Advanced OS Presentation
Advanced OS Presentation
Advanced OS Presentation
• Windows OS,
• Mac OS and
• Linux OS.
Windows OS is dominating the computer OS at 83.93%,
Mac OS came at second with 10.29% and
Linux OS at third with 3.76%.
This means that Windows OS is exposed to lot of vulnerability because of it widely
used. Windows or Linux is exposed to the malicious code attacks which comes from
man-in-the-middle-attack (MITM).
Mobile Operating System
Mobile operating systems, Android and iOS are dominating the operating
systems in smartphone.
• In the case 69.68% Android is currently leading the race
• iOS is at second with 19.35%.
Android is an open-source platform where there’s no royalty’s fee to develop for
the platform. The source-code is there on the internet, and everybody can use it
freely without violating any copyright acts. The whole source code of Android
Operating Systems is free to use which lying under the General Public License
version 2 (GPLv2). Because of this open-source code practices by Android and it
widely used, it exposes to numerous malicious threats. In Cisco 2014 Annual
Security report, they reported that the significantly rapidly growth of number of
Android’s users makes it becomes favorable target of malware attacks.
Computer security
Computer security can be perceived at two different perspectives:
The primarily concern about the security is the computer which is connected to
the network since most of the computers in this era are connected to the
network. Secure computing is achieving the goals of security in information
environment from threats; the goals are:
• Confidentiality,
• Integrity,
• Availability and
• Resilience.
Computer security
• Confidentiality is about retaining either personal data or organizational data.
• Integrity is preserving the system or the data from being altered or changed
illegally by non-authorized users.
• Remote File Inclusion (RFI) occurs when any type of user input is
remotely accepted without going through any proper validation and
sanitization by the server.
Distributed-Denial-of-Service (DDoS)
In auditing process, the system security objectives and its implementation are
screened and then verified. The security audits are responsible in evaluating the
vulnerabilities found in the systems and find alternatives to reduce the area of
vulnerabilities’ exposure. There are numerous number of popular tools used in
auditing security and one of them is:
• Lynis
Lynis is an Open Source Unix-based system tools aims in scanning security
aspect rather than scanning for vulnerabilities.
Installing Kali Linux
Kali Linux will be installed on the VMware virtual machine. VMware is a software
which allowed a virtual machine (which uses some CPUs, RAM and storage from
the main machine) to be operated like normal computer. That means there are two
operating system running simultaneously on a machine. Therefore, in this research
two operating system (Windows 10 host and Kali Linux virtual machine) will run at
the same time. Kali Linux virtual machine, in which it uses 4 CPU Cores, 2 GBytes of
RAM, and 60 GB of harddrive. The download page of Kali Linux website offered Kali
Linux 64 bit VMware VM, 32 bit VMware VM PAE, 64 bit and 32 bit Vbox.
Tools in Kali Linux
Kali Linux consists of hundreds of pre-built tools. The tools are divided into sections to its functionality and
utilities. Each section carries out different task but with same objective; to do penetration testing.