Hack Proofing Linux: A Guide to Open Source Security

Hack Proofing Linux: A Guide to Open Source Security

Paperback(BK&CD-ROM)

$46.76 $51.95 Save 10% Current price is $46.76, Original price is $51.95. You Save 10%.

Product Details

ISBN-13: 9781928994343
Publisher: Elsevier Science
Publication date: 08/05/2001
Edition description: BK&CD-ROM
Pages: 512
Product dimensions: 7.40(w) x 9.22(h) x 1.45(d)

Table of Contents

Forewordxxvii
Chapter 1Introduction to Open Source Security1
Introduction2
Using the GNU General Public License3
Soft Skills: Coping with Open Source Quirks6
Should I Use an RPM or Tarballs?10
Obtaining Open Source Software12
A Brief Encryption Review16
Public Key and Trust Relationships19
Auditing Procedures31
Summary35
Solutions Fast Track35
Frequently Asked Questions38
Chapter 2Hardening the Operating System41
Introduction42
Updating the Operating System42
Handling Maintenance Issues43
Manually Disabling Unnecessary Services and Ports47
Locking Down Ports50
Hardening the System with Bastille55
Controlling and Auditing Root Access with Sudo77
Managing Your Log Files96
Using Logging Enhancers97
Summary103
Solutions Fast Track104
Frequently Asked Questions107
Chapter 3System Scanning and Probing109
Introduction110
Scanning for Viruses Using the AntiVir Antiviru Application110
Scanning Systems for DDoS Attack Software Using a Zombie Zapper123
Scanning System Ports Using the Gnome Service Scan Port Scanner129
Using Nmap133
Using NmapFE as a Graphical Front End146
Using Remote Nmap (Rnmap) as a Central Scanning Device147
Deploying Cheops to Monitor Your Network151
Deploying Nessus to Test Daemon Security165
Summary185
Solutions Fast Track185
Frequently Asked Questions189
Chapter 4Implementing an Intrusion Detection System191
Introduction192
Understanding IDS Strategies and Types194
Installing Tripwire to Detect File Changes on Your Operating System206
Updating Tripwire to Account for Legitimate Changes in the OS215
Configuring Tripwire to Inform You Concerning Changes217
Deploying PortSentry to Act as a Host-Based IDS220
Configuring PortSentry to Block Users222
Optimizing PortSentry to Sense Attack Types223
Installing and Configuring Snort229
Running Snort as a Network-Based IDS236
Configuring Snort to Log to a Database238
Identifying Snort Add-Ons251
Summary254
Solutions Fast Track254
Frequently Asked Questions258
Chapter 5Troubleshooting the Network with Sniffers261
Introduction262
Understanding Packet Analysis and TCP Handshakes264
Creating Filters Using Tcpdump268
Configuring Ethereal to Capture Network Packets279
Viewing Network Traffic between Hosts Using EtherApe288
Summary293
Solutions Fast Track294
Frequently Asked Questions296
Chapter 6Network Authentication and Encryption299
Introduction300
Understanding Network Authentication300
Creating Authentication and Encryption Solutions303
Implementing One-Time Passwords (OTP and OPIE)305
Implementing Kerberos Version 5319
Using kadmin and Creating Kerberos Client Passwords329
Establishing Kerberos Client Trust Relationships with kadmin337
Logging On to a Kerberos Host Daemon340
Summary345
Solutions Fast Track345
Frequently Asked Questions348
Chapter 7Avoiding Sniffing Attacks through Encryption353
Introduction354
Understanding Network Encryption354
Capturing and Analyzing Unencrypted Network Traffic355
Using OpenSSH to Encrypt Network Traffic between Two Hosts361
Installing OpenSSH364
Configuring SSH367
Implementing SSH to Secure Data Transmissions over an Insecure Network373
Capturing and Analyzing Encyrpted Network Traffic381
Summary385
Solutions Fast Track386
Frequently Asked Questions388
Chapter 8Creating Virtual Private Networks391
Introduction392
Secure Tunneling with VPNs392
Explaining the IP Security Architecture396
Creating a VPN by Using FreeS/WAN402
Summary439
Solutions Fast Track440
Frequently Asked Questions441
Chapter 9Implementing a Firewall with Ipchains and Iptables445
Introduction446
Understanding the Need for a Firewall447
Deploying IP Forwarding and Masquerading453
Configuring Your Firewall to Filter Network Packets458
Understanding Tables and Chains in a Linux Firewall461
Logging Packets at the Firewall471
Configuring a Firewall478
Counting Bandwidth Usage483
Using and Obtaining Automated Firewall Scripts and Graphical Firewall Utilities488
Summary500
Solutions Fast Track500
Frequently Asked Questions505
Chapter 10Deploying the Squid Web Proxy Cache Server507
Introduction508
Benefits of Proxy Server Implementation508
Differentiating between a Packet Filter and a Proxy Server512
Implementing the Squid Web Proxy Cache Server513
Configuring Proxy Clients529
Summary535
Solutions Fast Track536
Frequently Asked Questions538
Chapter 11Maintaining Firewalls543
Introduction544
Testing Firewalls544
Using Telnet, Ipchains, Netcat, and SendIP to Probe Your Firewall550
Understanding Firewall Logging, Blocking, and Alert Options563
Obtaining Additional Firewall Logging Tools590
Summary593
Solutions Fast Track593
Frequently Asked Questions597
Appendix ABastille Log599
Appendix BHack Proofing Linux Fast Track605
Index637

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews