Check nearby libraries
Buy this book
Credited as Contributors
-
Production Manager: Katie Wisor
-
Manager of Content Development and Assembly: Mary Beth Wakefield
-
Professional Technology & Strategy Director: Barry Pruett
-
Business Manager: Amy Knies
-
Executive Editor: Jim Minatel
- Project Coordinator, Cover: Brent Savage
Check nearby libraries
Buy this book
Subjects
Linux (computer operating system), Computer networks, security measures, Client/server computing, Web servers, Computer security, Qa76.9.a25, 005.8, knockd, Rootkits (Computer software), filesystem integrity, Netcat, ncat, Denial of service attacks, NTP, SNMP, DNS, reflection attack, Nping, Iptables, tcpdump, logging, Nmap Scripting Engine, Malware (computer software), Linux Malware Detect (LMD), Passwords, Cracking, Hashcat, SQL Injections| Edition | Availability |
|---|---|
|
1
Linux Server Security: Hack and Defend
2016, Wiley & Sons, Limited, John
in English
1119283094 9781119283096
|
zzzz
|
| 2 |
zzzz
|
|
3
Linux Server Security: Hack and Defend
2016, Wiley & Sons, Incorporated, John
in English
1119277671 9781119277675
|
zzzz
|
|
4
Linux Server Security: Hack and Defend
2016, John Wiley & Sons, Inc.
ebook (PDF)
in English
1119277647 9781119277644
|
aaaa
|
Book Details
Table of Contents
Preface. xiii
Introduction. xv
Chapter 1: Invisibility Cloak. 1
Background. 1
Probing Ports. 1
Confusing a Port Scanner. 2
Installing knockd. 2
Packages. 3
Changing Default Settings. 3
Altering Filesystem Locations. 4
Some Config Options. 5
Starting the Service. 5
Changing the Default Network Interface. 5
Packet Types and Timing. 5
Testing Your Install. 6
Port Knocking Clients. 7
Making Your Server Invisible. 7
Testing Your iptables. 8
Saving iptables Rules. 9
Further Considerations. 10
Smartphone Client. 10
Troubleshooting. 10
Security Considerations. 10
Ephemeral Sequences. 11
Summary. 12
Chapter 2: Digitally Fingerprint Your Files. 13
Filesystem Integrity. 13
Whole Filesystem. 16
Rootkits. 17
Configuration. 19
False Positives. 21
Well Designed. 22
Summary. 23
Chapter 3: Twenty-First-Century Netcat. 25
History. 25
Installation Packages. 27
Getting Started. 27
Transferring Files. 29
Chatting Example. 30
Chaining Commands Together. 30
Secure Communications. 31
Executables. 33
Access Control Lists. 34
Miscellaneous Options. 34
Summary. 35
Chapter 4: Denying Service. 37
NTP Infrastructure. 37
NTP Reflection Attacks. 38
Attack Reporting. 40
Preventing SNMP Reflection. 41
DNS Resolvers. 42
Complicity. 43
Bringing a Nation to Its Knees. 44
Mapping Attacks. 45
Summary. 46
Chapter 5: Nping. 49
Functionality. 49
TCP. 50
Interpreter. 51
UDP. 52
ICMP. 52
ARP. 53
Payload Options. 53
Echo Mode. 54
Other Nping Options. 57
Summary. 58
Chapter 6: Logging Reconnoiters. 59
ICMP Misconceptions. 59
tcpdump. 60
Iptables. 61
Multipart Rules. 64
Log Everything for Forensic Analysis. 64
Hardening. 65
Summary. 67
Chapter 7: Nmap’s Prodigious NSE. 69
Basic Port Scanning. 69
The Nmap Scripting Engine. 71
Timing Templates. 73
Categorizing Scripts. 74
Contributing Factors. 75
Security Holes. 75
Authentication Checks. 77
Discovery. 78
Updating Scripts. 79
Script Type. 80
Regular Expressions. 80
Graphical User Interfaces. 81
Zenmap. 81
Summary. 82
Chapter 8: Malware Detection. 85
Getting Started. 85
Definition Update Frequency. 85
Malware Hash Registry. 86
Prevalent Threats. 86
LMD Features. 86
Monitoring Filesystems. 88
Installation. 88
Monitoring Modes. 90
Configuration. 91
Exclusions. 91
Running from the CLI. 92
Reporting. 92
Quarantining and Cleaning. 93
Updating LMD. 94
Scanning and Stopping Scans. 94
Cron Job. 96
Reporting Malware. 96
Apache Integration. 96
Summary. 97
Chapter 9: Password Cracking with Hashcat. 99
History. 99
Understanding Passwords. 99
Keyspace. 100
Hashes. 101
Using Hashcat. 103
Hashcat Capabilities. 103
Installation. 103
Hash Identification. 104
Choosing Attack Mode. 106
Downloading a Wordlist. 106
Rainbow Tables. 107
Running Hashcat. 107
oclHashcat. 110
Hashcat-Utils. 111
Summary. 111
Chapter 10: SQL Injection Attacks. 113
History. 113
Basic SQLi. 114
Mitigating SQLi in PHP. 115
Exploiting SQL Flaws. 117
Launching an Attack. 118
Trying SQLi Legally. 120
Summary. 121
Index. 123
Edition Notes
Contributors
The Physical Object
Edition Identifiers
Work Identifiers
Source records
Community Reviews (1)
Pace 1
Medium paced
100%
Difficulty 1
Layman
50%
Beginner
50%
Breadth 1
Introductory
50%
Shallow
50%
Genres 1
Reference
33%
Nonfiction
33%
Technical
33%
Impressions 1
Unremarkable
100%
Length 1
Medium
100%
Credibility 1
Outdated
100%
Features 1
Index
33%
Chapters
33%
Table of contents
33%
Style 1
Technical
100%
Purpose 1
How-to
100%
| September 11, 2024 | Edited by Freso | add information based on my own copy |
| December 20, 2023 | Edited by ImportBot | import existing book |
| October 5, 2021 | Edited by ImportBot | import existing book |
| September 18, 2021 | Edited by ImportBot | import existing book |
| April 5, 2019 | Created by ImportBot | import new book |
