NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Linux Server security : hack and defend / Chris Binnie.

By: Material type: TextTextPublisher: Indianapolis, IN : Wiley, 2016Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781119283096
  • 1119283094
  • 9781119277644
  • 1119277647
  • 1119277671
  • 9781119277675
Subject(s): Additional physical formats: Print version:: Linux Server security.DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Introduction -- How This Book Is Organized -- Who Should Read This Book -- Summary -- Chapter 1: Invisibility Cloak -- Background -- Installing knockd -- Some Config Options -- Testing Your Install -- Making Your Server Invisible -- Further Considerations -- Summary -- Chapter 2: Digitally Fingerprint Your Files -- Filesystem Integrity -- Whole Filesystem -- Rootkits -- Configuration -- False Positives -- Well Designed -- Summary -- Chapter 3: Twenty-First-Century Netcat -- History -- Installation Packages -- Transferring Files -- Chaining Commands Together -- Secure Communications -- Executables -- Access Control Lists -- Miscellaneous Options -- Summary -- Chapter 4: Denying Service -- NTP Infrastructure -- NTP Reflection Attacks -- Attack Reporting -- Preventing SNMP Reflection -- DNS Resolvers -- Complicity -- Bringing a Nation to Its Knees -- Mapping Attacks -- Summary -- Chapter 5: Nping -- Functionality -- TCP -- Interpreter -- UDP -- ICMP -- ARP -- Payload Options -- Echo Mode -- Other Nping Options -- Summary -- Chapter 6: Logging Reconnoiters -- ICMP Misconceptions -- tcpdump -- Iptables -- Multipart Rules -- Log Everything for Forensic Analysis -- Hardening -- Summary -- Chapter 7: Nmap's Prodigious NSE -- Basic Port Scanning -- The Nmap Scripting Engine -- Timing Templates -- Categorizing Scripts -- Contributing Factors -- Security Holes -- Authentication Checks -- Discovery -- Updating Scripts -- Script Type -- Regular Expressions -- Graphical User Interfaces -- Zenmap -- Summary -- Chapter 8: Malware Detection -- Getting Started -- Configuration -- Summary -- Chapter 9: Password Cracking with Hashcat -- History -- Understanding Passwords -- Using Hashcat -- Running Hashcat -- oclHashcat -- Hashcat-Utils -- Summary -- Chapter 10: SQL Injection Attacks -- History -- Basic SQLi -- Mitigating SQLi in PHP -- Exploiting SQL Flaws.
Launching an Attack -- Trying SQLi Legally -- Summary -- End User License Agreement.
Summary: Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. -- from the publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Online resource; title from PDF title page (John Wiley, viewed May 11, 2016).

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. -- from the publisher.

Introduction -- How This Book Is Organized -- Who Should Read This Book -- Summary -- Chapter 1: Invisibility Cloak -- Background -- Installing knockd -- Some Config Options -- Testing Your Install -- Making Your Server Invisible -- Further Considerations -- Summary -- Chapter 2: Digitally Fingerprint Your Files -- Filesystem Integrity -- Whole Filesystem -- Rootkits -- Configuration -- False Positives -- Well Designed -- Summary -- Chapter 3: Twenty-First-Century Netcat -- History -- Installation Packages -- Transferring Files -- Chaining Commands Together -- Secure Communications -- Executables -- Access Control Lists -- Miscellaneous Options -- Summary -- Chapter 4: Denying Service -- NTP Infrastructure -- NTP Reflection Attacks -- Attack Reporting -- Preventing SNMP Reflection -- DNS Resolvers -- Complicity -- Bringing a Nation to Its Knees -- Mapping Attacks -- Summary -- Chapter 5: Nping -- Functionality -- TCP -- Interpreter -- UDP -- ICMP -- ARP -- Payload Options -- Echo Mode -- Other Nping Options -- Summary -- Chapter 6: Logging Reconnoiters -- ICMP Misconceptions -- tcpdump -- Iptables -- Multipart Rules -- Log Everything for Forensic Analysis -- Hardening -- Summary -- Chapter 7: Nmap's Prodigious NSE -- Basic Port Scanning -- The Nmap Scripting Engine -- Timing Templates -- Categorizing Scripts -- Contributing Factors -- Security Holes -- Authentication Checks -- Discovery -- Updating Scripts -- Script Type -- Regular Expressions -- Graphical User Interfaces -- Zenmap -- Summary -- Chapter 8: Malware Detection -- Getting Started -- Configuration -- Summary -- Chapter 9: Password Cracking with Hashcat -- History -- Understanding Passwords -- Using Hashcat -- Running Hashcat -- oclHashcat -- Hashcat-Utils -- Summary -- Chapter 10: SQL Injection Attacks -- History -- Basic SQLi -- Mitigating SQLi in PHP -- Exploiting SQL Flaws.

Launching an Attack -- Trying SQLi Legally -- Summary -- End User License Agreement.

John Wiley and Sons Wiley Online Library: Complete oBooks

There are no comments on this title.

to post a comment.
© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha