Cargando…

Linux Server security : hack and defend /

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along wit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Binnie, Chris (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, 2016.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Introduction
  • How This Book Is Organized
  • Who Should Read This Book
  • Summary
  • Chapter 1: Invisibility Cloak
  • Background
  • Installing knockd
  • Some Config Options
  • Testing Your Install
  • Making Your Server Invisible
  • Further Considerations
  • Summary
  • Chapter 2: Digitally Fingerprint Your Files
  • Filesystem Integrity
  • Whole Filesystem
  • Rootkits
  • Configuration
  • False Positives
  • Well Designed
  • Summary
  • Chapter 3: Twenty-First-Century Netcat
  • History
  • Installation Packages
  • Transferring Files
  • Chaining Commands Together
  • Secure Communications
  • Executables
  • Access Control Lists
  • Miscellaneous Options
  • Summary
  • Chapter 4: Denying Service
  • NTP Infrastructure
  • NTP Reflection Attacks
  • Attack Reporting
  • Preventing SNMP Reflection
  • DNS Resolvers
  • Complicity
  • Bringing a Nation to Its Knees
  • Mapping Attacks
  • Summary
  • Chapter 5: Nping
  • Functionality
  • TCP
  • Interpreter
  • UDP
  • ICMP
  • ARP
  • Payload Options
  • Echo Mode
  • Other Nping Options
  • Summary
  • Chapter 6: Logging Reconnoiters
  • ICMP Misconceptions
  • tcpdump
  • Iptables
  • Multipart Rules
  • Log Everything for Forensic Analysis
  • Hardening
  • Summary
  • Chapter 7: Nmap's Prodigious NSE
  • Basic Port Scanning
  • The Nmap Scripting Engine
  • Timing Templates
  • Categorizing Scripts
  • Contributing Factors
  • Security Holes
  • Authentication Checks
  • Discovery
  • Updating Scripts
  • Script Type
  • Regular Expressions
  • Graphical User Interfaces
  • Zenmap
  • Summary
  • Chapter 8: Malware Detection
  • Getting Started
  • Configuration
  • Summary
  • Chapter 9: Password Cracking with Hashcat
  • History
  • Understanding Passwords
  • Using Hashcat
  • Running Hashcat
  • oclHashcat
  • Hashcat-Utils
  • Summary
  • Chapter 10: SQL Injection Attacks
  • History
  • Basic SQLi
  • Mitigating SQLi in PHP
  • Exploiting SQL Flaws.
  • Launching an Attack
  • Trying SQLi Legally
  • Summary
  • End User License Agreement.