Mastering Linux Security: Step by Step Practical Guide
β Scribed by Musaab Hasan & Zayed Balbahaith
- Publisher
- Lambert Academic Publishing
- Year
- 2020
- Tongue
- English
- Leaves
- 125
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Linux is an open-source operating system that provides various utilities that help professionals to perform their tasks in an efficient and simple way. Linux has been known in the industry as one of the most stable operating systems. Linux OS provides a useful set of preinstalled utilities that allows the user to perform the required tasks easily, it also provides multiple applications and packages that can be installed to be used for different purposes. Using these utilities without limitations and restrictions would allow many of the breakthroughs that can be prevented by applying simple security standards. Securing a Linux machine is an important task and the security issue becomes one of the main priorities when dealing with the machine as a server. Security should be one of the first considerations at all stages of setting up a Linux computer. Securing a Linux machine is a primary responsibility and maintaining a secure environment becomes one of the main priorities when dealing with Log files. This book presents a detailed practical step by step guide to experiment and master Linux security-related tools.
β¦ Table of Contents
Chapter I: Getting Started With Linux OS ..................................................................................... 3
Chapter Objectives ....................................................................................................................................... 4
Needed Tools ............................................................................................................................................... 4
Chapter Overview......................................................................................................................................... 4
Basic Linux Commands ................................................................................................................................. 5
Creating and Removing Directories............................................................................................................ 12
Output Redirection..................................................................................................................................... 15
Manipulating Files ...................................................................................................................................... 18
Running and managing processes in the background ................................................................................ 25
Becoming a super-user............................................................................................................................... 28
Using ssh to connect to another machine.................................................................................................. 32
Using VirtualBox and Kali Linux .................................................................................................................. 34
Examining Further Linux Commands.......................................................................................................... 35
End of Chapter Conclusions & Recommendations ..................................................................................... 50
Chapter II: Exploring Various Security Tools ............................................................................... 52
Chapter Objectives ..................................................................................................................................... 53
Needed Tools ............................................................................................................................................. 53
Chapter Overview....................................................................................................................................... 53
Tasks & Procedures .................................................................................................................................... 54
Default File Permissions ............................................................................................................................. 55
Password files............................................................................................................................................. 57
Sudo ........................................................................................................................................................... 58
Installing Software Packages (RPM and YUM) ........................................................................................... 62
Console and Login Security ........................................................................................................................ 65
Wireshark ................................................................................................................................................... 71
End of Chapter Conclusions & Recommendations ..................................................................................... 75
Chapter III Digging Deeper into Linux ........................................................................................ 76
Chapter Objectives ..................................................................................................................................... 77
Needed Tools ............................................................................................................................................. 77
Chapter Overview....................................................................................................................................... 77
SUID and SGID ............................................................................................................................................ 78
SUID Vulnerability ...................................................................................................................................... 82
Firewall ....................................................................................................................................................... 85
Immutable Files .......................................................................................................................................... 87
Forwarding X with OpenSSH ...................................................................................................................... 89
Managing Files............................................................................................................................................ 91
Mounting the File System and NFS ............................................................................................................ 93
End of Chapter Conclusions & Recommendations ..................................................................................... 97
Chapter IV Advanced Linux Tools ............................................................................................... 98
Chapter Objectives ..................................................................................................................................... 99
Needed Tools ............................................................................................................................................. 99
Chapter Overview....................................................................................................................................... 99
Syslog Basics ............................................................................................................................................. 100
Fine Tuning the Defaults .......................................................................................................................... 103
Dmesg....................................................................................................................................................... 104
Log Rotation ............................................................................................................................................. 105
Apache HTTP or Tomcat ........................................................................................................................... 108
Listing Open Files...................................................................................................................................... 109
Cracking the system through boot loader ................................................................................................ 111
File Integrity Check with TripWire ............................................................................................................ 115
Syslog-ng .................................................................................................................................................. 115
End of Chapter Conclusions & Recommendations ................................................................................... 116
π SIMILAR VOLUMES
The subtitle says it all: Β«A Survival Guide for Linux SecurityΒ». This book is the result of an iterative process of consulting with experts in the field of computer and network security. The list of contributors includes staff at well-known organizations like the Computer Emergency Response Team (CE
<span>Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New
<span>Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New
<span>Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourselfβstep by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You pro