Linux Server Security: Hack and Defend

Author : Chris Binnie
Price : Rs 599.00
ISBN 13 : 9788126563227
ISBN 10 : 8126563222
Pages : 144
Type : Paperbound

9788126563227

Details

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them).

 

Preface

Introduction

 

Chapter 1: Invisibility Cloak

  • Background
  • Probing Ports
  • Confusing a Port Scanner
  • Installing knockd
  • Packages
  • Changing Default Settings
  • Altering Filesystem Locations
  • Some Config Options
  • Starting the Service
  • Changing the Default Network Interface
  • Packet Types and Timing
  • Testing Your Install
  • Port Knocking Clients
  • Making Your Server Invisible
  • Testing Your iptables
  • Saving iptables Rules
  • Further Considerations
  • Smartphone Client
  • Troubleshooting
  • Security Considerations
  • Ephemeral Sequences
  • Summary

 

Chapter 2: Digitally Fingerprint Your Files

  • Filesystem Integrity
  • Whole Filesystem
  • Rootkits
  • Configuration
  • False Positives
  • Well Designed
  • Summary

 

Chapter 3: Twenty-First-Century Netcat

  • History
  • Installation Packages
  • Getting Started
  • Transferring Files
  • Chatting Example
  • Chaining Commands Together
  • Secure Communications
  • Executables
  • Access Control Lists
  • Miscellaneous Options
  • Summary

 

Chapter 4: Denying Service

  • NTP Infrastructure
  • NTP Reflection Attacks
  • Attack Reporting
  • Preventing SNMP Reflection
  • DNS Resolvers
  • Complicity
  • Bringing a Nation to Its Knees
  • Mapping Attacks
  • Summary

 

Chapter 5: Nping

  • Functionality
  • TCP
  • Interpreter
  • UDP
  • ICMP
  • ARP
  • Payload Options
  • Echo Mode
  • Other Nping Options
  • Summary

 

Chapter 6: Logging Reconnoiters

  • ICMP Misconceptions
  • tcpdump
  • Iptables
  • Multipart Rules
  • Log Everything for Forensic Analysis
  • Hardening
  • Summary

 

Chapter 7: Nmap's Prodigious NSE

  • Basic Port Scanning
  • The Nmap Scripting Engine
  • Timing Templates
  • Categorizing Scripts
  • Contributing Factors
  • Security Holes
  • Authentication Checks
  • Discovery
  • Updating Scripts
  • Script Type
  • Regular Expressions
  • Graphical User Interfaces
  • Zenmap
  • Summary

 

Chapter 8: Malware Detection

  • Getting Started
  • Definition Update Frequency
  • Malware Hash Registry
  • Prevalent Threats
  • LMD Features
  • Monitoring Filesystems
  • Installation
  • Monitoring Modes
  • Configuration
  • Exclusions
  • Running from the CLI
  • Reporting
  • Quarantining and Cleaning
  • Updating LMD
  • Scanning and Stopping Scans
  • Cron Job
  • Reporting Malware
  • Apache Integration
  • Summary

 

Chapter 9: Password Cracking with Hashcat

  • History
  • Understanding Passwords
  • Keyspace
  • Hashes
  • Using Hashcat
  • Hashcat Capabilities
  • Installation
  • Hash Identification
  • Choosing Attack Mode
  • Downloading a Wordlist
  • Rainbow Tables
  • Running Hashcat
  • oclHashcat  
  • Hashcat-Utils
  • Summary

 

Chapter 10: SQL Injection Attacks

  • History
  • Basic SQLi
  • Mitigating SQLi in PHP
  • Exploiting SQL Flaws
  • Launching an Attack
  • Trying SQLi Legally

 

Summary

Index

Sysadmins, DevOps engineers, developers and other technical professionals that wish to improve their hands-on knowledge of securing what is now the most popular Operating System on the planet

 

Chris Binnie is a Technical Consultant who has worked online with Linux systems for almost two decades. During his travels he has deployed many servers in the Cloud and on banking and government server estates. As well as building an Autonomous System Network in 2005 and serving HD video to 77 countries via a media streaming platform, which he architected and built, he has written for Linux Magazine (including the cover article of the February 2016 issue) and Admin Magazine for several years.