Preview

Known Operating Syst

Satisfactory Essays
Open Document
Open Document
507 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Known Operating Syst
Known operating system security flaw in Microsoft® Windows®, Mac OS X®, Linux®, or UNIX®
Lance Branford
POS/355
January 13, 2015
Eugene Gorbatov
Known operating system security flaw in Microsoft® Windows®, Mac OS X®, Linux®, or UNIX®

In describing known operating security with in the operating systems. I will be describing how the systems are compromised how to counter the attack and what the attack does to the system. In the UNIX systems the vulnerability named shellshock which is a command line interrupter for Linux and Mac OSx, describe how it effects the Bash shell and is used to gain access to systems..
With the shellshock vulnerability in the UNIX operating systems the attacker inserts malicious piece of code3 from a remote location and is able to get full access to the victims computer and is able retrieve data. But not all UNIX systems are vulnerable to this attack. The description from the national vulnerability database “GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.” ("Common Vulnerabilities And Exposures", 2015)
Protection from such attack is preventable if not all together avoidable. The way that the attack gains access to the system is by having remote login and guest account access turned on and without assigning a password to the guest account. The second way system is exposed to the attack is by scripting environments such as



References: Common Vulnerabilities and Exposures. (2015). Retrieved from http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 Shellshock Vulnerability: What Mac OS X Users Need to Know. (2015). Retrieved from http://www.intego.com/mac-security-blog/shellshock-vulnerability-what-mac-os-x-users-need-to-know/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    Unix security systems were designed into the architecture. Raw hardware devices are protected from direct access, and the file system has an inbuilt security system giving individual access to files on three levels, user only, group membership, and world access. Each category has read, executable and write flags that may be set in any combination. Kernel -or- System…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Lab #1

    • 2039 Words
    • 9 Pages

    Set-UID is an important security mechanism in Unix operating systems. When a Set-UID program is run, it assumes the owner’s privileges. For example, if the program’s owner is root, then when anyone runs this program, the program gains the root’s privileges during its execution. Set-UID allows us to do many interesting things, but unfortunately, it is also the culprit of many bad things. Therefore, the objective of this lab is two-fold:…

    • 2039 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    remote access and data trolling capabilities alone will cause the attacker to access any and all desired…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Jang, Michael H.. Security strategies in Linux platforms and applications. Sudbury, MA: Jones & Bartlett Learning, 2011.…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    logs into root they will have full access to the system and could purposely or accidently run…

    • 521 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    2846338 involve privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    7. You can regain access to a system by planting a backdoor, this would entail creating an account with elevated privileges. But the hacker must be careful not to create an account, that wouldn’t fit into the naming schema.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Three of the most important types of Linux security technologies are Security Enhanced Linux (SELinux), chroot jail, and iptables. This security measures aide in the subversion of theft and malicious activity. We will discuss these items in depth to address who created them and for what reason. Along with how these technologies changed the operating system to enforce security, and the types of threats that these security systems are design to eliminate.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Operating System Security

    • 642 Words
    • 3 Pages

    Security is the most important part of an operating system when it comes to keeping the system and its information safe. There are various aspects to the security piece in an operating system; which are protocols, kernel and encryption. The UNIX/LINIX, Apple and Windows Server 2008 all have protocol, kernel and encryption features. These features need to be enabled to the highest level in order to have the most security for each of these operating systems. Even though some of these features are already enabled to some level by default, the security level still can be raised for more protection. Starting with the UNIX/LINUX versus Apple operating systems, the most secured versions of these operating systems will be used to demonstrate which is more secured. There are two aspects of these operating systems, desktop and server, however we will stay with the desktop versions of these operating systems. This will allow a more forward approach, so that it will be more understandable for the end user. The LINUX Red Hat Enterprise edition offers the most security of any of the other editions of UNIX/LINUX desktop versions. The protocols of this operating system offer some level of security but there are no new approved security measures built into the security stack. This allows hackers/attacker to be able to gain access easier than newer security measures. One of the newest measures of security in LINUX is SELinux this includes enhancements to the kernel in the LINUX operating system. It provides a security measures that enables access control security policies. This level of security also includes MAC (mandatory access controls) which is a government style level of security measure. This kernel security measure is the highest level of security that this operating system has to offer. When looking into the Apple operating system, OS X offers the most protection of any version of Apple operating system. One of the main security…

    • 642 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    mobile

    • 2906 Words
    • 12 Pages

    Android OEM’s applications (in)security and backdoors without permission Andr´ Moulu e amoulu@quarkslab.com Android introduction Android security model Methodology Plan 1 Context and objectives 2 Android introduction 3 Android security model 4 Methodology 5 Toward a backdoor without permission 6 Post-exploitation 7 Scope of the vulnerabilities 8 Conclusion Toward a backdoor without permission…

    • 2906 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    To mimic web pages of real websites, phishing websites are created by malicious people. Some of the Web pages look like the original websites. To analyze and to understand phishing website is a very complicate and complex issue and it is both technical and social problem .The aim of this report is to create a flexible and effective method that uses fuzzy logic. To check whether phishing activity is taking place or not, fuzzy logic is used on websites to qualify all phishing website characteristics. Fuzzy logic modeling is applied in this approach to assess the phishing website risk on the 27 characteristics and it is also applied on the factors which stamp the forged website.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays