Linux Server security : hack and defend /
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along wit...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Wiley,
2016.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Introduction
- How This Book Is Organized
- Who Should Read This Book
- Summary
- Chapter 1: Invisibility Cloak
- Background
- Installing knockd
- Some Config Options
- Testing Your Install
- Making Your Server Invisible
- Further Considerations
- Summary
- Chapter 2: Digitally Fingerprint Your Files
- Filesystem Integrity
- Whole Filesystem
- Rootkits
- Configuration
- False Positives
- Well Designed
- Summary
- Chapter 3: Twenty-First-Century Netcat
- History
- Installation Packages
- Transferring Files
- Chaining Commands Together
- Secure Communications
- Executables
- Access Control Lists
- Miscellaneous Options
- Summary
- Chapter 4: Denying Service
- NTP Infrastructure
- NTP Reflection Attacks
- Attack Reporting
- Preventing SNMP Reflection
- DNS Resolvers
- Complicity
- Bringing a Nation to Its Knees
- Mapping Attacks
- Summary
- Chapter 5: Nping
- Functionality
- TCP
- Interpreter
- UDP
- ICMP
- ARP
- Payload Options
- Echo Mode
- Other Nping Options
- Summary
- Chapter 6: Logging Reconnoiters
- ICMP Misconceptions
- tcpdump
- Iptables
- Multipart Rules
- Log Everything for Forensic Analysis
- Hardening
- Summary
- Chapter 7: Nmap's Prodigious NSE
- Basic Port Scanning
- The Nmap Scripting Engine
- Timing Templates
- Categorizing Scripts
- Contributing Factors
- Security Holes
- Authentication Checks
- Discovery
- Updating Scripts
- Script Type
- Regular Expressions
- Graphical User Interfaces
- Zenmap
- Summary
- Chapter 8: Malware Detection
- Getting Started
- Configuration
- Summary
- Chapter 9: Password Cracking with Hashcat
- History
- Understanding Passwords
- Using Hashcat
- Running Hashcat
- oclHashcat
- Hashcat-Utils
- Summary
- Chapter 10: SQL Injection Attacks
- History
- Basic SQLi
- Mitigating SQLi in PHP
- Exploiting SQL Flaws.
- Launching an Attack
- Trying SQLi Legally
- Summary
- End User License Agreement.