𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Linux: Linux Security and Administration

✍ Scribed by Andy Vickler


Year
2021
Tongue
English
Leaves
109
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to determine the security of the server or network? If you answered yes to these questions, then you have come to the right place.

Linux is an operating system used by system administrators and hackers to manage the server or network's security. You can use the operating system to address business demands, including network administration, system administration, and database management. In this book, you will learn more about the different techniques to help you protect the system from a security breach and how you can protect the files and data you have on your system.

In this book, you will first learn about how you can use Linux on virtual machines. You will also learn about the different tools you can use to harden the network and server's security. You will learn about the different permissions and accesses and how you can use it to enhance the security of setting the security. You will also learn about how you can perform a penetration test, or an ethical hack, to scan the system and see what you can do to improve the settings.

Over the course of this book, you will discover how to:


  • Installing Linux on your system and accessing it using a virtual machine

  • Secure user accounts using passwords and ACLs

  • Secure the server using a firewall and other methods

  • Learn to decrypt and encrypt data sent over the network

  • Explore various methods to prevent hackers from accessing information in your system

  • Perform tests to identify any vulnerabilities in the network and server, and more!

If you are eager to learn more about Linux, grab a copy of this book today!

✦ Table of Contents


Introduction
Chapter One: Using Linux on Virtual Machines
Installing a Workstation Player
Choose the Correct Distro
Linux Distros
Setting Up the Virtual Machine
Customizing Virtual Hardware
Download and Install Tools
Installing Linux on VMware
Running Linux on a Virtual Machine
Installing a Linux Distro on a Windows Virtual Machine
Chapter Two: Securing User Accounts on Linux
Don’t Login Using a Root Account
Using Sudo Accounts
Reducing the Damage
Fine-Grained Permissions
Managing User Account Security
Adding New Users
Disable Root Login
Password Policies in Linux
Restrict SSH Access
Understanding Account Privileges
Manage Linux User Accounts
Reducing Privileges
Managing Passwords
Reduce the Use of Shared Accounts
Control Access to Accounts
Maintain Logs
Record and Manage Privileged Activity
Notify or Alert in Case of Suspicious Activity
Unify and Centralize
Chapter Three: Securing Servers Using Firewalls
Ports
Using the Firewall-cmd Interface
Bock Everything
Creating a Zone
Removing or Adding Services
Unblocking a Service
Removing and Adding Ports
Walls of Fire
Chapter Four: Securing Your Server
Updating Servers Regularly
Creating a Secondary User Account
Setting up SSH Keys
Checking and Configuring the Firewall
Limiting the Use of Open Ports
Setting Up Live Kernel Patches
Hardening the Kernel
Hardening User Space
Using Secure Boot
Setting Up Two-Factor Authentication
Step One
Step Two
Step Three
Step Four
Step Five
Turning Off Internet Protocols
Understanding the Applications/Tools before Installation
Removing Unnecessary Startup Processes
Reviewing Activities Regularly
Start Backing Up
Only Install the Things You Need
Use SELinux
Securing the Console Access
Restricting the Use of Old Passwords
Checking Listening Ports
Disabling Login through the Root
Change Ports
Disabling Shortcuts
Logging In Without Passwords
Use fail2ban
Creating a New Privileged Account
Uploading the SSH Key
Securing SSH
Creating a Firewall
Removing Unused Network Services
Chapter Five: Password Encryption Methods in Linux
Pretty Good Privacy (PGP) and Public-Key Cryptography
S/MIME, SSL and S-HTTP
S/MIME
SSL
S-HTTP
Linux IPSEC Implementation
Secure Telnet (stelnet) and Secure Shell (ssh)
Pluggable Authentication Modules or PAM
CIPE or Cryptographic IP Encapsulation
Using Shadow Passwords
John the Ripper and Crack
Chapter Six: Tools to Encrypt and Decrypt Password Protected Files
GNU Privacy Guard or GnuPG
Bcrypt
Ccrypt
4-Zip
Openssl
7-Zip
Nautilus Encryption Utility
Encryption
Decryption
Chapter Seven: Using Tools to Encrypt Files on Linux
Tomb
Cryptmount
CryFS
GnuPG
VeraCrypt
EncFS
7-zip
Dm-crypt
eCryptfs
Cryptsetup
Chapter Eight: Using Cryptsetup to Setup Encrypted Filesystems and Swap Space
Using a Drive, Loop Device, or Partition for Encryption
Testing the Encryption
Installing cryptsetup
Setting the Encrypted Partition
Testing Encryption
Adding Additional Layers of Security
Chapter Nine: Using Access Control Lists in Linux
Introduction to Access Control Lists (ACL)
Uses of ACL
List of Commands to Set Up ACLs
Adding Permissions to Users
Adding Permissions to Groups
Allowing Files and Directories to Inherit ACL Entries
Removing a Specific Entry in the ACL
Removing Entries in ACL
Modifying the ACL
Adding Permissions for Users
Adding Permissions to Groups
Allow Files or Directories to Inherit the ACL Entries
Viewing ACL
Removing ACL
Using Default ACLs
Chapter Ten: Downloading and Installing Kali Linux
Downloading Kali Linux
Hard Disk Installation
Booting Kali Linux for the First Time
Setting the Defaults
Initial Network Setup
Password
System Clock
Disk Partitioning
Configuring the Packet Manager
Installing the GRUB Loader
Completing the Installation
USB Drive Installation
Windows Non-Persistent Installation
Linux Persistent Installation
Chapter Eleven: The Penetration Testing Life Cycle
The Five Stages of the Penetration Testing Life Cycle
Stage 1: Reconnaissance
Stage 2: Scanning
Stage 3: Exploitation
Stage 4: Maintaining Access
Stage 5: Reporting
Chapter Twelve: Scanning
Network Traffic
Firewalls and Ports
PING
Traceroute
Nmap: The King of Scanners
Conclusion
References


πŸ“œ SIMILAR VOLUMES


Fedora Linux System Administration: Inst
✍ ALEX. CALLEJAS πŸ“‚ Library πŸ“… 2023 πŸ› Packt 🌐 English

Fedora Linux is a free and open-source platform designed for hardware, clouds, and containers that enables software developers and community members to create custom solutions for their customers. This book is a comprehensive guide focusing on workstation configuration for the modern system administ