Lecture 4/10/2008

Basics of Linux Security
Outline:

  • How systems get compromised

  • Example of a Trojan

  • Stack overflow example

  • Internet Worm example

  • What hackers do on compromised hosts

  • General Steps for Hardening Security on a System

  • Package upgrades and md5 checksum verification

  • Open Ports List

  • Closing ports

  • TCP Wrappers

  • IP filtering firewalls (iptables)

  • Building iptables rules

  • Simple iptables script

  • NAT table

  • NAT iptables script

  • Port scanning

  • GNU Privacy Guard (GPG)

  • Intrusion detection

  • System logs

  • Log redirection and analysis

  • System Integrity Checkers

  • References

  • Practical Exercises


    Previous Pagecourse web site First Pagecourse web site Next Pagenext