Book description
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.
This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.
In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.
Publisher resources
Table of contents
- Copyright
- Credits
- Preface
-
1. Unix Host Security
- 1. Secure Mount Points
- 2. Scan for SUID and SGID Programs
- 3. Scan for World- and Group-Writable Directories
- 4. Create Flexible Permissions Hierarchies with POSIX ACLs
- 5. Protect Your Logs from Tampering
- 6. Delegate Administrative Roles
- 7. Automate Cryptographic Signature Verification
- 8. Check for Listening Services
- 9. Prevent Services from Binding to an Interface
- 10. Restrict Services with Sandboxed Environments
- 11. Use proftpd with a MySQL Authentication Source
- 12. Prevent Stack-Smashing Attacks
- 13. Lock Down Your Kernel with grsecurity
- 14. Restrict Applications with grsecurity
- 15. Restrict System Calls with systrace
- 16. Create systrace Policies Automatically
- 17. Control Login Access with PAM
- 18. Restrict Users to SCP and SFTP
- 19. Use Single-Use Passwords for Authentication
- 20. Restrict Shell Environments
- 21. Enforce User and Group Resource Limits
- 22. Automate System Updates
-
2. Windows Host Security
- 23. Check Servers for Applied Patches
- 24. Use Group Policy to Configure Automatic Updates
- 25. List Open Files and Their Owning Processes
- 26. List Running Services and Open Ports
- 27. Enable Auditing
- 28. Enumerate Automatically Executed Programs
- 29. Secure Your Event Logs
- 30. Change Your Maximum Log File Sizes
- 31. Back Up and Clear the Event Logs
- 32. Disable Default Shares
- 33. Encrypt Your Temp Folder
- 34. Back Up EFS
- 35. Clear the Paging File at Shutdown
- 36. Check for Passwords That Never Expire
- 3. Privacy and Anonymity
-
4. Firewalling
- 44. Firewall with Netfilter
- 45. Firewall with OpenBSD’s PacketFilter
- 46. Protect Your Computer with the Windows Firewall
- 47. Close Down Open Ports and Block Protocols
- 48. Replace the Windows Firewall
- 49. Create an Authenticated Gateway
- 50. Keep Your Network Self-Contained
- 51. Test Your Firewall
- 52. MAC Filter with Netfilter
- 53. Block Tor
- 5. Encrypting and Securing Services
-
6. Network Security
- 62. Detect ARP Spoofing
- 63. Create a Static ARP Table
- 64. Protect Against SSH Brute-Force Attacks
- 65. Fool Remote Operating System Detection Software
- 66. Keep an Inventory of Your Network
- 67. Scan Your Network for Vulnerabilities
- 68. Keep Server Clocks Synchronized
- 69. Create Your Own Certificate Authority
- 70. Distribute Your CA to Clients
- 71. Back Up and Restore a Certificate Authority with Certificate Services
- 72. Detect Ethernet Sniffers Remotely
- 73. Help Track Attackers
- 74. Scan for Viruses on Your Unix Servers
- 75. Track Vulnerabilities
- 7. Wireless Security
-
8. Logging
- 79. Run a Central Syslog Server
- 80. Steer Syslog
- 81. Integrate Windows into Your Syslog Infrastructure
- 82. Summarize Your Logs Automatically
- 83. Monitor Your Logs Automatically
- 84. Aggregate Logs from Remote Sites
- 85. Log User Activity with Process Accounting
- 86. Centrally Monitor the Security Posture of Your Servers
- 9. Monitoring and Trending
-
10. Secure Tunnels
- 92. Set Up IPsec Under Linux
- 93. Set Up IPsec Under FreeBSD
- 94. Set Up IPsec in OpenBSD
- 95. Encrypt Traffic Automatically with Openswan
- 96. Forward and Encrypt Traffic with SSH
- 97. Automate Logins with SSH Client Keys
- 98. Use a Squid Proxy over SSH
- 99. Use SSH As a SOCKS Proxy
- 100. Encrypt and Tunnel Traffic with SSL
- 101. Tunnel Connections Inside HTTP
- 102. Tunnel with VTun and SSH
- 103. Generate VTun Configurations Automatically
- 104. Create a Cross-Platform VPN
- 105. Tunnel PPP
-
11. Network Intrusion Detection
- 106. Detect Intrusions with Snort
- 107. Keep Track of Alerts
- 108. Monitor Your IDS in Real Time
- 109. Manage a Sensor Network
- 110. Write Your Own Snort Rules
- 111. Prevent and Contain Intrusions with Snort_inline
- 112. Automatically Firewall Attackers with SnortSam
- 113. Detect Anomalous Behavior
- 114. Automatically Update Snort’s Rules
- 115. Create a Distributed Stealth Sensor Network
- 116. Use Snort in High-Performance Environments with Barnyard
- 117. Detect and Prevent Web Application Intrusions
- 118. Scan Network Traffic for Viruses
- 119. Simulate a Network of Vulnerable Hosts
- 120. Record Honeypot Activity
- 12. Recovery and Response
- About the Author
- Colophon
- Copyright
Product information
- Title: Network Security Hacks, 2nd Edition
- Author(s):
- Release date: October 2006
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596527631
You might also like
book
Practical Packet Analysis, 3rd Edition
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the …
book
Networking Fundamentals
Become well-versed with basic networking concepts such as routing, switching, and subnetting, and prepare for the …
book
The GNU Make Book
GNU Make Book is a practical, thorough guide to GNU Make basics, solutions, and advanced uses.
book
Creating Apps with React Native: Deliver Cross-Platform 0 Crash, 5 Star Apps
Produce high-quality, cross-platform apps with user experiences almost identical to pure native apps. When evaluating cross-platform …