Linux Server security : hack and defend /
Chris Binnie.
- 1 online resource
Introduction -- How This Book Is Organized -- Who Should Read This Book -- Summary -- Chapter 1: Invisibility Cloak -- Background -- Installing knockd -- Some Config Options -- Testing Your Install -- Making Your Server Invisible -- Further Considerations -- Summary -- Chapter 2: Digitally Fingerprint Your Files -- Filesystem Integrity -- Whole Filesystem -- Rootkits -- Configuration -- False Positives -- Well Designed -- Summary -- Chapter 3: Twenty-First-Century Netcat -- History -- Installation Packages -- Transferring Files -- Chaining Commands Together -- Secure Communications -- Executables -- Access Control Lists -- Miscellaneous Options -- Summary -- Chapter 4: Denying Service -- NTP Infrastructure -- NTP Reflection Attacks -- Attack Reporting -- Preventing SNMP Reflection -- DNS Resolvers -- Complicity -- Bringing a Nation to Its Knees -- Mapping Attacks -- Summary -- Chapter 5: Nping -- Functionality -- TCP -- Interpreter -- UDP -- ICMP -- ARP -- Payload Options -- Echo Mode -- Other Nping Options -- Summary -- Chapter 6: Logging Reconnoiters -- ICMP Misconceptions -- tcpdump -- Iptables -- Multipart Rules -- Log Everything for Forensic Analysis -- Hardening -- Summary -- Chapter 7: Nmap's Prodigious NSE -- Basic Port Scanning -- The Nmap Scripting Engine -- Timing Templates -- Categorizing Scripts -- Contributing Factors -- Security Holes -- Authentication Checks -- Discovery -- Updating Scripts -- Script Type -- Regular Expressions -- Graphical User Interfaces -- Zenmap -- Summary -- Chapter 8: Malware Detection -- Getting Started -- Configuration -- Summary -- Chapter 9: Password Cracking with Hashcat -- History -- Understanding Passwords -- Using Hashcat -- Running Hashcat -- oclHashcat -- Hashcat-Utils -- Summary -- Chapter 10: SQL Injection Attacks -- History -- Basic SQLi -- Mitigating SQLi in PHP -- Exploiting SQL Flaws. Launching an Attack -- Trying SQLi Legally -- Summary -- End User License Agreement.
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. -- from the publisher.