Skip to Content
Practical Linux Security Cookbook
book

Practical Linux Security Cookbook

by Tajinder Kalsi
April 2016
Beginner to intermediate content levelBeginner to intermediate
276 pages
5h 32m
English
Packt Publishing
Content preview from Practical Linux Security Cookbook

Blocking spoofed addresses

IP spoofing is a very common technique used by attackers to send malicious packets to a computer server. This is the process of creating IP packets with a forged IP address. It is mainly used for attacks such as Denial of Service (DoS).

Getting Ready

If we wish to block a spoofed IP address, we need to have a list of IP addresses or domain names from where these spoofed connections have been trying to connect.

How to do it...

We will try to create a basic ruleset of iptables through which we will restrict all incoming packets, except those that are necessary for our usage:

  1. The first step is to create a rule to allow access to the loopback interface so that services on the system can communicate properly with each other locally. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Linux Security Cookbook - Second Edition

Practical Linux Security Cookbook - Second Edition

Tajinder Kalsi
Linux Security Cookbook

Linux Security Cookbook

Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes

Publisher Resources

ISBN: 9781785286421Supplemental Content