How Hackers Remotely Access Unix Systems

amit08255 By amit08255, 5th Apr 2014 | Follow this author | RSS Feed
Posted in Wikinut>Reviews>Technology>Security

Remote access involves network access or access to another communication channel, such as - Dial-up modem attached to a unix system.
In this article we will discuss how hackers access UNIX systems remotely.

How hackers Remotely Access Unix Systems?

Actually hackers mostly use three ways to access UNIX systems remotely:--
1. Exploiting a listening service:--- For example:- Someone gives you a user ID and
password and says, "Break into my computer". This is
an example of exploiting a listening service.
You must remember that service must be listening means
a service allows interactive logins such as- Telnet, FTP,
or SSH. If a service is not listening then it cannot be
broken remotely.
2. Route through a UNIX system--- Routing through UNIX system means attacker has
circumvent UNIX firewalls by source-routing packets
through the firewall to internal systems. This is possible
because the UNIX kernel had IP forwarding enabled
when the firewall application should have been
performing this function.

3. Promiscuous-mode attack---- Using a promiscuous-mode attack, an attacker can
send in carefully crafted packet that turns your network
sniffer into your worst security nightmare.

SO what can you do to protect your UNIX systems from remotely access by attackers:--

1. Install a firewall or use IP- tables and configure IP - tables to protect your system

2. Make sure your telnet service is disabled in your system when it is not in use.

3. If you are running a server in your UNIX system then configure firewall to allow only secure


moderator johnnydod moderated this page.
If you have any complaints about this content, please let us know


Add a comment
Can't login?