Index
- co-location services,
    Hardware Security
  
- collecting evidence
  
- see incident response
- file auditing tools,
    Gathering Post-Breach Information
  
- dd,
    Gathering Post-Breach Information
  
- file,
    Gathering Post-Breach Information
  
- find,
    Gathering Post-Breach Information
  
- grep,
    Gathering Post-Breach Information
  
- md5sum,
    Gathering Post-Breach Information
  
- script,
    Investigating the Incident
  
- stat,
    Gathering Post-Breach Information
  
- strings,
    Gathering Post-Breach Information
  
 
- common exploits and attacks,
    Common Exploits and Attacks
  
- table,
    Common Exploits and Attacks
  
 
 
- common ports
  
- table,
    Common Ports
  
 
 
- communication ports,
    Common Ports
  
- communication tools
  
- secure,
    Security Enhanced Communication Tools
  
- GPG,
    Security Enhanced Communication Tools
  
- OpenSSH,
    Security Enhanced Communication Tools
  
 
 
- computer emergency response team,
    The Computer Emergency Response Team (CERT)
  
- controls,
    Security Controls
  
- administrative,
    Administrative Controls
  
 
- physical,
    Physical Controls
  
 
- technical,
    Technical Controls
  
 
 
- conventions
  
- document,
    Document Conventions
  
 
 
- cracker
  
- black hat hacker,
    Shades of Grey
  
 
 
- crackers
  
- definition,
    A Quick History of Hackers
  
 
 
- cupsd,
    Identifying and Configuring Services
  
- file
  
- file auditing using,
    Gathering Post-Breach Information
  
 
 
- file auditing
  
- tools,
    Gathering Post-Breach Information
  
 
 
- find
  
- file auditing using,
    Gathering Post-Breach Information
  
 
 
- firewall types,
    Firewalls
  
- network address translation (NAT),
    Firewalls
  
 
- packet filter,
    Firewalls
  
 
- proxy,
    Firewalls
  
 
 
- firewalls,
    Firewalls
  
- additional resources,
    Additional Resources
  
 
- and connection tracking,
    iptables and Connection Tracking
  
 
- and viruses,
    Viruses and Spoofed IP Addresses
  
 
- iptables,
    Netfilter and iptables
  
 
- personal,
    Personal Firewalls
  
 
- policies,
    Basic Firewall Policies
  
 
- stateful,
    iptables and Connection Tracking
  
 
- types,
    Firewalls
  
 
 
- FTP
  
- anonymous access,
    Anonymous Access
  
 
- anonymous upload,
    Anonymous Upload
  
 
- greeting banner,
    FTP Greeting Banner
  
 
- introducing,
    Securing FTP
  
 
- TCP wrappers and,
    Use TCP Wrappers To Control Access
  
 
- user accounts,
    User Accounts
  
 
- vsftpd,
    Securing FTP
  
 
 
- IDS
  
- see intrusion detection systems
 
- incident response
  
- and legal issues,
    Legal Considerations
  
 
- collecting evidence
  
- using dd,
    Collecting an Evidential Image
  
 
- computer emergency response team (CERT),
    The Computer Emergency Response Team (CERT)
  
 
- creating a plan,
    Creating an Incident Response Plan
  
 
- definition of,
    Defining Incident Response
  
 
- gathering post-breach information,
    Gathering Post-Breach Information
  
 
- implementation,
    Implementing the Incident Response Plan
  
 
- introducing,
    Incident Response
  
 
- investigation,
    Investigating the Incident
  
 
- post-mortem,
    Investigating the Incident
  
 
- reporting the incident,
    Reporting the Incident
  
 
- restoring and recovering resources,
    Restoring and Recovering Resources
  
 
 
- incident response plan,
    Creating an Incident Response Plan
  
- insecure services,
    Insecure Services
  
- rsh,
    Insecure Services
  
 
- Telnet,
    Insecure Services
  
 
- vsftpd,
    Insecure Services
  
 
 
- introduction,
    Introduction
  
- categories, using this manual,
    Introduction
  
 
- other Red Hat Enterprise Linux manuals,
    Introduction
  
 
- topics,
    Introduction
  
 
 
- intrusion detection systems,
    Intrusion Detection
  
- and log files,
    Host-based IDS
  
 
- defining,
    Defining Intrusion Detection Systems
  
 
- host-based,
    Host-based IDS
  
 
- network-based,
    Network-based IDS
  
- Snort,
    Snort
  
 
- RPM Package Manager (RPM),
    RPM as an IDS
  
 
- Tripwire,
    Tripwire
  
 
- types,
    IDS Types
  
 
 
- ip6tables,
    ip6tables
  
- IPsec,
    IPsec
  
- configuration,
    IPsec Network-to-Network configuration
  
- host-to-host,
    IPsec Host-to-Host Configuration
  
 
- host-to-host,
    IPsec Host-to-Host Configuration
  
 
- installing,
    IPsec Installation
  
 
- network-to-network,
    IPsec Network-to-Network configuration
  
 
- phases,
    IPsec
  
 
 
- iptables,
    Netfilter and iptables
  
- additional resources,
    Additional Resources
  
 
- and DMZs,
    DMZs and iptables
  
 
- and viruses,
    Viruses and Spoofed IP Addresses
  
 
- chains,
    Using iptables
  
- FORWARD,
    FORWARD and 	NAT Rules
  
- INPUT,
    Common iptables Filtering
  
- OUTPUT,
    Common iptables Filtering
  
- POSTROUTING,
    FORWARD and 	NAT Rules
  
- PREROUTING,
    FORWARD and 	NAT Rules,
    DMZs and iptables
  
 
- connection tracking,
    iptables and Connection Tracking
  
- states,
    iptables and Connection Tracking
  
 
- policies,
    Basic Firewall Policies
  
 
- rules,
    Saving and Restoring iptables Rules
  
- common,
    Common iptables Filtering
  
- forwarding,
    FORWARD and 	NAT Rules
  
- NAT,
    FORWARD and 	NAT Rules,
    DMZs and iptables
  
- restoring,
    Saving and Restoring iptables Rules
  
- saving,
    Saving and Restoring iptables Rules
  
 
- stateful inspection,
    iptables and Connection Tracking
  
- states,
    iptables and Connection Tracking
  
 
- using,
    Using iptables
  
 
 
- NAT
  
- see Network Address Translation
 
- Nessus,
    Nessus
  
- Netfilter,
    Netfilter and iptables
  
- additional resources,
    Additional Resources
  
 
 
- Netfilter 6,
    ip6tables
  
- netstat,
    Verifying Which Ports Are Listening
  
- Network Address Translation,
    FORWARD and 	NAT Rules
  
- with iptables,
    FORWARD and 	NAT Rules
  
 
 
- network services,
    Available Network Services
  
- buffer overflow
  
- ExecShield,
    Risks To Services
  
 
- identifying and configuring,
    Identifying and Configuring Services
  
 
- risks,
    Risks To Services
  
- buffer overflow,
    Risks To Services
  
- denial-of-service,
    Risks To Services
  
- script vulnerability,
    Risks To Services
  
 
 
- network topologies,
    Secure Network Topologies
  
- linear bus,
    Physical Topologies
  
 
- ring,
    Physical Topologies
  
 
- star,
    Physical Topologies
  
 
 
- networks,
    Hardware and Network Protection
  
- and security,
    Secure Network Topologies
  
 
- de-militarized zones (DMZs),
    Network Segmentation and DMZs
  
 
- hubs,
    Transmission Considerations
  
 
- segmentation,
    Network Segmentation and DMZs
  
 
- switches,
    Transmission Considerations
  
 
- wireless,
    Wireless Networks
  
 
 
- NFS,
    Securing NFS
  
- and Sendmail,
    NFS and Sendmail
  
 
- network design,
    Carefully Plan the Network
  
 
- syntax errors,
    Beware of Syntax Errors
  
 
 
- Nikto,
    Nikto
  
- NIS
  
- introducing,
    Securing NIS
  
 
- IPTables,
    Assign Static Ports and Use IPTables Rules
  
 
- Kerberos,
    Use Kerberos Authentication
  
 
- NIS domain name,
    Use a Password-like NIS Domain Name and Hostname
  
 
- planning network,
    Carefully Plan the Network
  
 
- securenets,
    Edit the /var/yp/securenets File
  
 
- static ports,
    Assign Static Ports and Use IPTables Rules
  
 
 
- nmap,
    Verifying Which Ports Are Listening,
    Scanning Hosts with Nmap
  
- command line version,
    Using Nmap
  
 
 
- password aging,
    Password Aging
  
- password security,
    Password Security
  
- aging,
    Password Aging
  
 
- and PAM,
    Forcing Strong Passwords
  
 
- auditing tools,
    Forcing Strong Passwords
  
- Crack,
    Forcing Strong Passwords
  
- John the Ripper,
    Forcing Strong Passwords
  
- Slurpie,
    Forcing Strong Passwords
  
 
- enforcement,
    Forcing Strong Passwords
  
 
- in an organization,
    Creating User Passwords Within an Organization
  
 
- methodology,
    Secure Password Creation Methodology
  
 
- strong passwords,
    Creating Strong Passwords
  
 
 
- passwords
  
- within an organization,
    Creating User Passwords Within an Organization
  
 
 
- pluggable authentication modules (PAM)
  
- strong password enforcement,
    Forcing Strong Passwords
  
 
 
- portmap,
    Identifying and Configuring Services
  
- and IPTables,
    Protect portmap With IPTables
  
 
- and TCP wrappers,
    Protect portmap With TCP Wrappers
  
 
 
- ports
  
- common,
    Common Ports
  
 
- monitoring,
    Verifying Which Ports Are Listening
  
 
 
- post-mortem,
    Investigating the Incident
  
- registering your subscription,
    Activate Your Subscription
  
- reporting the incident,
    Reporting the Incident
  
- restoring and recovering resources,
    Restoring and Recovering Resources
  
- patching the system,
    Patching the System
  
 
- reinstalling the system,
    Reinstalling the System
  
 
 
- risks
  
- insecure services,
    Inherently Insecure Services
  
 
- networks,
    Threats to Network Security
  
- architectures,
    Insecure Architectures
  
 
- open ports,
    Unused Services and Open Ports
  
 
- patches and errata,
    Unpatched Services
  
 
- servers,
    Threats to Server Security
  
- inattentive administration,
    Inattentive Administration
  
 
- workstations and PCs,
    Threats to Workstation and Home PC Security,
    Bad Passwords
  
- applications,
    Vulnerable Client Applications
  
 
 
- root,
    Allowing Root Access
  
- allowing access,
    Allowing Root Access
  
 
- disallowing access,
    Disallowing Root Access
  
 
- limiting access,
    Limiting Root Access
  
- and su,
    The su Command
  
- and sudo,
    The sudo Command
  
- with User Manager,
    The su Command
  
 
- methods of disabling,
    Disallowing Root Access
  
- changing the root shell,
    Disabling Root Logins
  
- disabling SSH logins,
    Disabling Root SSH Logins
  
- with PAM,
    Disabling Root Using PAM
  
 
 
- root user
  
- see root
 
- RPM
  
- and intrusion detection,
    RPM as an IDS
  
 
- importing GPG key,
    Using the Red Hat Errata Website
  
 
- verifying signed packages,
    Verifying Signed Packages,
    Installing Signed Packages
  
 
 
- security considerations
  
- hardware,
    Hardware and Network Protection
  
 
- network transmission,
    Transmission Considerations
  
 
- physical networks,
    Hardware and Network Protection
  
 
- wireless,
    Wireless Networks
  
 
 
- security errata,
    Security Updates
  
- applying changes,
    Applying the Changes
  
 
- via Red Hat errata website,
    Using the Red Hat Errata Website
  
 
- via Red Hat Network,
    Using Red Hat Network
  
 
- when to reboot,
    Applying the Changes
  
 
 
- security overview,
    Security Overview
  
- conclusion,
    Conclusion
  
 
- controls
  
- see controls
 
- defining computer security,
    What is Computer Security?
  
 
- Denial of Service (DoS),
    Security Today
  
 
- evolution of computer security,
    How did Computer Security Come about?
  
 
- viruses,
    Security Today
  
 
 
- sendmail,
    Identifying and Configuring Services
  
- and NFS,
    NFS and Sendmail
  
 
- introducing,
    Securing Sendmail
  
 
- limiting DoS,
    Limiting a Denial of Service Attack
  
 
 
- server security
  
- Apache HTTP Server,
    Securing the Apache HTTP Server
  
- cgi security,
    Restrict Permissions for Executable Directories
  
- directives,
    Securing the Apache HTTP Server
  
 
- FTP,
    Securing FTP
  
- anonymous access,
    Anonymous Access
  
- anonymous upload,
    Anonymous Upload
  
- greeting banner,
    FTP Greeting Banner
  
- TCP wrappers and,
    Use TCP Wrappers To Control Access
  
- user accounts,
    User Accounts
  
- vsftpd,
    Securing FTP
  
 
- NFS,
    Securing NFS
  
- network design,
    Carefully Plan the Network
  
- syntax errors,
    Beware of Syntax Errors
  
 
- NIS,
    Securing NIS
  
- IPTables,
    Assign Static Ports and Use IPTables Rules
  
- Kerberos,
    Use Kerberos Authentication
  
- NIS domain name,
    Use a Password-like NIS Domain Name and Hostname
  
- planning network,
    Carefully Plan the Network
  
- securenets,
    Edit the /var/yp/securenets File
  
- static ports,
    Assign Static Ports and Use IPTables Rules
  
 
- overview of,
    Server Security
  
 
- portmap,
    Securing Portmap
  
 
- ports
  
- monitoring,
    Verifying Which Ports Are Listening
  
 
- Sendmail,
    Securing Sendmail
  
- and NFS,
    NFS and Sendmail
  
- limiting DoS,
    Limiting a Denial of Service Attack
  
 
- TCP wrappers,
    Enhancing Security With TCP Wrappers
  
- attack warnings,
    TCP Wrappers and Attack Warnings
  
- banners,
    TCP Wrappers and Connection Banners
  
- logging,
    TCP Wrappers and Enhanced Logging
  
 
- xinetd,
    Enhancing Security With xinetd
  
- managing resources with,
    Controlling Server Resources
  
- preventing DoS with,
    Controlling Server Resources
  
- SENSOR trap,
    Setting a Trap
  
 
 
- services,
    Verifying Which Ports Are Listening
  
- Services Configuration Tool,
    Identifying and Configuring Services
  
- Snort,
    Snort
  
- sshd,
    Identifying and Configuring Services
  
- stat
  
- file auditing using,
    Gathering Post-Breach Information
  
 
 
- strings
  
- file auditing using,
    Gathering Post-Breach Information
  
 
 
- su
  
- and root,
    The su Command
  
 
 
- subscription registration,
    Activate Your Subscription
  
- sudo
  
- and root,
    The sudo Command
  
 
 
- updates
  
- see security errata
 
- Virtual Private Networks,
    Virtual Private Networks
  
- IPsec,
    IPsec
  
- configuration,
    IPsec Network-to-Network configuration
  
- host-to-host,
    IPsec Host-to-Host Configuration
  
- installing,
    IPsec Installation
  
 
 
- viruses
  
- trojans,
    Security Today
  
 
 
- VLAD the Scanner,
    VLAD the Scanner
  
- VPN,
    Virtual Private Networks
  
- vulnerabilities
  
- assessing with Nessus,
    Nessus
  
 
- assessing with Nikto,
    Nikto
  
 
- assessing with Nmap,
    Scanning Hosts with Nmap
  
 
- assessing with VLAD the Scanner,
    VLAD the Scanner
  
 
- assessment,
    Vulnerability Assessment
  
- defining,
    Defining Assessment and Testing
  
- establishing a methodology,
    Establishing a Methodology
  
- testing,
    Defining Assessment and Testing
  
 
 
- white hat hacker
  
- see hackers
 
- Wi-Fi networks
  
- see 802.11x
 
- wireless security,
    Wireless Networks
  
- 802.11x,
    Wireless Networks
  
 
 
- workstation security,
    Workstation Security
  
- BIOS,
    BIOS and Boot Loader Security
  
 
- boot loaders
  
- passwords,
    Boot Loader Passwords
  
 
- evaluating
  
- administrative control,
    Evaluating Workstation Security
  
- BIOS,
    Evaluating Workstation Security
  
- boot loaders,
    Evaluating Workstation Security
  
- communications,
    Evaluating Workstation Security
  
- passwords,
    Evaluating Workstation Security
  
- personal firewalls,
    Evaluating Workstation Security