Kategoriarkiv: Old Base

OS Fingerprint protection

Keep outsiders on a need-to-know basis regarding your operating systems. When performing network reconnaissance, one very valuable piece of information for would-be attackers is the operating system running on each system discovered in their scans. From an attacker’s point of … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

Installing nessus

# lynx -source http://install.nessus.org | sh ——————————————————————————– NESSUS INSTALLATION SCRIPT ——————————————————————————– This script will retrieve the latest version of Nessus via CVS, and will compile and install it on your system. To run this script, you must know the root … Læs resten

Udgivet i Knowledge Base, Linux, Old Base, Security | Skriv en kommentar

Set UP TLS-enabled SMTP (encryption)

Protect your users’ in-transit email from eavesdroppers. If you have set up encrypted POP and IMAP services [Hack #47], your users’ incoming email is protected from others once it reaches your servers, but what about their outgoing email? You can … Læs resten

Udgivet i Knowledge Base, Kryptering, Old Base | Skriv en kommentar

Encrypt IMAP and POP with SSL

Keep your email safe from prying eyes while also protecting your POP and IMAP passwords. Having your email available on an IMAP server is invaluable when you have to access your email from multiple locations. Unlike POP, IMAP stores all … Læs resten

Udgivet i Knowledge Base, Old Base | Skriv en kommentar

Distribute your CA to clients

Be sure all of your clients trust your new Certificate Authority. Once you have created a Certificate Authority (CA) [Hack #45], any certificates that are signed by your CA will be trusted by any program that trusts your CA. To … Læs resten

Udgivet i Knowledge Base, Kryptering, Networking, Old Base, Security | Skriv en kommentar

Create your own certificate authority

Sign your own certificates to use in securing your network. SSL certificates are usually thought of as being used for secure communications over the HTTP protocol. However, they are also useful in providing both a means for authentication and a … Læs resten

Udgivet i Knowledge Base, Kryptering, Old Base | Skriv en kommentar

Fool Remote operating system detection software on linux with iptables

Evade remote OS detection attempts by disguising your TCP/IP stack. Another method to thwart operating system detection attempts is to modify the behavior of your system’s TCP/IP stack and make it emulate the behavior of another operating system. This may … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

MAC Filtering with iptables

Keep unwanted machines off your network with MAC address whitelisting Media Access Control (MAC) address filtering is a well-known method for protecting wireless networks. This type of filtering works on the default deny principle: you specify the hosts that are … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar

Authenticated Gateway with OpenBSD

Use PF to keep unauthorized users off the network. Firewalling gateways have traditionally been used to block traffic from specific services or machines. Instead of watching IP addresses and port numbers, an authenticated gateway allows you to regulate traffic to … Læs resten

Udgivet i Knowledge Base, Networking, Old Base, OpenBSD | Skriv en kommentar

Simple firewall with openbsd

Use OpenBSD’s firewalling features to protect your network. PacketFilter, commonly known as PF, is the firewalling system available in OpenBSD. While it is a relatively new addition to the operating system, it has already surpassed IPFilter, the system it has … Læs resten

Udgivet i Knowledge Base, Networking, Old Base, OpenBSD | Skriv en kommentar