SlideShare a Scribd company logo
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:00 Linux Distributions
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:05 Linux Architecture
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Linux Security
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:15 Physical Security
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:20 Operating System Security
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:25 Network Security
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:30 User and group Security
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:35 Application Security
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:45 Linux security
USER
App
OS
Service
Signal to hardware
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Separately Distributed
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Uses Module, loadable
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Completely compilable
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Chances of Buffer overflow
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:10 Can harden at Kernel Level
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Patched kernel
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:10 Secure Linux patch
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:10 International kernel patch
-rw-------- Kaustubh null 10 oct 5 11:15 grub.conf
# initrd /initrd-[generic-]version.img
#boot=/dev/sda
default=0
timeout=5
password --md5 $1$TNUb/1$TwroGJn4eCd4xsYeGiBYq.
splashimage=(hd0,0)/grub/splash.xpm.gz
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:20 top –n 1 -b
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:20 ps –aux
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:20 dpkg –l | rpm –qa
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:20 Unnessesary package
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:20 Latest packages for services
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Patched kernel
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:10 dpkg –l | grep kernel
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:35 passwd,shadow
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:35 MinAge,MaxAge,
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:35 Expiry warning, inactive time
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:35 Generic account,/bin/false,0 ONLY 1
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:35 libpam,libcrypto,
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:35 No root,user must SU
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:30 chkconfig –list
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:30 xinet services
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:30 netstat -tunalp
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:30 Default Services
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:30 Telnet, FTP vs SSH
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:40 Directory restriction
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:40 Option none
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:40 Banner & signature,token change
-rwx-r-x-r-x Kaustubh null 10 oct 5 11:40 mod_Security,keep_alive,Limit_req
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:40 mod_evasive
-rwx-r-x-r-x Kaustubh null 10 oct 10 11:40 HTTPONLY,Secure,Xframe,unused m
Pinging S3curityb3ast [Kaustubh Padwad] with 64 bytes of data:
Reply from Kaustubh Padwad: bytes=32 time<1ms @S3curityB3ast
Reply from Kaustubh Padwad: bytes=32 time<1ms http://breakthesecsec.com
Reply from Kaustubh Padwad: bytes=32 time<1ms kingkaustubh@me.com
Reply from Kaustubh Padwad: bytes=32 time<1ms youtube hacker kaustubh
Ping statistics for Kaustubh Padwad:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
Control-C

More Related Content

What's hot

Linux kernel bug hunting
Linux kernel bug huntingLinux kernel bug hunting
Linux kernel bug hunting
Andrea Righi
 
eTwinning - traceroute command
eTwinning - traceroute commandeTwinning - traceroute command
eTwinning - traceroute command
Agrupamento de Escolas da Batalha
 
Add and configure lu ns in solaris
Add and configure lu ns in solarisAdd and configure lu ns in solaris
Add and configure lu ns in solarisAmrita Dey
 
ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2
Shuya Osaki
 
The Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchThe Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitch
Te-Yen Liu
 
Accelerating Neutron with Intel DPDK
Accelerating Neutron with Intel DPDKAccelerating Neutron with Intel DPDK
Accelerating Neutron with Intel DPDK
Alexander Shalimov
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
Netwax Lab
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
Thomas Graf
 
Open VSwitch .. Use it for your day to day needs
Open VSwitch .. Use it for your day to day needsOpen VSwitch .. Use it for your day to day needs
Open VSwitch .. Use it for your day to day needs
rranjithrajaram
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
Netwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
Netwax Lab
 
Vrrp
VrrpVrrp
OpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
OpenSSL + Intel (r) Quick Assist Technology Engine Setup InstructionsOpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
OpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
Michelle Holley
 
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsEincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Netwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
Netwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
Netwax Lab
 
Linux network namespaces
Linux network namespacesLinux network namespaces
Linux network namespaces
Mike Wilson
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
Netwax Lab
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
Netwax Lab
 

What's hot (20)

Linux kernel bug hunting
Linux kernel bug huntingLinux kernel bug hunting
Linux kernel bug hunting
 
eTwinning - traceroute command
eTwinning - traceroute commandeTwinning - traceroute command
eTwinning - traceroute command
 
Add and configure lu ns in solaris
Add and configure lu ns in solarisAdd and configure lu ns in solaris
Add and configure lu ns in solaris
 
ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2
 
The Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchThe Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitch
 
Accelerating Neutron with Intel DPDK
Accelerating Neutron with Intel DPDKAccelerating Neutron with Intel DPDK
Accelerating Neutron with Intel DPDK
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
 
Open VSwitch .. Use it for your day to day needs
Open VSwitch .. Use it for your day to day needsOpen VSwitch .. Use it for your day to day needs
Open VSwitch .. Use it for your day to day needs
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Vrrp
VrrpVrrp
Vrrp
 
OpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
OpenSSL + Intel (r) Quick Assist Technology Engine Setup InstructionsOpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
OpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
 
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsEincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Linux network namespaces
Linux network namespacesLinux network namespaces
Linux network namespaces
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 

Similar to Linux Audit By Kaustubh Padwad

Ansible 實戰:top down 觀點
Ansible 實戰:top down 觀點Ansible 實戰:top down 觀點
Ansible 實戰:top down 觀點
William Yeh
 
How to operate containerized OpenStack
How to operate containerized OpenStackHow to operate containerized OpenStack
How to operate containerized OpenStack
Nalee Jang
 
Linux class 9 15 oct 2021-5
Linux class 9   15 oct 2021-5Linux class 9   15 oct 2021-5
Linux class 9 15 oct 2021-5
Khawar Nehal khawar.nehal@atrc.net.pk
 
Oracle Enterprise Manager Cloud Control 12c: how to solve 'ERROR: NMO Not Set...
Oracle Enterprise Manager Cloud Control 12c: how to solve 'ERROR: NMO Not Set...Oracle Enterprise Manager Cloud Control 12c: how to solve 'ERROR: NMO Not Set...
Oracle Enterprise Manager Cloud Control 12c: how to solve 'ERROR: NMO Not Set...
Marco Vigelini
 
Athenticated smaba server config with open vpn
Athenticated smaba server  config with open vpnAthenticated smaba server  config with open vpn
Athenticated smaba server config with open vpn
Chanaka Lasantha
 
nginxをソースからインストールしてみたよ
nginxをソースからインストールしてみたよnginxをソースからインストールしてみたよ
nginxをソースからインストールしてみたよmamoru tateoka
 
Rac introduction
Rac introductionRac introduction
Rac introduction
Riyaj Shamsudeen
 
Lxc – next gen virtualization for cloud intro (cloudexpo)
Lxc – next gen virtualization for cloud   intro (cloudexpo)Lxc – next gen virtualization for cloud   intro (cloudexpo)
Lxc – next gen virtualization for cloud intro (cloudexpo)
Boden Russell
 
Docker - container and lightweight virtualization
Docker - container and lightweight virtualization Docker - container and lightweight virtualization
Docker - container and lightweight virtualization
Sim Janghoon
 
Linux internet server security and configuration tutorial
Linux internet server security and configuration tutorialLinux internet server security and configuration tutorial
Linux internet server security and configuration tutorial
annik147
 
Pluribus SDN Technology
Pluribus SDN TechnologyPluribus SDN Technology
Pluribus SDN Technology
Open Networking Summits
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network securityThanawan Tuamyim
 
Docker practice
Docker practiceDocker practice
Docker practice
wonyong hwang
 
Trivadis TechEvent 2017 With the CLI through the Oracle Cloud Martin Berger
Trivadis TechEvent 2017 With the CLI through the Oracle Cloud Martin BergerTrivadis TechEvent 2017 With the CLI through the Oracle Cloud Martin Berger
Trivadis TechEvent 2017 With the CLI through the Oracle Cloud Martin Berger
Trivadis
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
NotSoSecure Global Services
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
camsec
 
Hands_on_multipath_p1.pdf
Hands_on_multipath_p1.pdfHands_on_multipath_p1.pdf
Hands_on_multipath_p1.pdf
Hossein Mehrara
 
Complete squid &amp; firewall configuration. plus easy mac binding
Complete squid &amp; firewall configuration. plus easy mac bindingComplete squid &amp; firewall configuration. plus easy mac binding
Complete squid &amp; firewall configuration. plus easy mac binding
Chanaka Lasantha
 
Why Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologyWhy Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container Technology
Sagi Brody
 
Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS
Shrey Agarwal
 

Similar to Linux Audit By Kaustubh Padwad (20)

Ansible 實戰:top down 觀點
Ansible 實戰:top down 觀點Ansible 實戰:top down 觀點
Ansible 實戰:top down 觀點
 
How to operate containerized OpenStack
How to operate containerized OpenStackHow to operate containerized OpenStack
How to operate containerized OpenStack
 
Linux class 9 15 oct 2021-5
Linux class 9   15 oct 2021-5Linux class 9   15 oct 2021-5
Linux class 9 15 oct 2021-5
 
Oracle Enterprise Manager Cloud Control 12c: how to solve 'ERROR: NMO Not Set...
Oracle Enterprise Manager Cloud Control 12c: how to solve 'ERROR: NMO Not Set...Oracle Enterprise Manager Cloud Control 12c: how to solve 'ERROR: NMO Not Set...
Oracle Enterprise Manager Cloud Control 12c: how to solve 'ERROR: NMO Not Set...
 
Athenticated smaba server config with open vpn
Athenticated smaba server  config with open vpnAthenticated smaba server  config with open vpn
Athenticated smaba server config with open vpn
 
nginxをソースからインストールしてみたよ
nginxをソースからインストールしてみたよnginxをソースからインストールしてみたよ
nginxをソースからインストールしてみたよ
 
Rac introduction
Rac introductionRac introduction
Rac introduction
 
Lxc – next gen virtualization for cloud intro (cloudexpo)
Lxc – next gen virtualization for cloud   intro (cloudexpo)Lxc – next gen virtualization for cloud   intro (cloudexpo)
Lxc – next gen virtualization for cloud intro (cloudexpo)
 
Docker - container and lightweight virtualization
Docker - container and lightweight virtualization Docker - container and lightweight virtualization
Docker - container and lightweight virtualization
 
Linux internet server security and configuration tutorial
Linux internet server security and configuration tutorialLinux internet server security and configuration tutorial
Linux internet server security and configuration tutorial
 
Pluribus SDN Technology
Pluribus SDN TechnologyPluribus SDN Technology
Pluribus SDN Technology
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network security
 
Docker practice
Docker practiceDocker practice
Docker practice
 
Trivadis TechEvent 2017 With the CLI through the Oracle Cloud Martin Berger
Trivadis TechEvent 2017 With the CLI through the Oracle Cloud Martin BergerTrivadis TechEvent 2017 With the CLI through the Oracle Cloud Martin Berger
Trivadis TechEvent 2017 With the CLI through the Oracle Cloud Martin Berger
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
 
Hands_on_multipath_p1.pdf
Hands_on_multipath_p1.pdfHands_on_multipath_p1.pdf
Hands_on_multipath_p1.pdf
 
Complete squid &amp; firewall configuration. plus easy mac binding
Complete squid &amp; firewall configuration. plus easy mac bindingComplete squid &amp; firewall configuration. plus easy mac binding
Complete squid &amp; firewall configuration. plus easy mac binding
 
Why Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologyWhy Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container Technology
 
Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS
 

More from Kaustubh Padwad

Middleware hacking
Middleware hackingMiddleware hacking
Middleware hacking
Kaustubh Padwad
 
Windows Audit By Kaustubh Padwad
Windows Audit By Kaustubh PadwadWindows Audit By Kaustubh Padwad
Windows Audit By Kaustubh Padwad
Kaustubh Padwad
 
Buffer Overflow
Buffer OverflowBuffer Overflow
Buffer Overflow
Kaustubh Padwad
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Denial of service attack part 2
Denial of service attack part 2Denial of service attack part 2
Denial of service attack part 2
Kaustubh Padwad
 
Security Onion Advance
Security Onion AdvanceSecurity Onion Advance
Security Onion Advance
Kaustubh Padwad
 
Security onion
Security onionSecurity onion
Security onion
Kaustubh Padwad
 
Fully Automated Nagios (FAN)
Fully Automated Nagios (FAN)Fully Automated Nagios (FAN)
Fully Automated Nagios (FAN)
Kaustubh Padwad
 

More from Kaustubh Padwad (9)

Middleware hacking
Middleware hackingMiddleware hacking
Middleware hacking
 
Windows Audit By Kaustubh Padwad
Windows Audit By Kaustubh PadwadWindows Audit By Kaustubh Padwad
Windows Audit By Kaustubh Padwad
 
Buffer Overflow
Buffer OverflowBuffer Overflow
Buffer Overflow
 
Ddos final part
Ddos final part Ddos final part
Ddos final part
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Denial of service attack part 2
Denial of service attack part 2Denial of service attack part 2
Denial of service attack part 2
 
Security Onion Advance
Security Onion AdvanceSecurity Onion Advance
Security Onion Advance
 
Security onion
Security onionSecurity onion
Security onion
 
Fully Automated Nagios (FAN)
Fully Automated Nagios (FAN)Fully Automated Nagios (FAN)
Fully Automated Nagios (FAN)
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Linux Audit By Kaustubh Padwad

  • 1.
  • 2. -rwx-r-x-r-x Kaustubh null 10 oct 5 11:00 Linux Distributions -rwx-r-x-r-x Kaustubh null 10 oct 5 11:05 Linux Architecture -rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Linux Security -rwx-r-x-r-x Kaustubh null 10 oct 5 11:15 Physical Security -rwx-r-x-r-x Kaustubh null 10 oct 10 11:20 Operating System Security -rwx-r-x-r-x Kaustubh null 10 oct 5 11:25 Network Security -rwx-r-x-r-x Kaustubh null 10 oct 10 11:30 User and group Security -rwx-r-x-r-x Kaustubh null 10 oct 10 11:35 Application Security -rwx-r-x-r-x Kaustubh null 10 oct 10 11:45 Linux security
  • 3.
  • 5. -rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Separately Distributed -rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Uses Module, loadable -rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Completely compilable -rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Chances of Buffer overflow -rwx-r-x-r-x Kaustubh null 10 oct 10 11:10 Can harden at Kernel Level -rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Patched kernel -rwx-r-x-r-x Kaustubh null 10 oct 10 11:10 Secure Linux patch -rwx-r-x-r-x Kaustubh null 10 oct 10 11:10 International kernel patch
  • 6. -rw-------- Kaustubh null 10 oct 5 11:15 grub.conf # initrd /initrd-[generic-]version.img #boot=/dev/sda default=0 timeout=5 password --md5 $1$TNUb/1$TwroGJn4eCd4xsYeGiBYq. splashimage=(hd0,0)/grub/splash.xpm.gz
  • 7. -rwx-r-x-r-x Kaustubh null 10 oct 5 11:20 top –n 1 -b -rwx-r-x-r-x Kaustubh null 10 oct 5 11:20 ps –aux -rwx-r-x-r-x Kaustubh null 10 oct 5 11:20 dpkg –l | rpm –qa -rwx-r-x-r-x Kaustubh null 10 oct 5 11:20 Unnessesary package -rwx-r-x-r-x Kaustubh null 10 oct 10 11:20 Latest packages for services -rwx-r-x-r-x Kaustubh null 10 oct 5 11:10 Patched kernel -rwx-r-x-r-x Kaustubh null 10 oct 10 11:10 dpkg –l | grep kernel
  • 8.
  • 9. -rwx-r-x-r-x Kaustubh null 10 oct 5 11:35 passwd,shadow -rwx-r-x-r-x Kaustubh null 10 oct 5 11:35 MinAge,MaxAge, -rwx-r-x-r-x Kaustubh null 10 oct 5 11:35 Expiry warning, inactive time -rwx-r-x-r-x Kaustubh null 10 oct 5 11:35 Generic account,/bin/false,0 ONLY 1 -rwx-r-x-r-x Kaustubh null 10 oct 10 11:35 libpam,libcrypto, -rwx-r-x-r-x Kaustubh null 10 oct 10 11:35 No root,user must SU -rwx-r-x-r-x Kaustubh null 10 oct 5 11:30 chkconfig –list -rwx-r-x-r-x Kaustubh null 10 oct 5 11:30 xinet services -rwx-r-x-r-x Kaustubh null 10 oct 5 11:30 netstat -tunalp -rwx-r-x-r-x Kaustubh null 10 oct 5 11:30 Default Services -rwx-r-x-r-x Kaustubh null 10 oct 10 11:30 Telnet, FTP vs SSH
  • 10. -rwx-r-x-r-x Kaustubh null 10 oct 5 11:40 Directory restriction -rwx-r-x-r-x Kaustubh null 10 oct 5 11:40 Option none -rwx-r-x-r-x Kaustubh null 10 oct 5 11:40 Banner & signature,token change -rwx-r-x-r-x Kaustubh null 10 oct 5 11:40 mod_Security,keep_alive,Limit_req -rwx-r-x-r-x Kaustubh null 10 oct 10 11:40 mod_evasive -rwx-r-x-r-x Kaustubh null 10 oct 10 11:40 HTTPONLY,Secure,Xframe,unused m
  • 11.
  • 12. Pinging S3curityb3ast [Kaustubh Padwad] with 64 bytes of data: Reply from Kaustubh Padwad: bytes=32 time<1ms @S3curityB3ast Reply from Kaustubh Padwad: bytes=32 time<1ms http://breakthesecsec.com Reply from Kaustubh Padwad: bytes=32 time<1ms kingkaustubh@me.com Reply from Kaustubh Padwad: bytes=32 time<1ms youtube hacker kaustubh Ping statistics for Kaustubh Padwad: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms Control-C

Editor's Notes

  1. Default services :- autofs, nfs, nfsserver, nfslock networking services: routed, gated, ratvf, snmpd, named, dhcpd, dhclient, dhrelay, nscd, smb Optional network and local services: atd, ldap, kudzu, rhnsd, ypbind, apache, quota, quotad, myself, etc Printing services: lpr, cups, lprng