Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Practical Linux Security Cookbook

You're reading from   Practical Linux Security Cookbook Secure your Linux machines and keep them secured with the help of exciting recipes

Arrow left icon
Product type Paperback
Published in Apr 2016
Publisher Packt
ISBN-13 9781785286421
Length 276 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Michael A Lindner Michael A Lindner
Author Profile Icon Michael A Lindner
Michael A Lindner
 Kalsi Kalsi
Author Profile Icon Kalsi
Kalsi
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Practical Linux Security Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
1. Linux Security Problems FREE CHAPTER 2. Configuring a Secure and Optimized Kernel 3. Local Filesystem Security 4. Local Authentication in Linux 5. Remote Authentication 6. Network Security 7. Security Tools 8. Linux Security Distros 9. Patching a Bash Vulnerability 10. Security Monitoring and Logging Index

Index

A

  • access control list (ACL)
    • implementing / Implementing access control list (ACL), How to do it…, There's more…
  • acct
    • used, for monitoring user activity / Monitoring user activity using acct, Getting started, How to do it?, How it works...
    • reference link / Getting started
  • Adepto / How to do it?

B

  • bandwidthd / How to do it...
  • bash vulnerability, through Shellshock
    • exploring / Understanding the bash vulnerability through Shellshock, How to do it…

C

  • Certificate Signing Request(CSR) / How to do it...
  • Change Mode (chmod) command
    • used, for changing file permissions / Changing the file permissions using the chmod command, How to do it…
  • Channel Connection (SSH) / How to do it…
  • checksum
    • used, for conducting integrity checks of installation medium / Conducting integrity checks of the installation medium using checksum, How to do it…, See also

D

  • Denial of Service (DoS) / Blocking spoofed addresses
  • Destination Unreachable ICMP packets / How to do it..., How it works...
  • Digital Evidence and Forensic Toolkit (DEFT)
    • about / DEFT – Digital Evidence and Forensic Toolkit
    • download link / Getting ready
    • using / How to do it..., How it works...
  • directory details
    • viewing, with ls command / Getting ready, How to do it…, How it works…
  • disengage Network Manager / How to do it...

E

  • eavesdropping
    • about / Eavesdropping
    • service vulnerabilities / Service vulnerabilities
    • Denial of Service (DoS) attack / Denial of Service (DoS) attack
  • EchoICMP packets / How it works...

F

  • file
    • handling, with move (mv) command / File handling using the mv command (moving and renaming), How it works…, There's more…
  • file details
    • viewing, with ls command / Getting ready, How to do it…, How it works…
  • file permissions
    • changing, with Change Mode (chmod) command / Changing the file permissions using the chmod command, How to do it…, There's more...
  • files
    • copying remotely / Copying files remotely, How to do it..., How it works...
  • firewall
    • configuring, IP tables used / Using Iptables to configure a firewall, How to do it...

G

  • Git tool / Getting ready
  • glance
    • used, for system monitoring / Using glances for system monitoring, How to do it…
  • GtkHash
    • about / See also
    • reference link / See also

H

  • Helix
    • about / Helix
    • reference link / Getting ready
    • using / How to do it?, How it works...
  • hosts
    • scanning, with Nmap / Scanning hosts with Nmap, How to do it…, How it works…
  • Host Unreachable ICMP packet / How to do it...

I

  • incoming traffic
    • blocking / Blocking incoming traffic, How to do it..., How it works...
  • integrity checks, of installation medium
    • conducting, checksum used / Conducting integrity checks of the installation medium using checksum, How to do it…
  • Intrusion Detection System (IDS) / Tripwire
  • Iptables / Getting Ready
  • IP tables
    • used, for configuring firewall / Using Iptables to configure a firewall, How to do it...

K

  • Kali 2.0
    • download link / Getting ready
  • Kali Linux
    • about / Kali Linux
    • using / How to do it..., How it works...
  • Kerberos server
    • setting up, Ubuntu used / Setting up a Kerberos server with Ubuntu, How to do it..., How it works...
  • kernel
    • using, requisites / Requirements for building and using a kernel
    • building, requisites / Requirements for building and using a kernel
    • configuring / Configuring and building a kernel, How to do it…, How it works…
    • building / Configuring and building a kernel, How to do it…, How it works…
    • installing / Installing and booting from a kernel, How to do it…, How it works…
    • booting from / Installing and booting from a kernel, How to do it…, How it works…
    • debugging / Testing and debugging a kernel
    • testing / Testing and debugging a kernel
  • kernel, on boot
    • debugging / Debugging a kernel on boot, How to do it…
  • kernel source
    • about / Retrieving a kernel source
    • retrieving / Retrieving a kernel source, How to do it…, How it works…
  • key-based authentication into SSH
    • used, for restricting remote access / Restricting remote access with key-based login into SSH, How to do it...

L

  • LDAP server
    • installing, on Ubuntu / Install and configure a basic LDAP server on Ubuntu, How to do it…, How it works…
    • configuring, on Ubuntu / Install and configure a basic LDAP server on Ubuntu, How to do it…
  • Linux
    • security policy / The security policy of Linux
    • patches, applying on / Applying patches on the Linux systems
  • Linux kernel
    • URL / How to do it…
    • download, URL / How to do it…
  • Linux Unified Key Setup (LUKS) disk encryption
    • about / Using the LUKS disk encryption
    • functionalities / Using the LUKS disk encryption
    • using / How to do it…, How it works…
  • Logcheck
    • used, for viewing log files / Viewing and managing log files using Logcheck, How to do it…, How it works…
    • used, for managing log files / Viewing and managing log files using Logcheck, How to do it…, How it works…
    • about / Viewing and managing log files using Logcheck
  • log files
    • viewing, Logcheck used / Viewing and managing log files using Logcheck, How to do it…, How it works…
    • managing, Logcheck used / Viewing and managing log files using Logcheck, How to do it…, How it works…
  • login authentication
    • PAM, using / Login authentication using a USB device and PAM, How to do it…, There's more...
    • USB device, using / Login authentication using a USB device and PAM, How to do it…, How it works..., There's more...
  • login capabilities, of users
    • limiting / Limiting the login capabilities of users, How to do it..., How it works...
  • Logs
    • monitoring, with MultiTail / Monitoring logs using MultiTail, How to do it…, How it works…
  • ls command
    • used, for viewing file details / Viewing file and directory details using the ls command, How to do it…, How it works…
    • used, for viewing directory details / Viewing file and directory details using the ls command, How to do it…, How it works…
  • lsof command
    • using / Using system tools – lsof, How to do it…, How it works
    • about / Using system tools – lsof
  • Lubuntu / DEFT – Digital Evidence and Forensic Toolkit
  • Lynis
    • using / Using Lynis, How to do it…, How it works
    • about / Using Lynis
    • download link / Getting ready

M

  • Metasploitable
    • about / Gaining a root on a vulnerable Linux system
    • reference link / Getting ready
  • move (mv) command
    • used, for file handling / File handling using the mv command (moving and renaming), How it works…, There's more…
  • MultiTail
    • used, for monitoring Logs / Monitoring logs using MultiTail, Getting ready, How to do it…, How it works…

N

  • Netcat
    • URL / There's more…
  • Netconsole
    • used, for console configuration for debugging / Configuring a console for debugging using Netconsole, Getting ready, How to do it…, There's more…
  • network
    • monitoring, Nmap used / Monitoring a network using Nmap, How to do it…, How it works…
  • Network Security Toolkit (NST)
    • about / NST – Network Security Toolkit
    • reference link / Getting ready
    • using / How to do it..., How it works...
  • Nmap
    • used, for scanning hosts / Scanning hosts with Nmap, How to do it…, How it works…
    • installation link / Getting ready
    • reference link / See also
    • used, for monitoring network / Monitoring a network using Nmap, How to do it…, How it works…

O

  • Octal representation / There's more...
  • OpenSSH / How to do it…
  • OpenSSL Server
    • about / OpenSSL Server
    • using / Getting Ready, How to do it..., How it works...

P

  • PAM
    • used, for login authentication / Login authentication using a USB device and PAM, How to do it…, How it works..., There's more...
  • password protection
    • configuring / Configuring password protection, How to do it…
    • creation policy / How to do it…
    • policy, steps / How to do it…
    • change policy / How to do it…
  • patches
    • applying, on Linux system / Applying patches on the Linux systems, How to do it..., How it works...
  • patch management system
    • about / The patch management system, How to do it…, How it works…
  • pfSense
    • about / pfSense
    • download link / Getting ready
    • using / How to do it..., How it works...
  • Port Sentry
    • about / PortSentry
    • usage, implementing / Getting Ready, How to do it?, How it works...

R

  • remote access
    • restricting, with key-based authentication into SSH / Restricting remote access with key-based login into SSH, How to do it...
  • remote server/host access
    • gaining, SSH used / Getting ready, How to do it…, How it works…
  • root account / Getting Ready

S

  • Secure File Transfer Protocol (SFTP) / How it works...
  • Secure Sockets Layer(SSL) / OpenSSL Server
  • security controls
    • about / Security controls
  • security issues, Shellshock
    • exploiting, through SSH / Shellshock's security issues, How to do it…, How it works…
  • security policy, Linux
    • about / The security policy of Linux
    • developing / Developing a security policy
  • server security
    • configuring / Configuring server security, How to do it…, How it works…
    • general policy / How to do it…
    • configuration policy / How to do it…
    • monitoring policy / How to do it…
  • Set Group ID up on execution (SGID) / Linux sXID
  • Set owner User ID (SUID) / Linux sXID
  • Shorewall
    • about / Shorewall
    • using / Getting ready, How to do it...
    • working / How it works...
  • Software Development Cycle (SDC) / Testing and debugging a kernel
  • spoofed addresses
    • blocking / Blocking spoofed addresses, How to do it..., How it works...
  • Squid proxy
    • about / Using Squid proxy
    • using / Using Squid proxy, Getting Ready
    • installing / How to do it...
    • configuring / How to do it...
    • working / How it works...
  • SSH
    • used, for remote server/host access / Remote server/host access using SSH, How to do it…
  • SSH root login
    • enabling / Disabling or enabling SSH root login, Getting ready, How to do it…, How it works…
    • disabling / Disabling or enabling SSH root login, How to do it…, There's more…
  • stat command
    • using / Using system tools – stat, How to do it…, How it works
  • strace
    • about / Using system tools – strace
    • using / Getting ready, How to do it…, How it works
  • sudo access
    • configuring / Making use of sudoers – configuring sudo access, How to do it…, How it works…
  • sudoers
    • using / Making use of sudoers – configuring sudo access, How to do it…
    • vulnerability assessment / Vulnerability assessment
  • sXid
    • about / Linux sXID
    • using / Getting Ready, How to do it...
  • system monitoring
    • glance, using / Using glances for system monitoring, How to do it…
  • system tools
    • Whowatch, using / Using system tools – Whowatch
    • stat command, using / Using system tools – stat
    • strace / Using system tools – strace
    • Lynis / Using Lynis

T

  • TCP/IP network
    • managing / Managing the TCP/IP network, How to do it..., How it works...
  • TCP wrapper
    • configuring / Configuring and using the TCP Wrapper, How to do it?, How it works...
    • using / Configuring and using the TCP Wrapper, Getting Ready, How to do it?, How it works...
  • Time Exceeded ICMP packets / How to do it..., How it works...
  • Transport Layer Security(TLS) / OpenSSL Server
  • Tripwire
    • about / Tripwire
    • installing / How to do it...
    • configuring / How to do it...

U

  • Ubuntu
    • LDAP server, installing / Install and configure a basic LDAP server on Ubuntu, How to do it…, How it works…
    • LDAP server, configuring / Install and configure a basic LDAP server on Ubuntu, How to do it…, How it works…
    • installation link / Getting ready
    • used, for setting up Kerberos server / Setting up a Kerberos server with Ubuntu, How to do it...
  • UbuntuHashes
    • reference link / How to do it…
  • USB boot media
    • creating / Creating a USB boot media, How it works…
  • USB device
    • used, for login authentication / Login authentication using a USB device and PAM, How to do it…, How it works..., There's more...
  • user activity
    • monitoring, acct used / Monitoring user activity using acct, Getting started, How to do it?, How it works...
  • user authorization controls
    • defining / Defining user authorization controls, How to do it..., How it works...
  • users
    • authentication / User authentication and logging, How to do it..., How it works...
    • logging / User authentication and logging, How to do it..., How it works...
    • login capabilities, limiting / Limiting the login capabilities of users, How to do it..., How it works...

V

  • vulnerable Linux system
    • root, gaining / Gaining a root on a vulnerable Linux system, How to do it…, How it works
    • common exploits and attacks / There's more…
    • null passwords / Null or default passwords
    • default passwords / Null or default passwords
    • IP spoofing / IP spoofing
    • eavesdropping / Eavesdropping

W

  • Whowatch
    • about / Using system tools – Whowatch
    • using / Using system tools – Whowatch, How to do it…, How it works
lock icon The rest of the chapter is locked
arrow left Previous Section
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime
Visually different images