Hack Proofing Sun Solaris 8

( 1 )


The only way to stop a hacker is to think like one!

Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against ...

See more details below
BN.com price
(Save 11%)$66.95 List Price
Other sellers (Paperback)
  • All (8) from $1.99   
  • New (4) from $35.07   
  • Used (4) from $1.99   
Sending request ...


The only way to stop a hacker is to think like one!

Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers?

Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.

The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network
Teaches strategy and techniques using forensic-based analysis
Up to the minute Web-based support with solutions@syngress.com

Sun Microsystems has spent a great deal of effort in designing Solaris to be both stable and secure. This book is a definitive reference guide for not only securing a Solaris systems, but also for securing the environment in which they operate.

Read More Show Less

Product Details

  • ISBN-13: 9781928994442
  • Publisher: Elsevier Science
  • Publication date: 11/30/2001
  • Pages: 436
  • Product dimensions: 7.00 (w) x 10.00 (h) x 0.89 (d)

Table of Contents

Foreword xxi
Chapter 1 Introducing Solaris Security: Evaluating Your Risk 1
Introduction 2
Exposing Default Solaris Security Levels 2
Altering Default Permissions 2
Making Services Available after Installation 4
Working with Default Environmental Settings 7
Evaluating Current Solaris Security Configurations 9
Evaluating Network Services 9
Evaluating Network Processes 11
Monitoring Solaris Systems 14
Using the sdtprocess and sdtperfmeter Applications 14
Monitoring Solaris Logfiles 16
Testing Security 18
Testing Passwords 18
Testing File Permissions 20
Securing against Physical Inspections 21
Securing OpenBoot 21
Documenting Security Procedures and Configurations 22
Documenting Security Procedures 22
Documenting System Configurations 24
Chapter 2 Securing Solaris with the Bundled Security Tools 33
Introduction 34
The Orange Book 35
Choosing Solaris 8 C2 Security 38
Configuring Auditing 40
Managing the Audit Log 42
Understanding Auditing Classifications 43
Configuring Auditing 44
Extracting and Analyzing Auditing Data 45
Choosing Trusted Solaris 8 47
Using Trusted Solaris 8's B1-Level Security 48
Understanding the Concept of Mandatory Access Control 50
Administrative Labels 53
Auditing and Analyzing Trusted Solaris 8 54
Solaris 8 Security Enhancements 55
Using SunScreen Secure Net 55
Utilizing SunScreen SKIP 56
Using the Solaris Security Toolkit Working with the Solaris Security 58
Using OpenSSH 59
Chapter 3 Securing Solaris with Freeware Security Tools 67
Introduction 68
Detecting Vulnerabilities with Portscanning 71
Advanced Portscanning 76
Discovering Unauthorized Systems Using IP Scanning 77
Using the arp Command on Solaris 79
Detecting Unusual Traffic with Network Traffic Monitoring 81
Using Snoop 82
Using Snort 83
Using a Dedicated Sniffer 86
Using Sudo 88
Chapter 4 Securing Your Users 99
Introduction 100
Creating Secure Group Memberships 101
Role-Based Access Control 103
Understanding Solaris User Authentication 104
Authenticating Users with NIS and NIS+ 107
Authenticating Users with Kerberos 109
Authenticating Users with the Pluggable Authentication Modules 115
Chapter 5 Securing Your Files 127
Introduction 128
Establishing Permissions and Ownership 129
Access Control Lists 132
Role-Based Access Control 135
Changing Default Settings 138
Using NFS 142
Locking Down FTP Services 145
Using Samba 147
Monitoring and Auditing File Systems 151
Chapter 6 Securing Your Network 159
Introduction 160
Configuring Solaris as a DHCP Server 160
Using the dhcpmgr GUI Configuration Tool 161
Using the dhcpconfig Command-Line Tool 170
Securing DNS Services on Solaris 173
Using BIND 174
Configuring Solaris to Provide Anonymous FTP Services 181
Using X-Server Services Securely 182
Using Host-Based Authentication 183
Using User-Based Authentication 183
Using X-Windows Securely with SSH 186
Using Remote Commands 187
Using Built-In Remote Access Methods 187
Using SSH for Remote Access Enabling Password Free Logins with 189
Chapter 7 Providing Secure Web and Mail Services 199
Introduction 200
Configuring the Security Features of an Apache Web Server 201
Limiting CGI Threats 203
Using Virtual Hosts 206
Monitoring Web Page Usage and Activity 206
Configuring the Security Features of Sendmail 209
Stopping the Relay-Host Threat 213
Tracking Attachments 215
Chapter 8 Configuring Solaris as a Secure Router and Firewall 223
Introduction 224
Configuring Solaris as a Secure Router 224
Reasoning and Rationale 225
Routing Conditions 225
Configuring for Routing 229
Security Optimization 233
Security Implications 233
Unconfiguring Solaris Routing 236
Routing IP Version 6 237
Configuration Files 238
IPv6 Programs 242
IPv6 Router Procedure 245
Stopping IPv6 Routing 246
IP Version 6 Hosts 247
Automatic Configuration 247
Manual Configuration 248
Configuring Solaris as a Secure Gateway 250
Configuring Solaris as a Firewall 250
General Firewall Theory 251
General Firewall Design 252
SunScreen Lite 253
IP Filter 254
Using NAT 254
Guarding Internet Access with Snort 255
Snort Configuration File 256
Snort Log Analysis 257
Chapter 9 Using Squid on Solaris 265
Introduction 266
The Default Settings of a Squid Installation 266
Configuring Squid 266
The http_port Tag 267
The cache_dir Tag 267
Access Control Lists 269
Configuring SNMP 271
Configuring the cachemgr.cgi Utility 272
New in Squid 2.4--Help for IE Users! 274
Configuring Access to Squid Services 274
The Basics of Basic-Auth 274
Access Control for Users 275
Access Control Lifetime 276
Configuring Proxy Clients 277
Excluding Access to Restricted Web Sites 281
Filtering Content by URL 281
Filtering by Destination Domain 282
Filtering by MIME Type 282
Filtering by Content-Length Header 283
Chapter 10 Dissecting Hacks 287
Introduction 288
Securing against Denial of Service Hacks 288
Ping of Death 289
Syn Flood 290
E-Mail Flood 294
Securing against Buffer Overflow Hacks 295
Buffer Overflow against a Web Server 302
Buffer Overflow against an FTP Server 305
Securing against Brute Force Hacks 306
Defending against Password Crackers 308
Securing against Trojan Horse Hacks 309
Defending against Rootkits 309
Defusing Logic Bombs 311
Defending against PATH and Command Substitution 313
Securing against IP Spoofing 314
Securing Your rhosts File 316
MAC Address Spoofing 316
Chapter 11 Detecting and Denying Hacks 325
Introduction 326
Monitoring for Hacker Activity 326
Using Tripwire 326
Using Shell Scripts to Alert Systems Administrators 335
What to Do Once You've Detected a Hack 340
What's a Honeypot? 340
Monitoring Solaris Log Files 346
Solaris Log Files to Review 347
Creating Daily Reports 350
A State-of-the-System Report 350
Hack Proofing Sun Solaris 8 Fast Track 361
Index 381
Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted August 5, 2002

    A very nice collection of several approaches you can take to secure your Solaris system

    This book starts with an overview of several security risks associated with any system that is 'connected'. The Solaris systems are typically secure enough for several uses. However, the authors slowly uncover several configurations that will make your Solaris system 'more' secure. One good thing about this book is that both bundled and externally available tools and utilities are discussed. Also, the security configurations are suggested based on the intended use of the Solaris system you are trying to secure. The sidenotes, checklists and summaries make the book more interesting to read. I strongly recommend this book to anyone who configures or about to configure a Solaris system.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)