Click here to skip to this page's main content.

New Feature: You can now embed Open Library books on your website!   Learn More
Cover of: Hacking Linux exposed | Bri Hatch, James Lee

No ebook available.


Prefer the physical book? Check nearby libraries powered by WorldCat


Buy this book

Amazon
Better World Books $3.98 (used)

Links (leaves Open Library)

About the Book

Tighten holes and maintain security on your Linux system!
From one of the authors of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes a must-have security handbook for anyone running Linux. This cutting-edge volume shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them.

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions. . .

Learn how to think like a hacker in order to secure your Linux network In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is constantly being compromised. Linux has always been considered the digital playground for hackers. Many hacks, exploits, and network security tools are written on Linux because it's readily available. Hacking Linux Exposed: Linux Security Secrets & Solutions shows you, step-by-step, how to defend against the latest Linux attacks by understanding the hacker's methods and sinister thought processes. You'll learn how your adversaries gather information, acquire targets, escalate privilege, gain control, plant back doors, and cover their tracks. Each chapter is divided into bite-sized chunks, covering highly publicized and little-known break-ins, tips on why they occurred, and detailed countermeasures that no Linux professional can afford to be without.

Links (outside Open Library)

There is only 1 edition record, so we'll show it here...  •  Add edition?

Hacking Linux exposed
Linux security secrets & solutions
by Brian Hatch, James Lee, George Kurtz.

Published 2001 by Osborne/McGraw-Hill in New York .
Written in English.

Table of Contents

Part I Locking into Linux
Chapter 1 Linux Security Overview
Why They Want to Root Your Box
The Open Source Movement
Open Source and Security
Linux Users
/etc/passwd
How to Place Controls on Users
Other Security Controls
Summary
Chapter 2 Proactive Measures and Recovering from a Break-In
Proactive Measures
Insecurity Scanners
Scan Detectors
Hardening Your System
Log File Analysis
Filesystem Integrity Checks
Recovering from a Hack
How to Know When You've Been Hacked
What to Do After a Break-In
Summary
Chapter 3 Mapping Your Machine and Network
Online Searches
Whois Databases
Ping Sweeps
DNS Issues
Example DNS Lookups
DNS Query Security Issues
DNSSEC
Traceroutes
Port Scanning
OS Detection
Active Stack Fingerprinting
Passive Stack Fingerprinting
Enumerating RPC Services
File Sharing with NFS
Simple Network Management Protocol (SNMP)
Network Insecurity Scanners
Summary
Part II Getting In from the Outside
Chapter 4 Social Engineering, Trojans, and Other Hacker Trickery
Social Engineering
Social Engineering Categories
What to Do to Avoid Being Socially Engineered
Hackers Do Their Homework
Trojan Horses
Methods of Trojan Delivery
Viruses and Worms
How Viruses and Worms Spread
Viruses and Linux
Worms and Linux
IRC Backdoors
Summary
Chapter 5 Physical Attacks
Attacking the Office
Boot Access Is root Access
Encrypted Filesystems
Summary
Chapter 6 Attacking Over the Network
Using the Network
TCP/IP Networks
Public Phone Networks
Default or Bad Configurations
NFS Mounts
Netscape Default Configurations
Squid
X Windows System
Default Passwords
Sniffing Traffic
How Sniffers Work
Common Sniffers
Guessing Passwords
Vulnerabilities
Buffer Overflows
Vulnerable Services
Vulnerable Scripts
Unnecessary Services
Using Netstat
Using Lsof
Using Nmap to Identify Services
Turning Off Services
Summary
Chapter 7 Abusing the Network Itself
DNS Exploits
Routing Issues
Advanced Sniffing and Session Hijacking
Hunt
Dsniff
Man-in-the-Middle Attacks
Denial of Service Attacks
Floods
TCP/IP Exploits
Abusing Trust Relationships
Implementing Egress Filtering
Summary
Part III Local User Attacks
Chapter 8 Elevating User Privileges
Users and Privileges
Elevation of Privilege
Trusted Paths and Trojan Horses
Password Storage and Use
Group Membership
Special-Purpose Groups and Device Access
Sudo
Setuserid Programs
Hacker Setuserid Programs on Mounted Filesystems
Attacks Against Poor Programming
Hardlinks and Symlinks
Input Validation
Summary
Chapter 9 Password Cracking
How Passwords Work in Linux
/etc/passwd
Linux Encryption Algorithms
Password Cracking Programs
Other Cracking Programs
Availability of Dictionaries
Shadow Passwords and /etc/shadow
Shadow Passwords Explained
Shadow Passwords Command Suite
Apache Password Files
Pluggable Authentication Modules
Password Protection
Summary
Chapter 10 How Hackers Maintain Access
Host-Based Authentication and User Access
Passwordless Remote Access with the r-Commands
Passwordless Logons with Ssh
Network Accessible Root Shells
Trojaned System Programs
Trail Hiding
Back Doors
Kernel Hacks
Rootkits
Summary
Part IV Server Issues
Chapter 11 Mail and FTP Security
Mail Security
Mail Transfer Agents
Mail Server Insecurities
File Transfer Protocol (FTP)
The FTP Protocol
Sample FTP Session
Active Mode FTP
Passive Mode FTP
Port Scanning Through Third-Party FTP Servers
Enabling Third-Party FTP
Insecure Stateful FTP Firewall Rules
Anonymous FTP Problems
Summary
Mail Servers
FTP
Chapter 12 Web Servers and Dynamic Content
Making an HTTP Request
Apache Web Server
Apache Configuration
Problems with CGI Programs
Insecure CGI Programs
Other Linux Web Servers
Summary
Chapter 13 Access Control and Firewalls
An Overview of inetd and xinetd
inetd
xinetd
Firewalls: Kernel-Level Access Control
Types of Firewalls
Linux Packet Filtering
Blocking Specific Network Access
Firewall Strategy
Firewall Products
Summary
Part V Appendixes
Appendix A Keeping Your Programs Current
Appendix B Turning Off Unneeded Services
Appendix C Online Resources
Appendix D Case Studies

Edition Notes

Includes index.

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.76.O63 H375 2001

The Physical Object

Format
Paperback
Pagination
xxx, 566 p. :
Number of pages
566

Contributors

  • Author
    James Lee

ID Numbers

Open Library
OL3965903M
Internet Archive
hackinglinuxexpo00hatc
ISBN 10
0072127732
LC Control Number
2001270872
OCLC/WorldCat
45314545
Library Thing
150584
Goodreads
552018

History Created December 10, 2009 · 7 revisions Download catalog record: RDF / JSON

July 29, 2014 Edited by ImportBot import new book
August 16, 2012 Edited by 216.162.217.155 Adding book info from HLE website.
May 18, 2012 Edited by EdwardBot update for books with wrong subjects
December 23, 2011 Edited by ImportBot import new book
December 10, 2009 Created by WorkBot add works page