Appendix D. Danger Levels

   


Table D-1 presents a list of issues, sorted by level of danger or importance. It should help enable you to scan for issues known to be present on your system so that the issues can be prioritized for investigation. I discussed the interpretation of these danger levels in the Introduction to Part I and tabulated them in Table 2.1, Danger Level Interpretation.

Table D.1. Danger Levels

Danger Level

Section

Description

graphics/fivedangersymbol.gif

2.1

Understanding Linux Security

graphics/fivedangersymbol.gif

2.1.3

Moving to Rings of Security

graphics/fivedangersymbol.gif

2.2

The Seven Most Deadly Sins

graphics/fivedangersymbol.gif

2.3

Passwords a Key Point for Good Security

graphics/fivedangersymbol.gif

2.3.1

Avoiding Weak and Default Passwords

graphics/fivedangersymbol.gif

2.4.1

Shadowed MD5 Passwords for Good Security

graphics/fivedangersymbol.gif

2.5

Protecting the System from User Mistakes

graphics/fivedangersymbol.gif

2.5.1

Dangers of Imported Software

graphics/fivedangersymbol.gif

2.5.2

Educating Users

graphics/fivedangersymbol.gif

2.6

Forgiveness is Better than Permission

graphics/fivedangersymbol.gif

2.6.2

Finding Permission Problems

graphics/fivedangersymbol.gif

2.6.3

Using umask in Startup Scripts

graphics/fivedangersymbol.gif

2.8.1

Limit Which Terminals Root May Log In From

graphics/fivedangersymbol.gif

2.8.3

Stopping Uncontrolled Access to Data

graphics/fivedangersymbol.gif

2.9

Firewalls and the Corporate Moat

graphics/fivedangersymbol.gif

2.9.1

Stopping End Runs Around Firewalls

graphics/fivedangersymbol.gif

2.9.5

LANd Mines

graphics/fivedangersymbol.gif

2.10

Turn Off Unneeded Services

graphics/fivedangersymbol.gif

2.12

Replace These Weak Doors with Brick

graphics/fivedangersymbol.gif

2.12.4

Turn Off SNMP

graphics/fivedangersymbol.gif

2.12.5

Turn Off NFS, mountd, and portmap

graphics/fivedangersymbol.gif

2.12.7

Turn Off rsh, rcp, rlogin, and rexec

graphics/fivedangersymbol.gif

2.13

New Lamps for Old

graphics/fivedangersymbol.gif

2.13.3

Upgrade sendmail

graphics/fivedangersymbol.gif

2.13.5

Upgrade SSH

graphics/fivedangersymbol.gif

2.13.6

Upgrade WU-FTPD

graphics/fivedangersymbol.gif

3.1

X Marks the Hole

graphics/fivedangersymbol.gif

3.2

Law of the Jungle Physical Security

graphics/fivedangersymbol.gif

3.3

Physical Actions

graphics/fivedangersymbol.gif

3.3.1

Booting an Intruder's Floppy or CD-ROM

graphics/fivedangersymbol.gif

3.3.2

CMOS Reconfiguration

graphics/fivedangersymbol.gif

3.4.2

$PATH: Values of . Give Rise to Doom

graphics/fivedangersymbol.gif

3.4.19

Wireless Equivalent Privacy (WEP)

graphics/fivedangersymbol.gif

3.6.1

Truly Erasing Files

graphics/fivedangersymbol.gif

3.6.2

Destroying Old Confidential Data in Free Blocks

graphics/fivedangersymbol.gif

4.1

NFS, mountd, and portmap

graphics/fivedangersymbol.gif

4.2

Sendmail

graphics/fivedangersymbol.gif

4.2.2

Basic Sendmail Security

graphics/fivedangersymbol.gif

4.3

Telnet

graphics/fivedangersymbol.gif

4.4

FTP

graphics/fivedangersymbol.gif

4.5

The rsh, rcp, rexec, and rlogin Services

graphics/fivedangersymbol.gif

4.11

The print Service (lpd)

graphics/fivedangersymbol.gif

5.1

Rootkit Attacks (Script Kiddies)

graphics/fivedangersymbol.gif

5.2

Packet Spoofing Explained

graphics/fivedangersymbol.gif

5.2.1

Why UDP Packet Spoofing Is Successful

graphics/fivedangersymbol.gif

5.7

Buffer Overflows or Stamping on Memory with gets()

graphics/fivedangersymbol.gif

6.2

Stopping Access to I/O Devices

graphics/fivedangersymbol.gif

6.3

Scouting Out Apache (httpd) Problems

graphics/fivedangersymbol.gif

6.3.1

Apache Ownership and Permissions

graphics/fivedangersymbol.gif

6.3.2

Server Side Includes

graphics/fivedangersymbol.gif

6.3.3

ScriptAlias

graphics/fivedangersymbol.gif

6.3.8

Database Draining

graphics/fivedangersymbol.gif

6.3.9

Kicking Out Undesirables

graphics/fivedangersymbol.gif

6.4

Special Techniques for Web Servers

graphics/fivedangersymbol.gif

6.4.1

Build Separate Castles

graphics/fivedangersymbol.gif

6.4.2

Do Not Trust CGIs

graphics/fivedangersymbol.gif

6.4.3

Hidden Form Variables and Poisoned Cookies

graphics/fivedangersymbol.gif

6.4.4

Take Our Employees, Please

graphics/fivedangersymbol.gif

6.4.6

Dangerous CGI Programs Lying Around

graphics/fivedangersymbol.gif

6.4.7

CGI Query Program Exploit

graphics/fivedangersymbol.gif

6.4.11

CGI Scripts and Programs

graphics/fivedangersymbol.gif

6.4.13

Detecting Defaced Web Pages

graphics/fivedangersymbol.gif

6.5

One-Way Credit Card Data Path for Top Security

graphics/fivedangersymbol.gif

6.10

Stopping Buffer Overflows with Libsafe

graphics/fivedangersymbol.gif

7.1

General Policy

graphics/fivedangersymbol.gif

7.3

Accounts Policy

graphics/fivedangersymbol.gif

7.4

E-Mail Policy

graphics/fivedangersymbol.gif

7.6

Web Server Policy

graphics/fivedangersymbol.gif

7.9

Desktop Policy

graphics/fivedangersymbol.gif

7.10

Laptop Policy

graphics/fivedangersymbol.gif

7.12

Network Topology Policy

graphics/fivedangersymbol.gif

8.2

Trust No One The Highest Security

graphics/fivedangersymbol.gif

8.6

Firewall Vulnerabilities

graphics/fivedangersymbol.gif

11.1

Fragmentation Attacks

graphics/fivedangersymbol.gif

11.5

Cable Modems: A Cracker's Dream

graphics/fivedangersymbol.gif

12.1

Protecting User Sessions with SSH

graphics/fivedangersymbol.gif

12.1.3

Using SSH

graphics/fivedangersymbol.gif

12.1.4

Wrapping SSH Around X

graphics/fivedangersymbol.gif

12.1.7

Wrapping SSH Around Other TCP-Based Services

graphics/fivedangersymbol.gif

12.1.8

Vulnerabilities SSH Cannot Protect Against

graphics/fivedangersymbol.gif

12.3

Pretty Good Privacy (PGP)

graphics/fivedangersymbol.gif

12.4

Using GPG to Encrypt Files the Easy Way

graphics/fivedangersymbol.gif

12.5

Firewalls with IP Tables and DMZ

graphics/fivedangersymbol.gif

12.5.9

Building an IP Tables based Firewall with DMZ

graphics/fivedangersymbol.gif

12.6

Firewalls with IP Chains and DMZ

graphics/fourdangersymbol.gif

2.8.4

Limiting Server Interfaces

graphics/fourdangersymbol.gif

2.12.1

Do Not Get the Finger

graphics/fourdangersymbol.gif

2.12.10

Turn Off TFTP

graphics/fourdangersymbol.gif

2.13.7

Upgrade Netscape

graphics/fourdangersymbol.gif

2.14

United We Fall, Divided We Stand

graphics/fourdangersymbol.gif

3.4.1

Cable Modems

graphics/fourdangersymbol.gif

3.4.6

/etc/mailcap

graphics/fourdangersymbol.gif

3.4.21

Shell Escapes

graphics/fourdangersymbol.gif

3.6

Disk Sniffing

graphics/fourdangersymbol.gif

4.2.1

Separate or Multiple Mail Servers for Additional Security

graphics/fourdangersymbol.gif

4.2.7

Blocking Spam

graphics/fourdangersymbol.gif

4.2.9

Allowing Controlled Relaying

graphics/fourdangersymbol.gif

4.6

DNS (named, a.k.a. BIND)

graphics/fourdangersymbol.gif

4.7

POP and IMAP Servers

graphics/fourdangersymbol.gif

4.7.1

Passwords on the Command Line, Oh My!

graphics/fourdangersymbol.gif

4.8

Doing the Samba

graphics/fourdangersymbol.gif

4.12

The ident Service

graphics/fourdangersymbol.gif

5.2.3

Session Hijacking

graphics/fourdangersymbol.gif

6.1

Configuring Netscape for Higher Security

graphics/fourdangersymbol.gif

6.1.1

Important Netscape Preferences

graphics/fourdangersymbol.gif

6.1.3

Your Users' Netscape Preferences

graphics/fourdangersymbol.gif

6.1.5

Netscape Java Security

graphics/fourdangersymbol.gif

6.3.4

Preventing Users from Altering System-Wide Settings

graphics/fourdangersymbol.gif

6.3.5

Controlling What Directories Apache May Access

graphics/fourdangersymbol.gif

6.8.1

Defeating Buffer Overflow Attacks

graphics/fourdangersymbol.gif

7.15

Policy Policy

graphics/fourdangersymbol.gif

9.2.1

Industrial Spies

graphics/fourdangersymbol.gif

11.4

Captain, We're Being Scanned! (Stealth Scans)

graphics/fourdangersymbol.gif

11.11

Stealth Trojan Horses

graphics/fourdangersymbol.gif

12.1.5

Using sftp

graphics/fourdangersymbol.gif

12.1.6

Using scp

graphics/fourdangersymbol.gif

12.2

Virtual Private Networks (VPNs)

graphics/fourdangersymbol.gif

12.5.7

SuSE 8.0's Firewall Configuration

graphics/fourdangersymbol.gif

12.5.8

Firewall Tricks and Techniques

graphics/fourdangersymbol.gif

12.5.18

SSH Dangers

graphics/fourdangersymbol.gif

12.6.10

SSH Dangers

graphics/fourdangersymbol.gif

14.2

Adaptive Firewalls: Raising the Drawbridge with the Cracker Trap

graphics/fourdangersymbol.gif

14.2.7

Trapping Server Attacks with Port Redirection

graphics/fourdangersymbol.gif

16.3

Using Logcheck to Check the Log Files You Never Check

graphics/fourdangersymbol.gif

16.4

Using Portsentry to Lock Out Hackers

graphics/threedangersymbol.gif

2.6.1

Directories and the Sticky Bit

graphics/threedangersymbol.gif

2.8.2

Dialing the World (Wardialing)

graphics/threedangersymbol.gif

2.9.2

Tunneling Through Firewalls

graphics/threedangersymbol.gif

2.9.3

Kernel Protocol Switches

graphics/threedangersymbol.gif

2.9.4

Egress Filtering

graphics/threedangersymbol.gif

2.9.6

Intracompany Firewalls to Contain Fires

graphics/threedangersymbol.gif

2.12.11

Turn Off systat and netstat

graphics/threedangersymbol.gif

2.13.1

Upgrade Your 2.4 Kernel

graphics/threedangersymbol.gif

2.13.2

Upgrade Your 2.2 Kernel

graphics/threedangersymbol.gif

2.13.8

Blocking Web Ads

graphics/threedangersymbol.gif

3.3.3

Adding a CMOS Password

graphics/threedangersymbol.gif

3.3.4

Defending Against Single-User Mode

graphics/threedangersymbol.gif

3.3.5

Defeating Theft by Floppy

graphics/threedangersymbol.gif

3.4.3

Blocking IP Source Routing

graphics/threedangersymbol.gif

3.4.4

Blocking IP Spoofing

graphics/threedangersymbol.gif

3.4.5

Automatic Screen Locking

graphics/threedangersymbol.gif

3.4.7

The chattr Program and the Immutable Bit

graphics/threedangersymbol.gif

3.4.8

Secure Deletion

graphics/threedangersymbol.gif

3.4.10

Mount Flags for Increased Security

graphics/threedangersymbol.gif

3.4.16

Preventing ARP Cache Poisoning

graphics/threedangersymbol.gif

3.4.17

Hacking Switches

graphics/threedangersymbol.gif

3.4.18

Countering System and Switch Hacking Caused by ARP Attacks

graphics/threedangersymbol.gif

3.4.23

Terminal Sniffing (ttysnoop)

graphics/threedangersymbol.gif

3.4.25

VMware, Wine, DOSemu, and Friends

graphics/threedangersymbol.gif

3.6.3

Erasing an Entire Disk

graphics/threedangersymbol.gif

3.6.4

Destroying a Hard Disk

graphics/threedangersymbol.gif

4.2.3

Sendmail Security Options

graphics/threedangersymbol.gif

4.4.2

FTP Proxy Dangers

graphics/threedangersymbol.gif

4.6.1

Limiting Consequences of a Named Compromise

graphics/threedangersymbol.gif

4.9

Stop Squid from Inking Out Their Trail

graphics/threedangersymbol.gif

4.13

INND and News

graphics/threedangersymbol.gif

4.14

Protecting Your DNS Registration

graphics/threedangersymbol.gif

5.8.2

MAC Attack

graphics/threedangersymbol.gif

5.8.3

Poisoned ARP Cache

graphics/threedangersymbol.gif

5.8.4

Poisoned DNS Cache

graphics/threedangersymbol.gif

5.9

Man-in-the-Middle Attack

graphics/threedangersymbol.gif

6.1.2

Snatching Your Own Cookies

graphics/threedangersymbol.gif

6.2.2

Virtual Console Buffer Vulnerability

graphics/threedangersymbol.gif

6.3.6

Controlling What File Extensions Apache May Access

graphics/threedangersymbol.gif

6.3.7

Miscellaneous

graphics/threedangersymbol.gif

6.4.8

Unhexing Encoded URLs

graphics/threedangersymbol.gif

6.4.9

CGI Counterfiglet Program Exploit

graphics/threedangersymbol.gif

6.4.10

CGI phf Program Exploit

graphics/threedangersymbol.gif

6.6

Hardening for Very High Security

graphics/threedangersymbol.gif

6.7

Restricting Login Location and Times

graphics/threedangersymbol.gif

6.9

Defeating Login Simulators

graphics/threedangersymbol.gif

7.2

Personal Use Policy

graphics/threedangersymbol.gif

7.5

Instant Messenger (IM) Policy

graphics/threedangersymbol.gif

7.11

Disposal Policy

graphics/threedangersymbol.gif

7.14

Ownership Policy

graphics/threedangersymbol.gif

8.3

Linux and UNIX Systems Within Your Control

graphics/threedangersymbol.gif

8.4

Mainframes Within Your Control

graphics/threedangersymbol.gif

8.5

A Window Is Worth a Thousand Cannons

graphics/threedangersymbol.gif

8.8

Viruses and Linux

graphics/threedangersymbol.gif

9.1

Mission Impossible Techniques

graphics/threedangersymbol.gif

11.2

IP Masquerading Fails for ICMP

graphics/threedangersymbol.gif

11.6

Using Sendmail to Block E-Mail Attacks

graphics/threedangersymbol.gif

11.12

Linuxconf via TCP Port 98

graphics/threedangersymbol.gif

11.13

Evil HTML Tags and Script

graphics/threedangersymbol.gif

11.14

Format Problems with syslog()

graphics/threedangersymbol.gif

12.5.6

Red Hat 7.3's Firewall Configuration

graphics/threedangersymbol.gif

12.5.15

Routing Secrets

graphics/threedangersymbol.gif

12.5.16

IP Tables: Lesser Used Features

graphics/threedangersymbol.gif

12.5.17

Stateful Firewalls

graphics/threedangersymbol.gif

12.5.19

Encrypted Mail Access

graphics/threedangersymbol.gif

12.6.9

Stateful Firewalls

graphics/threedangersymbol.gif

12.6.11

Encrypted Mail Access

graphics/threedangersymbol.gif

14.2.8

Using Portsentry with the Cracker Trap

graphics/threedangersymbol.gif

16.5

HostSentry

graphics/threedangersymbol.gif

16.10

Using Arpwatch to Catch ARP and MAC Attacks

graphics/twodangersymbol.gif

2.12.2

Turn Off rwhod

graphics/twodangersymbol.gif

2.12.3

Turn Off rwalld

graphics/twodangersymbol.gif

2.12.8

Turn Off Echo and Chargen

graphics/twodangersymbol.gif

2.12.9

Turn Off talk and ntalk

graphics/twodangersymbol.gif

2.12.12

Turn Off Internal xinetd Services

graphics/twodangersymbol.gif

2.13.4

Fortify Sendmail to Resist DoS Attacks

graphics/twodangersymbol.gif

3.3.6

Defeating Control-Alt-Delete Attacks

graphics/twodangersymbol.gif

3.4.9

Synchronous I/O

graphics/twodangersymbol.gif

3.4.11

Wrapping UDP in TCP and SSH

graphics/twodangersymbol.gif

3.4.12

Cat Scratches Man

graphics/twodangersymbol.gif

3.4.13

Limiting Your Success with *limit

graphics/twodangersymbol.gif

3.4.14

Shell History on Public Display

graphics/twodangersymbol.gif

3.4.22

Your ISP

graphics/twodangersymbol.gif

3.4.24

Star Office

graphics/twodangersymbol.gif

3.5

Terminal Device Attacks

graphics/twodangersymbol.gif

3.5.2

Compose Key Vulnerability

graphics/twodangersymbol.gif

4.2.4

Forging Mail and News Sender's Address

graphics/twodangersymbol.gif

4.2.5

Where Is All That Spam Coming From?

graphics/twodangersymbol.gif

4.2.6

Drop-Shipping Spam (Relaying Spam)

graphics/twodangersymbol.gif

4.2.12

Sendmail DoS by Filling the Disk Up

graphics/twodangersymbol.gif

4.10

The syslogd Service

graphics/twodangersymbol.gif

5.2.2

TCP Sequence Spoofing Explained

graphics/twodangersymbol.gif

5.3

SYN Flood Attack Explained

graphics/twodangersymbol.gif

5.4

Defeating SYN Flood Attacks

graphics/twodangersymbol.gif

5.5

Defeating TCP Sequence Spoofing

graphics/twodangersymbol.gif

5.6

Packet Storms, Smurf Attacks, and Fraggles

graphics/twodangersymbol.gif

5.8.1

Mail Spoofing

graphics/twodangersymbol.gif

6.1.4

The Netscape Personal Security Manager

graphics/twodangersymbol.gif

6.3.10

Links to Your Site

graphics/twodangersymbol.gif

6.4.5

Robot Exclusion of Web Pages

graphics/twodangersymbol.gif

6.4.12

Enforcing URL Blocking

graphics/twodangersymbol.gif

6.8.2

Defeating the chroot() Vulnerability

graphics/twodangersymbol.gif

6.8.3

Symlink Attack

graphics/twodangersymbol.gif

6.8.5

The rm -r Race

graphics/twodangersymbol.gif

9.2

Spies

graphics/twodangersymbol.gif

9.3

Fanatics and Suicide Attacks

graphics/twodangersymbol.gif

11.7

Sendmail Account Guessing

graphics/twodangersymbol.gif

11.8

The Mysterious Ingreslock

graphics/twodangersymbol.gif

11.10

Distributed Denial of Service (Coordinated) Attacks

graphics/onedangersymbol.gif

2.7

Dangers and Countermeasures During Initial System Setup

graphics/onedangersymbol.gif

3.4.20

Hacking LEDs

graphics/onedangersymbol.gif

3.5.1

Function Key Hijacking

graphics/onedangersymbol.gif

3.5.3

The xterm Change Log File Vulnerability

graphics/onedangersymbol.gif

6.8.4

The lost+found=hole Problem

graphics/onedangersymbol.gif

11.3

The Ping of Death Sinks Dutch Shipping Company

graphics/onedangersymbol.gif

11.9

You're Being Tracked

graphics/onedangersymbol.gif

11.9.1

The Pentium III Serial Number

graphics/onedangersymbol.gif

11.9.2

Microsoft's GUID Allows Spying on You



   
Top


Real World Linux Security Prentice Hall Ptr Open Source Technology Series
Real World Linux Security Prentice Hall Ptr Open Source Technology Series
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 260

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net