Book Image

Hacking For Dummies - Sixth Edition

By : Kevin Beaver
Book Image

Hacking For Dummies - Sixth Edition

By: Kevin Beaver

Overview of this book

In order to outsmart a hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this book helps you learn how to recognize the vulnerabilities in your systems and protect them from attacks. You’ll learn the security testing techniques that are based on the information security best practices. You’ll learn how to establish a comprehensive testing plan and plug the holes in your system. The later chapters will teach you how to manage an ongoing security testing program. By the end of the book, you’ll have the knowledge to successfully implement a security assessment program, perform proper security checks, and put the proper countermeasures in place to keep external hackers and malicious users in check.
Table of Contents (15 chapters)
Free Chapter
1
Cover
10
About the Author
11
Advertisement Page
12
Connect with Dummies
13
Index
14
End User License Agreement

Chapter 13

Linux and macOS

IN THIS CHAPTER

check Examining Linux and macOS testing tools

check Port-scanning hosts

check Gleaning information without logging in

check Exploiting common vulnerabilities when logged in to Linux and macOS

check Minimizing Linux and macOS security risks

Linux hasn’t made inroads onto the enterprise desktop the way that Windows has, but its offshoot, macOS, certainly has. Both Linux and Macs are prevalent in enterprises, so you need to make sure that they fall within the scope of your security testing. A common misconception is that Linux and macOS (and its predecessor, OS X) are more secure than Windows. More and more often, however, these operating systems (OSes) are shown to be susceptible to the same types of security vulnerabilities that afflict Windows, so you can’t let your guard down.

Criminal hackers are increasingly...