phishing




Phishing is social engineering aimed at making you believe you are
interacting with someone else whom you trust




 Mackenzie Morgan (SELF 2010)       Is Linux Secure?       12 June 2010   15 / 35
What can still hurt me?


Outline



1     Introduction


2     Vocabulary


3     What can still hurt me?


4     What protection is there?




    Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   16 / 35
What can still hurt me?


What’s still a problem?




All of those




 Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   17 / 35
What can still hurt me?


But what about no viruses?




      Windows ones usually won’t run, even in Wine
      Several hundred for Linux
      Only ∼30 in the wild ever
      No known viruses exploiting current vulnerabilities




 Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   18 / 35
What can still hurt me?


Email Trojans




“Check out this cool new game! http://example.com/foo.desktop”




 Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   19 / 35
What can still hurt me?


Untrusted Software




.deb for “screensaver” on gnome-look.org




 Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   20 / 35
What can still hurt me?


Untrusted Software




.deb for “screensaver” on gnome-look.org
. . . and now you’re on a botnet
http://ubuntuforums.org/showthread.php?t=1349678




 Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   20 / 35
What can still hurt me?


Browser-based attacks




      Unless only for Internet Explorer
      Firefox? Opera? Chrome?




 Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   21 / 35
What can still hurt me?


Phishing




There’s no patch for gullibility




 Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   22 / 35
What can still hurt me?


Rootkits




If any of the previous work, you can get one




 Mackenzie Morgan (SELF 2010)                    Is Linux Secure?   12 June 2010   23 / 35
What protection is there?


Outline



1     Introduction


2     Vocabulary


3     What can still hurt me?


4     What protection is there?




    Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   24 / 35
What protection is there?


Trusted software sources




      Stick to your distro’s repos
      Otherwise, source directly from upstream
      Avoid non-software in .deb or .rpm format
      Heed your package manager’s warnings
      Grrr @ Arch Linux




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   25 / 35
What protection is there?


Launchers




You get a .desktop from web/email. . .
Do you know what it’ll run?




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   26 / 35
What protection is there?


Launchers




You get a .desktop from web/email. . .
Do you know what it’ll run?
Could be anything




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   26 / 35
What protection is there?


Launchers in KDE




Kubuntu’s & openSUSE’s KDE:




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   27 / 35
What protection is there?


Launchers in GNOME

Fedora’s & openSUSE’s GNOME:




Ubuntu’s GNOME:




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   28 / 35
What protection is there?


Browser - Javascript




If you use Firefox, get NoScript extension




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   29 / 35
What protection is there?


Browser - Encryption




Don’t send passwords unencrypted
Look for the lock




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   30 / 35
What protection is there?


Browser - Phishing

How do you know it’s the site it claims to be?
Look at everything before the first slash




Check out this green thing

 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   31 / 35
What protection is there?


Minimal privileges




Don’t login graphically as root!
Why?
Malware gets full access




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   32 / 35
What protection is there?


Don’t need it? Don’t use it!




Don’t login remotely with command line or push files to it?
Uninstall your SSH and S/FTP servers




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   33 / 35
What protection is there?


Detecting problems




Find rootkits:
      rkhunter
      chkrootkit
Warn of changes:
      tripwire
You probably don’t need these




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   34 / 35
What protection is there?




Questions?




 Mackenzie Morgan (SELF 2010)                     Is Linux Secure?   12 June 2010   35 / 35

More Related Content

Similar to Is Linux Secure?

Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetPrathan Phongthiproek
 
What Could Microkernels Learn from Monolithic Kernels (and Vice Versa)
What Could Microkernels Learn from Monolithic Kernels (and Vice Versa)What Could Microkernels Learn from Monolithic Kernels (and Vice Versa)
What Could Microkernels Learn from Monolithic Kernels (and Vice Versa)Martin Děcký
 
Dealing with Linux Malware
Dealing with Linux MalwareDealing with Linux Malware
Dealing with Linux MalwareMichael Boelen
 
BCI Linux Distribution - Project Proposal by Umair Iftikhar
BCI Linux Distribution - Project Proposal by Umair IftikharBCI Linux Distribution - Project Proposal by Umair Iftikhar
BCI Linux Distribution - Project Proposal by Umair IftikharUmair Iftikhar
 

Similar to Is Linux Secure? (6)

Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
 
What Could Microkernels Learn from Monolithic Kernels (and Vice Versa)
What Could Microkernels Learn from Monolithic Kernels (and Vice Versa)What Could Microkernels Learn from Monolithic Kernels (and Vice Versa)
What Could Microkernels Learn from Monolithic Kernels (and Vice Versa)
 
Day1 ubuntu boot camp
Day1   ubuntu boot campDay1   ubuntu boot camp
Day1 ubuntu boot camp
 
Dealing with Linux Malware
Dealing with Linux MalwareDealing with Linux Malware
Dealing with Linux Malware
 
BCI Linux Distribution - Project Proposal by Umair Iftikhar
BCI Linux Distribution - Project Proposal by Umair IftikharBCI Linux Distribution - Project Proposal by Umair Iftikhar
BCI Linux Distribution - Project Proposal by Umair Iftikhar
 
BPotter-L1-05
BPotter-L1-05BPotter-L1-05
BPotter-L1-05
 

Recently uploaded

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Is Linux Secure?

  • 1. Is Linux Secure? Mackenzie Morgan Southeast LinuxFest 2010 12 June 2010 Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 1 / 35
  • 2. Introduction Outline 1 Introduction 2 Vocabulary 3 What can still hurt me? 4 What protection is there? Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 2 / 35
  • 3. Introduction Me Mackenzie Morgan Computer Science student Ubuntu Developer Kubuntu user http://ubuntulinuxtipstricks.blogspot.com ← find slides here Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 3 / 35
  • 4. Introduction This Talk Linux Zealot: Try Linux! It doesn’t get viruses! Average Person: No viruses? I’m invincible! Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 4 / 35
  • 5. Vocabulary Outline 1 Introduction 2 Vocabulary 3 What can still hurt me? 4 What protection is there? Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 5 / 35
  • 6. Vocabulary Malware Malware (or “badware”) is an umbrella term for viruses, trojans, worms, rootkits, etc. Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 6 / 35
  • 7. Vocabulary Virus Viruses infect individual files. They spread when people share those files. Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 7 / 35
  • 8. Vocabulary Social Engineering Social Engineering is tricking people into doing something that is bad for security. Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 8 / 35
  • 9. Vocabulary Trojan Trojans are malware that get installed via social engineering. . . or, well, lying. “I’m a fun game and totally safe! but not really, I’m actually going to steal your passwords. . . ” Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 9 / 35
  • 10. Vocabulary Worm A worm infects other systems, automatically, usually over a network. Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 10 / 35
  • 11. Vocabulary Botnet A botnet is a group of systems infected by malware which operate as a collective and are controlled by a erm. . . jagoff. Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 11 / 35
  • 12. Vocabulary Botnet A botnet is a group of systems infected by malware which operate as a collective and are controlled by a erm. . . jagoff. Yes, I’m from Pittsburgh. How’d you guess? Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 11 / 35
  • 13. Vocabulary Rootkit A rootkit keeps the activities of an unauthorised user hidden so that you can’t tell your system has been owned. Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 12 / 35
  • 14. Vocabulary Keylogger A keylogger tracks everything you type. Yes, including passwords. It could be hardware (see ThinkGeek), but usually software. There are legitimate(-ish) uses. Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 13 / 35
  • 15. Vocabulary Browser-based Attack A browser-based attack is any attack that takes place inside the web browser. They are usually not limited to a specific OS. Examples: Cross-site Scripting (XSS) – using Javascript on one webpage to steal data from another Tracking cookies – harvests the information stored in your browser by other websites Cookie jacking – stealing credentials for other websites from your browser’s cookies Click jacking – hiding clickable objects on a webpage on top of other objects so that you’re not clicking what you think you’re clicking Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 14 / 35
  • 16. Vocabulary Phishing Phishing is social engineering aimed at making you believe you are interacting with someone else whom you trust Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 15 / 35
  • 17. What can still hurt me? Outline 1 Introduction 2 Vocabulary 3 What can still hurt me? 4 What protection is there? Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 16 / 35
  • 18. What can still hurt me? What’s still a problem? All of those Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 17 / 35
  • 19. What can still hurt me? But what about no viruses? Windows ones usually won’t run, even in Wine Several hundred for Linux Only ∼30 in the wild ever No known viruses exploiting current vulnerabilities Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 18 / 35
  • 20. What can still hurt me? Email Trojans “Check out this cool new game! http://example.com/foo.desktop” Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 19 / 35
  • 21. What can still hurt me? Untrusted Software .deb for “screensaver” on gnome-look.org Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 20 / 35
  • 22. What can still hurt me? Untrusted Software .deb for “screensaver” on gnome-look.org . . . and now you’re on a botnet http://ubuntuforums.org/showthread.php?t=1349678 Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 20 / 35
  • 23. What can still hurt me? Browser-based attacks Unless only for Internet Explorer Firefox? Opera? Chrome? Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 21 / 35
  • 24. What can still hurt me? Phishing There’s no patch for gullibility Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 22 / 35
  • 25. What can still hurt me? Rootkits If any of the previous work, you can get one Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 23 / 35
  • 26. What protection is there? Outline 1 Introduction 2 Vocabulary 3 What can still hurt me? 4 What protection is there? Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 24 / 35
  • 27. What protection is there? Trusted software sources Stick to your distro’s repos Otherwise, source directly from upstream Avoid non-software in .deb or .rpm format Heed your package manager’s warnings Grrr @ Arch Linux Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 25 / 35
  • 28. What protection is there? Launchers You get a .desktop from web/email. . . Do you know what it’ll run? Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 26 / 35
  • 29. What protection is there? Launchers You get a .desktop from web/email. . . Do you know what it’ll run? Could be anything Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 26 / 35
  • 30. What protection is there? Launchers in KDE Kubuntu’s & openSUSE’s KDE: Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 27 / 35
  • 31. What protection is there? Launchers in GNOME Fedora’s & openSUSE’s GNOME: Ubuntu’s GNOME: Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 28 / 35
  • 32. What protection is there? Browser - Javascript If you use Firefox, get NoScript extension Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 29 / 35
  • 33. What protection is there? Browser - Encryption Don’t send passwords unencrypted Look for the lock Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 30 / 35
  • 34. What protection is there? Browser - Phishing How do you know it’s the site it claims to be? Look at everything before the first slash Check out this green thing Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 31 / 35
  • 35. What protection is there? Minimal privileges Don’t login graphically as root! Why? Malware gets full access Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 32 / 35
  • 36. What protection is there? Don’t need it? Don’t use it! Don’t login remotely with command line or push files to it? Uninstall your SSH and S/FTP servers Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 33 / 35
  • 37. What protection is there? Detecting problems Find rootkits: rkhunter chkrootkit Warn of changes: tripwire You probably don’t need these Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 34 / 35
  • 38. What protection is there? Questions? Mackenzie Morgan (SELF 2010) Is Linux Secure? 12 June 2010 35 / 35