Kategoriarkiv: Linux

Run central syslog

Keep your logs safe from attackers by storing them remotely. Once an intruder has gained entry into one of your systems, how are you to know when or if this has happened? By checking your logs, of course. What if … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

SFS Secure Filesharing on unix

Use SFS to help secure your remote filesystems. If you are using Unix systems and sharing files on your network, you are most likely using NFS. However, there are a lot of security problems, not only with individual implementations, but … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

Chrooting named

Lock down your BIND setup to help contain potential security problems. Due to BIND’s not-so-illustrious track record with regard to security, you’ll probably want to spend some time hardening your setup if you want to continue using it. One way … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

Apache security – ssl, suexec

Help secure your web applications with mod_ssl and suEXEC. Web server security is a very important issue these days, especially since people are always finding new and creative ways to put the Web to use. If you’re using any sort … Læs resten

Udgivet i Apache, Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

OS Fingerprint protection

Keep outsiders on a need-to-know basis regarding your operating systems. When performing network reconnaissance, one very valuable piece of information for would-be attackers is the operating system running on each system discovered in their scans. From an attacker’s point of … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

Installing nessus

# lynx -source http://install.nessus.org | sh ——————————————————————————– NESSUS INSTALLATION SCRIPT ——————————————————————————– This script will retrieve the latest version of Nessus via CVS, and will compile and install it on your system. To run this script, you must know the root … Læs resten

Udgivet i Knowledge Base, Linux, Old Base, Security | Skriv en kommentar

Fool Remote operating system detection software on linux with iptables

Evade remote OS detection attempts by disguising your TCP/IP stack. Another method to thwart operating system detection attempts is to modify the behavior of your system’s TCP/IP stack and make it emulate the behavior of another operating system. This may … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

MAC Filtering with iptables

Keep unwanted machines off your network with MAC address whitelisting Media Access Control (MAC) address filtering is a well-known method for protecting wireless networks. This type of filtering works on the default deny principle: you specify the hosts that are … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

Simple IPTABLE firewall

Protect your network with Linux’s powerful firewalling features. Linux has long had the capability for filtering packets, and it has come a long way since the early days in terms of both power and flexibility. The first generation of packet-filtering … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

Enforce user and groups resource limits

Make sure resource-hungry users don’t bring down your entire system. Whether it’s through malicious intent or an unintentional slip, having a user bring your system down to a slow crawl by using too much memory or CPU time is no … Læs resten

Udgivet i Knowledge Base, Linux, Old Base | Skriv en kommentar