000 10114cam a2200361 a 4500
001 u4310
003 SA-PMU
005 20210418123828.0
008 080709s2008 nyua b 001 0 eng
010 _a 2008030495
040 _aDLC
_beng
_cDLC
_dYDXCP
_dBAKER
_dC#P
_dCDX
_dBWX
_dVP@
_dUKM
_dBTCTA
_dQBX
_dCDN
_dOCLCQ
_dEDK
020 _a9780072262575 (alk. paper)
020 _a0072262575 (alk. paper)
035 _a(OCoLC)234073834
_z(OCoLC)144565988
_z(OCoLC)183915312
050 0 0 _aQA76.76.O63
_bH375 2008
082 0 0 _a005.8
_222
245 0 0 _aHacking exposed Linux :
_bLinux security secrets & solutions /
_cISECOM.
250 _a3rd ed.
260 _aNew York, NY :
_bMcGraw-Hill,
_cc2008.
300 _axxxiii, 613 p. :
_bill. ;
_c23 cm.
500 _aPrevious ed. under title: Hacking Linux exposed / Brian Hatch, 2003.
504 _aIncludes bibliographical references and index.
505 0 _aForeword -- Acknowledgments -- Introduction -- Part 1: Security And Controls -- 1: Applying security -- Case study -- Free from risk -- Four comprehensive constraints -- Elements of security -- Summary -- 2: Applying interactive controls -- Case study -- Five interactive controls -- Summary -- 3: Applying process controls -- Case study -- Five process controls -- Summary -- Part 2: Hacking The System -- 4: Local access control -- Case study -- Physical access to Linux systems --Console access -- Privilege escalation -- Sudo -- File permissions and attributes -- Chrooting -- Physical access, encryption, and password recovery -- Volatile data -- Summary -- 5: Data networks security -- Case study -- Network visibility -- Network and systems profiling -- Network architecture -- Covert communications and clandestine administration -- Summary -- 6: Unconventional data attack vectors -- Case study -- Overview of PSTN, ISDN, and PSDN attack vectors -- Introducing PSTN -- Introducing ISDN -- Introducing PSDN and X-25 -- Communication network attacks -- Tests to perform -- PSTN -- ISDN -- PSDN -- Tools to use -- PAW and PAWS -- Intelligent wardialer -- Shokdial -- Ward -- THCscan next generation -- PSDN testing tools -- Admx25 -- Sun solaris multihread and multichannel X-25 scanner -- Vudu -- Tscan -- Common banners -- How X-25 networks work -- Basic elements -- Call setup -- Error codes -- X-3/X-28 PAD answer codes -- X-25 addressing format -- DCC annex list -- Key points for getting X-25 access -- X-28 dialup with NUI -- X-28 dialup via reverse charge -- Private X-28 PAD via a standard or toll-free PSTN or ISDN -- Number -- Internet to x-25 gateways -- Cisco systems -- VAX/VMS or AXP/opens VMS -- NIX systems -- Summary -- 7: Voice over IP -- Case study -- VoIP attack taxonomy -- Network attacks -- System attacks -- Signaling attacks -- Introduction to VoIP testing tools -- Transport attacks -- VoIP security challenges -- Firewalls and NAT -- Encryption -- Summary -- 8: Wireless networks -- Case study -- State of the wireless -- Wireless hacking physics: radio frequency -- RF spectrum analysis -- Exploiting 802-11 the hacker way -- Wireless auditing activities and procedures -- Auditing wireless policies -- Summary -- 9: Input/output devices -- Case study -- About bluetooth -- Bluetooth profiles -- Entities on the bluetooth protocol stack -- Summary -- 10: RFID-radio frequency identification -- Case study -- History of RFID: Leon theremin and "the thing" -- Identification-friend-or-foe -- RFID components -- Purpose of RFID -- Passive tags -- Active tags -- RFID uses -- RFID-enabled passports -- Ticketing -- Other current RFID uses -- RFID frequency standards -- RFID technology standards -- RFID attacks -- RFID hacker's toolkit -- Implementing RFID systems using Linux -- RFID readers connected to a Linux system -- RFID readers with embedded Linux -- Linux systems as backend/middleware/database -- Servers in RFID systems -- Linux and RFID-related projects and products -- OpenMRTD -- OpenPCD -- Open PICC -- Magellan technology -- PFIDiot -- RFID guardian -- OpenBeacon -- Ominkey -- Linux RFID kit -- Summary -- 11: Emanation attacks -- Case study -- Van Eck Phreaking -- Other "side-channel" attacks -- Summary -- 12: Trusted computing -- Case study -- Introduction to trusted computing -- Platform attack taxonomy -- Hardware attacks -- Low-level software attacks -- System software attacks -- Application attacks -- General support for trusted computing applications -- TPM device driver -- TrouSerS -- TPM emulator -- jTSS wrapper -- TPM manager -- Examples of trusted computing applications -- Enforcer -- TrustedGRUB (tGrub) -- TPM keyring -- Turaya, VPN and Turaya-Crypt -- Open trusted computing -- TCG industrial applications -- Summary -- Part 3: Hacking The Users -- 13: Web application hacking -- Case study -- Enumeration -- Access and controls exploitation -- Insufficient data validation -- Web 2-0 attacks -- Trust manipulation -- Trust and awareness hijacking -- Man-in-the-middle -- Web infrastructure attacks -- Summary -- 14: Mail services -- Case SMTP basics -- Understanding sender and envelope sender -- Email routing -- SMTP attach taxonomy -- Fraud -- Alteration of data or integrity -- Denial of service or availability -- Summary -- 15: Name services -- Case study -- DNS basics -- DNS and IPv6 -- Social aspect: DNS and Phishing -- WHOIS and domain registration and domain hijacking -- Technical aspect: spoofing, cache poisoning, and other attacks -- Bind hardening -- Summary -- Part 4: Care And Maintenance -- 16: Reliability: static analysis of C code -- Case study -- Formal vs semiformal methods -- Semiformal methods -- Formal methods -- Static analysis -- C code static analysis -- Analyzing C code using hoare logics -- Weakest precondition calculus -- Verification conditions -- Termination -- Methodology -- Some C analysis tools -- Tools based on abstract interpretation -- Tools based on hoare logics -- Tools based on model checking -- Additional references -- Summary -- 17: Security tweaks in the Linux kernel -- Linux security modules -- CryptoAPI -- NetFilter enhancements -- Enhanced wireless stack -- File system enhancement -- POSIX access control lists -- NFSv4 -- Additional kernel resources -- Man pages online -- Online documentation -- Other references -- Part 5: Appendixes -- A: Management and maintenance -- Best practices node setup -- Use cryptographically secured services -- Prevention against brute-force -- Deny all, allow specifically -- One-time passwords -- Automated scanning techniques -- Lock out on too high fail count -- Avoid loadable kernel module feature -- Enforce password policy -- Use sudo for system administration tasks -- Check IPv6 status -- Justify enabled daemons -- Set mount and filesystem options -- Harden a system through/proc -- Passwords -- Hardware health -- Checking log files -- Best practices network environment setup -- Ingress and egress filtering -- Build network segments and host-based firewalls -- Perform time synchronization -- Watch security mailing lists -- Collect log files at a central place -- Collect statistics within the network -- Use VPN for remote management -- Additional helpful tools -- Intrusion detection systems -- System monitoring -- Replace legacy applications -- Xinetd -- Syslog-ng -- Daemontools -- Other service management tools -- Automating system administration -- Perl scripting language -- Cfengine -- B: Linux forensics and data recovery -- Hardware: the forensic workstation -- Hardware: other valuable tools -- Software: operating system -- Software tools -- So, where should you start from? -- Live investigation/acquisition -- Post mortem analysis -- Handling electronic evidence -- Legislative regulations -- Definition of electronic evidence -- Equivalence of traditional evidence to electronic evidence -- Advantages and disadvantages of electronic evidence -- Working with electronic evidence -- Requirements that electronic evidence must fulfill to be admitted in court -- C: BSD -- Overview of BSD projects -- Security features found in all BSDs -- Securelevel -- Security scripts -- Sysctl(8) -- Rc-conf -- Rc-subr(8) -- Chflags(1) -- Ttys(5) -- Sshd-config(5) -- Blowfish support -- System accounting -- Ipsec(4) -- Randomness -- Chroot(8) -- FreeBSD -- ACLs -- MAC policies -- OpenBSM -- OpenPAM -- Jail(8) -- VuXML -- Portaudit(1) -- Gbde(4) -- Geli(8) -- NetBSD -- Kauth(9) -- Veriexec(4) -- Pw-policy(3) -- Fileassoc(9) -- Audit-packages -- Vgd(4) -- Clockctl(4) -- OpenBSD -- ProPolice -- WAX -- Systrace(1) -- Encripted swap -- Pf(4) firewall features -- BSD security advisories -- Additional BSD resources -- Online man pages -- Online documentation -- Books -- Index.
520 _aSynopsis: The Latest Linux Security Solutions. This authoritative guide will help you secure your Linux network-whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research; Follow attack techniques of PSTN, ISDN, and PSDN over Linux; Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux; Block Linux signal jamming, cloning, and eavesdropping attacks; Apply Trusted Computing and cryptography tools for your best defense; Fix vulnerabilities in DNS, SMTP, and Web 2.0 services; Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits; Find and repair errors in C code with static analysis and Hoare Logic.
630 0 0 _aLinux.
650 0 _aComputer security.
700 1 _aHatch, Brian.
_tHacking Linux exposed.
710 2 _aISECOM (Organization)
856 4 1 _3Table of contents only
_uhttp://catdir.loc.gov/catdir/toc/ecip0823/2008030495.html
942 _cBOOK
994 _aZ0
_bSUPMU
596 _a1 2
999 _c4853
_d4853