Flylib.com
Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy
ISBN: 0596527632
EAN: 2147483647
Year: 2006
Pages: 158
Authors:
Andrew Lockhart
BUY ON AMAZON
Network Security Hacks
Table of Contents
Copyright
Credits
About the Author
Contributors
Acknowledgments
Preface
Why Network Security Hacks?
How This Book Is Organized
Conventions Used in This Book
Using Code Examples
How to Contact Us
Got a Hack?
Chapter 1. Unix Host Security
Hacks 1-20
Hack 1 Secure Mount Points
Hack 2 Scan for SUID and SGID Programs
Hack 3 Scan For World- and Group-Writable Directories
Hack 4 Create Flexible Permissions Hierarchies with POSIX ACLs
Hack 5 Protect Your Logs from Tampering
Hack 6 Delegate Administrative Roles
Hack 7 Automate Cryptographic Signature Verification
Hack 8 Check for Listening Services
Hack 9 Prevent Services from Binding to an Interface
Hack 10 Restrict Services with Sandboxed Environments
Hack 11 Use proftp with a MySQL Authentication Source
Hack 12 Prevent Stack-Smashing Attacks
Hack 13 Lock Down Your Kernel with grsecurity
Hack 14 Restrict Applications with grsecurity
Hack 15 Restrict System Calls with Systrace
Hack 16 Automated Systrace Policy Creation
Hack 17 Control Login Access with PAM
Hack 18 Restricted Shell Environments
Hack 19 Enforce User and Group Resource Limits
Hack 20 Automate System Updates
Chapter 2. Windows Host Security
Hacks 21-30
Hack 21 Check Servers for Applied Patches
Hack 22 Get a List of Open Files and Their Owning Processes
Hack 23 List Running Services and Open Ports
Hack 24 Enable Auditing
Hack 25 Secure Your Event Logs
Hack 26 Change Your Maximum Log File Sizes
Hack 27 Disable Default Shares
Hack 28 Encrypt Your Temp Folder
Hack 29 Clear the Paging File at Shutdown
Hack 30 Restrict Applications Available to Users
Chapter 3. Network Security
Hacks 31-53
Hack 31 Detect ARP Spoofing
Hack 32 Create a Static ARP Table
Hack 33 Firewall with Netfilter
Hack 34 Firewall with OpenBSD s PacketFilter
Hack 35 Create an Authenticated Gateway
Hack 36 Firewall with Windows
Hack 37 Keep Your Network Self-Contained
Hack 38 Test Your Firewall
Hack 39 MAC Filtering with Netfilter
Hack 40 Block OS Fingerprinting
Hack 41 Fool Remote Operating System Detection Software
Hack 42 Keep an Inventory of Your Network
Hack 43 Scan Your Network for Vulnerabilities
Hack 44 Keep Server Clocks Synchronized
Hack 45 Create Your Own Certificate Authority
Hack 46 Distribute Your CA to Clients
Hack 47 Encrypt IMAP and POP with SSL
Hack 48 Set Up TLS-Enabled SMTP
Hack 49 Detect Ethernet Sniffers Remotely
Hack 50 Install Apache with SSL and suEXEC
Hack 51 Secure BIND
Hack 52 Secure MySQL
Hack 53 Share Files Securely in Unix
Chapter 4. Logging
Hacks 54-60
Hack 54 Run a Central Syslog Server
Hack 55 Steer Syslog
Hack 56 Integrate Windows into Your Syslog Infrastructure
Hack 57 Automatically Summarize Your Logs
Hack 58 Monitor Your Logs Automatically
Hack 59 Aggregate Logs from Remote Sites
Hack 60 Log User Activity with Process Accounting
Chapter 5. Monitoring and Trending
Hacks 61-66
Hack 61 Monitor Availability
Hack 62 Graph Trends
Hack 63 Run ntop for Real-Time Network Stats
Hack 64 Audit Network Traffic
Hack 65 Collect Statistics with Firewall Rules
Hack 66 Sniff the Ether Remotely
Chapter 6. Secure Tunnels
Hacks 67-81
Hack 67 Set Up IPsec Under Linux
Hack 68 Set Up IPsec Under FreeBSD
Hack 69 Set Up IPsec in OpenBSD
Hack 70 PPTP Tunneling
Hack 71 Opportunistic Encryption with FreeSWAN
Hack 72 Forward and Encrypt Traffic with SSH
Hack 73 Quick Logins with SSH Client Keys
Hack 74 Squid Proxy over SSH
Hack 75 Use SSH as a SOCKS Proxy
Hack 76 Encrypt and Tunnel Traffic with SSL
Hack 77 Tunnel Connections Inside HTTP
Hack 78 Tunnel with VTun and SSH
Hack 79 Automatic vtund.conf Generator
Hack 80 Create a Cross-Platform VPN
Hack 81 Tunnel PPP
Chapter 7. Network Intrusion Detection
Hacks 82-95
Hack 82 Detect Intrusions with Snort
Hack 83 Keep Track of Alerts
Hack 84 Real-Time Monitoring
Hack 85 Manage a Sensor Network
Hack 86 Write Your Own Snort Rules
Hack 87 Prevent and Contain Intrusions with Snort_inline
Hack 88 Automated Dynamic Firewalling with SnortSam
Hack 89 Detect Anomalous Behavior
Hack 90 Automatically Update Snort s Rules
Hack 91 Create a Distributed Stealth Sensor Network
Hack 92 Use Snort in High-Performance Environments with Barnyard
Hack 93 Detect and Prevent Web Application Intrusions
Hack 94 Simulate a Network of Vulnerable Hosts
Hack 95 Record Honeypot Activity
Chapter 8. Recovery and Response
Hacks 96-100
Hack 96 Image Mounted Filesystems
Hack 97 Verify File Integrity and Find Compromised Files
Hack 98 Find Compromised Packages with RPM
Hack 99 Scan for Root Kits
Hack 100 Find the Owner of a Network
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Network Security Hacks: Tips & Tools for Protecting Your Privacy
ISBN: 0596527632
EAN: 2147483647
Year: 2006
Pages: 158
Authors:
Andrew Lockhart
BUY ON AMAZON
MySQL Stored Procedure Programming
Data Types
Transactional Support in MySQL
Permissions Required for Stored Programs
Tuning Subqueries in the FROM Clause
Loop Processing
Metrics and Models in Software Quality Engineering (2nd Edition)
The Prototyping Approach
Lines of Code
1 Definition and Measurements of System Availability
Software Process Maturity Assessment and Software Project Assessment
Dos and Donts of Software Process Improvement
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
LotusScript Classes
Web Applications
View Enhancements
How to Enforce Consistent ACL Settings Across Replicas
About the Companion Web Site
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 16. How Big Is the World?
Hack 18. Examine Patterns of Criminal Activity
Hack 25. Track Your UPS Packages
Hack 38. Map Your Wardriving Expeditions
Hack 50. Geoblog with Google Maps in Thingster
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
VBScript Basics
Conditional Logic
Processing Collections of Data
Using the Windows Registry to Configure Script Settings
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Object Models
Working with a Document
Working with the Range Object
Deploying to an Intranet Shared Directory or Web Site
Shimming: A Solution to the Problems with MsCoree.dll
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies