rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780596006433

Network Security Hacks : 100 Industrial-Strength Tips and Tools

by
  • ISBN13:

    9780596006433

  • ISBN10:

    0596006438

  • Format: Paperback
  • Copyright: 2004-04-01
  • Publisher: Oreilly & Associates Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $24.95

Summary

This information-packed book provides more than 100 quick, practical, and clever things to do to help make your Linux, Unix, or Windows networks more secure. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks demonstrates effective methods for defending your servers and networks from a variety of devious and subtle attacks.

Table of Contents

Creditsp. ix
Prefacep. xi
Unix Host Securityp. 1
Secure Mount Pointsp. 2
Scan for SUID and SGID Programsp. 3
Scan For World- and Group-Writable Directoriesp. 5
Create Flexible Permissions Hierarchies with POSIX ACLsp. 5
Protect Your Logs from Tamperingp. 8
Delegate Administrative Rolesp. 10
Automate Cryptographic Signature Verificationp. 12
Check for Listening Servicesp. 14
Prevent Services from Binding to an Interfacep. 16
Restrict Services with Sandboxed Environmentsp. 18
Use proftp with a MySQL Authentication Sourcep. 21
Prevent Stack-Smashing Attacksp. 23
Lock Down Your Kernel with grsecurityp. 25
Restrict Applications with grsecurityp. 30
Restrict System Calls with Systracep. 32
Automated Systrace Policy Creationp. 35
Control Login Access with PAMp. 38
Restricted Shell Environmentsp. 42
Enforce User and Group Resource Limitsp. 44
Automate System Updatesp. 45
Windows Host Securityp. 47
Check Servers for Applied Patchesp. 47
Get a List of Open Files and Their Owning Processesp. 53
List Running Services and Open Portsp. 54
Enable Auditingp. 55
Secure Your Event Logsp. 56
Change Your Maximum Log File Sizesp. 57
Disable Default Sharesp. 58
Encrypt Your Temp Folderp. 60
Clear the Paging File at Shutdownp. 62
Restrict Applications Available to Usersp. 63
Network Securityp. 66
Detect ARP Spoofingp. 67
Create a Static ARP Tablep. 69
Firewall with Netfilterp. 71
Firewall with OpenBSD's PacketFilterp. 75
Create an Authenticated Gatewayp. 80
Firewall with Windowsp. 82
Keep Your Network Self-Containedp. 86
Test Your Firewallp. 87
MAC Filtering with Netfilterp. 90
Block OS Fingerprintingp. 91
Fool Remote Operating System Detection Softwarep. 94
Keep an Inventory of Your Networkp. 98
Scan Your Network for Vulnerabilitiesp. 100
Keep Server Clocks Synchronizedp. 106
Create Your Own Certificate Authorityp. 108
Distribute Your CA to Clientsp. 111
Encrypt IMAP and POP with SSLp. 113
Set Up TLS-Enabled SMTPp. 115
Detect Ethernet Sniffers Remotelyp. 117
Install Apache with SSL and suEXECp. 121
Secure BINDp. 125
Secure MySQLp. 128
Share Files Securely in Unixp. 130
Loggingp. 134
Run a Central Syslog Serverp. 135
Steer Syslogp. 136
Integrate Windows into Your Syslog Infrastructurep. 138
Automatically Summarize Your Logsp. 144
Monitor Your Logs Automaticallyp. 146
Aggregate Logs from Remote Sitesp. 149
Log User Activity with Process Accountingp. 154
Monitoring and Trendingp. 156
Monitor Availabilityp. 157
Graph Trendsp. 164
Run ntop for Real-Time Network Statsp. 166
Audit Network Trafficp. 169
Collect Statistics with Firewall Rulesp. 171
Sniff the Ether Remotelyp. 172
Secure Tunnelsp. 176
Set Up IPsec Under Linuxp. 176
Set Up IPsec Under FreeBSDp. 179
Set Up IPsec in OpenBSDp. 182
PPTP Tunnelingp. 183
Opportunistic Encryption with FreeS/WANp. 188
Forward and Encrypt Traffic with SSHp. 189
Quick Logins with SSH Client Keysp. 191
Squid Proxy over SSHp. 193
Use SSH as a SOCKS Proxyp. 195
Encrypt and Tunnel Traffic with SSLp. 198
Tunnel Connections Inside HTTPp. 200
Tunnel with VTun and SSHp. 202
Automatic vtund.conf Generatorp. 207
Create a Cross-Platform VPNp. 211
Tunnel PPPp. 216
Network Intrusion Detectionp. 219
Detect Intrusions with Snortp. 220
Keep Track of Alertsp. 224
Real-Time Monitoringp. 227
Manage a Sensor Networkp. 233
Write Your Own Snort Rulesp. 239
Prevent and Contain Intrusions with Snort_inlinep. 244
Automated Dynamic Firewalling with SnortSamp. 247
Detect Anomalous Behaviorp. 250
Automatically Update Snort's Rulesp. 252
Create a Distributed Stealth Sensor Networkp. 253
Use Snort in High-Performance Environments with Barnyardp. 254
Detect and Prevent Web Application Intrusionsp. 257
Simulate a Network of Vulnerable Hostsp. 261
Record Honeypot Activityp. 265
Recovery and Responsep. 268
Image Mounted Filesystemsp. 268
Verify File Integrity and Find Compromised Filesp. 270
Find Compromised Packages with RPMp. 274
Scan for Root Kitsp. 276
Find the Owner of a Networkp. 278
Indexp. 281
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program