Mastering Linux Security: Step by Step Practical Guide

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Linux is an open-source operating system that provides various utilities that help professionals to perform their tasks in an efficient and simple way. Linux has been known in the industry as one of the most stable operating systems. Linux OS provides a useful set of preinstalled utilities that allows the user to perform the required tasks easily, it also provides multiple applications and packages that can be installed to be used for different purposes. Using these utilities without limitations and restrictions would allow many of the breakthroughs that can be prevented by applying simple security standards. Securing a Linux machine is an important task and the security issue becomes one of the main priorities when dealing with the machine as a server. Security should be one of the first considerations at all stages of setting up a Linux computer. Securing a Linux machine is a primary responsibility and maintaining a secure environment becomes one of the main priorities when dealing with Log files. This book presents a detailed practical step by step guide to experiment and master Linux security-related tools.

Author(s): Musaab Hasan & Zayed Balbahaith
Edition: 1
Publisher: Lambert Academic Publishing
Year: 2020

Language: English
Pages: 125

Chapter I: Getting Started With Linux OS ..................................................................................... 3

Chapter Objectives ....................................................................................................................................... 4

Needed Tools ............................................................................................................................................... 4

Chapter Overview......................................................................................................................................... 4

Basic Linux Commands ................................................................................................................................. 5

Creating and Removing Directories............................................................................................................ 12

Output Redirection..................................................................................................................................... 15

Manipulating Files ...................................................................................................................................... 18

Running and managing processes in the background ................................................................................ 25

Becoming a super-user............................................................................................................................... 28

Using ssh to connect to another machine.................................................................................................. 32

Using VirtualBox and Kali Linux .................................................................................................................. 34

Examining Further Linux Commands.......................................................................................................... 35

End of Chapter Conclusions & Recommendations ..................................................................................... 50

Chapter II: Exploring Various Security Tools ............................................................................... 52

Chapter Objectives ..................................................................................................................................... 53

Needed Tools ............................................................................................................................................. 53

Chapter Overview....................................................................................................................................... 53

Tasks & Procedures .................................................................................................................................... 54

Default File Permissions ............................................................................................................................. 55

Password files............................................................................................................................................. 57

Sudo ........................................................................................................................................................... 58

Installing Software Packages (RPM and YUM) ........................................................................................... 62

Console and Login Security ........................................................................................................................ 65

Wireshark ................................................................................................................................................... 71

End of Chapter Conclusions & Recommendations ..................................................................................... 75

Chapter III Digging Deeper into Linux ........................................................................................ 76

Chapter Objectives ..................................................................................................................................... 77

Needed Tools ............................................................................................................................................. 77

Chapter Overview....................................................................................................................................... 77

SUID and SGID ............................................................................................................................................ 78

SUID Vulnerability ...................................................................................................................................... 82

Firewall ....................................................................................................................................................... 85

Immutable Files .......................................................................................................................................... 87

Forwarding X with OpenSSH ...................................................................................................................... 89

Managing Files............................................................................................................................................ 91

Mounting the File System and NFS ............................................................................................................ 93

End of Chapter Conclusions & Recommendations ..................................................................................... 97

Chapter IV Advanced Linux Tools ............................................................................................... 98

Chapter Objectives ..................................................................................................................................... 99

Needed Tools ............................................................................................................................................. 99

Chapter Overview....................................................................................................................................... 99

Syslog Basics ............................................................................................................................................. 100

Fine Tuning the Defaults .......................................................................................................................... 103

Dmesg....................................................................................................................................................... 104

Log Rotation ............................................................................................................................................. 105

Apache HTTP or Tomcat ........................................................................................................................... 108

Listing Open Files...................................................................................................................................... 109

Cracking the system through boot loader ................................................................................................ 111

File Integrity Check with TripWire ............................................................................................................ 115

Syslog-ng .................................................................................................................................................. 115

End of Chapter Conclusions & Recommendations ................................................................................... 116