
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Learn how to attack and defend the world's most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction.
The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker's tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems.
- Master hacking tools and launch sophisticated attacks: perform SQL injections, deploy multiple server exploits and crack complex passwords.
- Defend systems and networks: make your servers invisible, be confident of your security with penetration testing and repel unwelcome attackers.
- Increase your background knowledge of attacks on systems and networks and improve all-important practical skills required to secure any Linux server.
The techniques presented apply to almost all Linux distributions including the many Debian and Red Hat derivatives and some other Unix-type systems. Further your career with this intriguing, deeply insightful, must-have technical book. Diverse, broadly-applicable and hands-on practical, Linux Server Security: Hack and Defend is an essential resource which will sit proudly on any techie's bookshelf.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1
Invisibility Cloak
Background
Probing Ports
https://nmap.org/book/man-port-scanning-basics.html.Confusing a Port Scanner
reject-with tcp-reset. This helps you to respond as if the port were unused and closed, and also not filtered.-j REJECT—reject-with tcp-reset reject-with tcp-reset option to other services.www.chiark.greenend.org.uk/∼peterb/network/drop-vs-reject.Installing knockd
Packages
# apt-get install knockd # yum install knockd /etc/knockd.conf. Take a look at Listing 1.1, which shows my main config file, to see how knockd works.Listing 1.1 The main config file. The port sequences and (importantly) -I INPUT have been altered from the defaults
[options] UseSyslog [openSSH] sequence = 6,1450,8156,22045,23501,24691 seq_timeout = 5 command = /sbin/iptables -I INPUT -s %IP% -p tcp—dport 22 -j ACCEPT tcpflags = syn [closeSSH] sequence = 3011,6145,7298 seq_timeout = 5 command = /sbin/iptables -D INPUT -s %IP% -p tcp—dport 22 -j ACCEPT tcpflags = syn Changing Default Settings
sequence option. After installing knockd, I immediately changed those ports from the defaults to avoid reducing the effectiveness of my server security. The defaults are ports 7000, 8000, and 9000 to open up SSH access and ports 9000, 8000, 7000 to close access. As you can see, I've added more ports to open up the access so someone will be less...Table of contents
- Cover
- Introduction
- Chapter 1: Invisibility Cloak
- Chapter 2: Digitally Fingerprint Your Files
- Chapter 3: Twenty-First-Century Netcat
- Chapter 4: Denying Service
- Chapter 5: Nping
- Chapter 6: Logging Reconnoiters
- Chapter 7: Nmap's Prodigious NSE
- Chapter 8: Malware Detection
- Chapter 9: Password Cracking with Hashcat
- Chapter 10: SQL Injection Attacks
- End User License Agreement