Hardening Linux
Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the first place.
1006209398
Hardening Linux
Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the first place.
49.0 In Stock
Hardening Linux

Hardening Linux

Hardening Linux

Hardening Linux

Paperback

$49.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the first place.

Product Details

ISBN-13: 9780072254976
Publisher: McGraw-Hill/Osborne Media
Publication date: 07/29/2004
Series: Hardening
Pages: 404
Product dimensions: 7.51(w) x 9.25(h) x 0.95(d)

Table of Contents

Foreword from David Wreskixxi
Foreword from Corey D. Schouxxiii
Introductionxxvii
Part IDo These Seven Things First
1Critical First Steps3
Examine Systems for Evidence of Compromise4
Terminate Unauthorized Users5
Identify and Shut Down Unauthorized Processes7
Check Log Files for Possible Evidence of Intrusion Attempts9
Check for Potential System File Damage10
Check System Stability and Availability11
Validate Hardware Operation12
Make Sure Power Is Stable12
Part IITake It From The Top: The Systematic Hardening Process
2Hardening Network Access: Disable Unnecessary Services17
Step 1Take the Machine Off the Network18
Step 2Determine Required Services20
Red Hat Enterprise Linux AS 3.0 Services Baseline21
SLES8 Services Baseline21
Consider Additional Services22
Step 3Determine Services' Dependencies27
Step 4Prevent Services from Running32
Use Tools to Alter Startup Scripts33
Turn Off Unnecessary Services: Command Line Tool40
Step 5Reboot43
Step 6Check Configuration for Unnecessary Services44
Check Configuration: GUI44
Check Configuration: Manual44
Step 7Check Configuration for Necessary Services45
Check the Configuration45
Probe the Service45
Look for the Service in Memory45
Step 8Return the Machine to the Network46
Test Network Connectivity46
3Installing Firewalls and Filters47
Take Stock48
Check for Existing Firewall Rules48
Understand Network Basics55
Understand Firewall Rules57
Identify Protective Firewall Needs60
Protective Strategy60
Configure the Firewall61
4Hardening Software Accessibility79
Identify Required Software80
Determine Software Dependencies86
Remove or Restrict Unneeded Software89
Install Software Securely90
Install Trusted Software from Vendors91
Install Software from Trusted Sources94
Monitor Your Systems102
5Preparing for Disaster105
Understanding Disaster Recovery106
Do Not Build a Custom Kernel106
Document Server Setup and Record Changes107
Prepare Automated Reinstallation107
Prepare Red Hat Kickstart Install Facility109
Using SUSE YaST Auto-installation Tools114
6Hardening Access Controls129
Linux File Permissions and Ownership130
Use POSIX Access Control Lists130
Review File and Directory Access Controls137
Verify the Sticky Bit for Temporary Directories138
Record SUID/SGID Files and Directories139
7Hardening Data Storage141
Understand Legal and Ethical Issues with Cryptography142
Comply with Legal Requirements142
Understand Ethical Issues143
Use Proper Procedures144
Store Data Securely145
Remove Plaintext Copies of Data146
Use GnuPG to Encrypt Files147
Creating Keys in a Secure Manner148
Creating Keys for Use with GnuPG149
Use OpenSSL for File Encryption159
Install and Use a Cryptographic File System161
8Hardening Authentication and User Identity169
Use Pluggable Authentication Modules (PAM) to Provide Flexible Authentication170
Use PAM Because...171
Enforce Strict Password Requirements171
Enable Wheel Group Access171
Enable the Use of a Centralized Authentication Server172
Correctly Configure PAM to Avoid Compromise172
Remove Obsolete PAM Configuration File172
Configuration File Format173
Backing Up the Configuration Before Making Changes174
Recovering from Catastrophic Errors175
PAM Framework175
Traditional Services176
A BSD-Like wheel Group178
Per-User Temporary Directories179
Require Strong Passwords179
Name Switching Service (NSS)183
9Restricted Execution Environments185
Restrict Functionality186
Use chroot to Protect a Service187
Understand What Is Protected...and What Isn't187
Build the chroot Directory Structure188
Resolve Dynamic Library Dependencies190
Determine File Dependencies192
Create Devices in the chroot Directory194
Establish Shells and User Environments195
Install the Service(s) to the chroot Directory198
Install from Source198
Install from a Source RPM199
Install a Binary RPM to an Alternate Location204
Configure the Service to Log Activity205
Troubleshoot chroot Environment Problems206
Combine chroot and Your Distribution's Security Capabilities207
pam_chroot and Red Hat Enterprise Linux AS 3.0207
Monitor File Mode and Permission Settings209
Maintain chroot210
10Hardening Communications211
Secure Protocols212
Use SSH213
Secure X Connections with SSH224
Use Virtual Private Networks225
IPSec228
Set Up a VPN with FreeS/WAN229
Verify the Connection234
Part IIIOnce Is Never Enough!
11Install Network Monitoring Software239
Install a Network Analyzer241
Install and Use ngrep to Monitor the Network241
Install and Use tcpdump245
Install Ethereal252
Utilize a Network Intrusion Detection System255
Install and Use Snort256
Use Snort in Sniffing Mode256
Use Snort in Packet Capture Mode258
Use Snort in NIDS Mode261
Use Snort Add-ons265
Honeypots/Honeynets265
Other Tools266
12Automatic Logfile Scanning267
Logfiles at a Personal Level268
Create a Logfile Policy270
Configure the syslog Daemon271
The Selector Component271
The Activity Component273
Set Up a Centralized Server275
Ensure Centralized Logging Dependencies Are Met275
Configure the Centralized Server275
Configure Clients for the Centralized Server276
Create a Centralized Server with syslog-ng and stunnel277
SUSE: Download and Install stunnel 4.04277
Download and Install syslog-ng277
Create Certificates for Your Machines278
Copy Certificates to /etc/stunnel279
Check Certificate Permissions279
Create stunnel Configuration on the Server279
Create stunnel Configuration on the Client280
Create syslog-ng Configuration on the Server280
Create syslog-ng Configuration File on the Client Machines280
Start stunnel and syslog-ng Manually281
Check for Activity on the Server281
Use the logger Command to Send Messages Directly to the syslog Daemon283
Use Perl's Sys:Syslog to Send Messages to the syslog Daemon284
Manage Logfiles284
Finding Logfiles285
Other System Logfiles285
Search Logfiles286
Strategy for Searching Logfiles286
Searching Logfiles Manually287
Search Logfiles with logwatch288
Search Logfiles with logsurfer289
Search Logfiles with swatch291
Modify swatch Configuration to Detect an Attack on the SSH Daemon293
Respond to Attacks and Abnormalities294
13Patch Management and Monitoring295
Apply Updates296
Update and Patch SUSE Software296
Update and Patch Red Hat Software303
Use a Central Patch Server318
Patch Monitoring and Management319
Create a Change Process320
Monitor the Patch Process321
14Self-Monitoring Tools323
Install and Run a Host-Based Intrusion Detection System324
Install and Use Tripwire324
Use RPM for File Integrity Checking335
Other Tools336
Install and Run a Password Checker336
Use John the Ripper to Audit Passwords337
Set Up Network Monitoring340
Configure and Run Nmap340
Configure and Run Nessus344
Part IVHow to Succeed at Hardening Linux
15Budget Acquisition and Corporate Commitment to Security355
Obtain Management Support356
Show the Need for the Security Program356
Perform a Risk Assessment357
Determine Scope358
Select the Team358
Gather Issues and Determine Impact and Probability359
Prioritize Risks361
Quantitative Risk Assessment Overview362
Report to Management and Obtain Guidance363
Executive Summary364
Determine Return on Investment (ROI)365
Perform Fact Finding365
Show Return on Investment369
Seek Outside Help and References369
Involve Management in Creation of Security Policies and Spending372
16Establishing a Security Campaign373
Establish the Security Campaign374
Determine Goals374
Identify What Is Needed to Accomplish Goals375
Create Policies376
Example Company Encrypted Protocols Policy381
Gain User Acceptance and Support382
Evaluate Program385
Maintain the Program385
AAdditional Linux Security Resources387
General Linux388
General Security388
General Linux Security388
Linux Security Programs389
Index391
From the B&N Reads Blog

Customer Reviews