Toggle navigation
Home
Networking
Network security hacks
Network Security Hacks
Credits
About the Author
Contributors
Acknowledgments
Preface
Why Network Security Hacks?
How This Book Is Organized
Conventions Used in This Book
Using Code Examples
How to Contact Us
Got a Hack?
Chapter 1. Unix Host Security
Hacks #1-20
Hack 1 Secure Mount Points
Hack 2 Scan for SUID and SGID Programs
Hack 3 Scan For World- and Group-Writable Directories
Hack 4 Create Flexible Permissions Hierarchies with POSIX ACLs
Hack 5 Protect Your Logs from Tampering
Hack 6 Delegate Administrative Roles
Hack 7 Automate Cryptographic Signature Verification
Hack 8 Check for Listening Services
Hack 9 Prevent Services from Binding to an Interface
Hack 10 Restrict Services with Sandboxed Environments
Hack 11 Use proftp with a MySQL Authentication Source
Hack 12 Prevent Stack-Smashing Attacks
Hack 13 Lock Down Your Kernel with grsecurity
Hack 14 Restrict Applications with grsecurity
Hack 15 Restrict System Calls with Systrace
Hack 16 Automated Systrace Policy Creation
Hack 17 Control Login Access with PAM
Hack 18 Restricted Shell Environments
Hack 19 Enforce User and Group Resource Limits
Hack 20 Automate System Updates
Chapter 2. Windows Host Security
Hacks #21-30
Hack 21 Check Servers for Applied Patches
Hack 22 Get a List of Open Files and Their Owning Processes
Hack 23 List Running Services and Open Ports
Hack 24 Enable Auditing
Hack 25 Secure Your Event Logs
Hack 26 Change Your Maximum Log File Sizes
Hack 27 Disable Default Shares
Hack 28 Encrypt Your Temp Folder
Hack 29 Clear the Paging File at Shutdown
Hack 30 Restrict Applications Available to Users
Chapter 3. Network Security
Hacks #31-53
Hack 31 Detect ARP Spoofing
Hack 32 Create a Static ARP Table
Hack 33 Firewall with Netfilter
Hack 34 Firewall with OpenBSD's PacketFilter
Hack 35 Create an Authenticated Gateway
Hack 36 Firewall with Windows
Hack 37 Keep Your Network Self-Contained
Hack 38 Test Your Firewall
Hack 39 MAC Filtering with Netfilter
Hack 40 Block OS Fingerprinting
Hack 41 Fool Remote Operating System Detection Software
Hack 42 Keep an Inventory of Your Network
Hack 43 Scan Your Network for Vulnerabilities
Hack 44 Keep Server Clocks Synchronized
Hack 45 Create Your Own Certificate Authority
Hack 46 Distribute Your CA to Clients
Hack 47 Encrypt IMAP and POP with SSL
Hack 48 Set Up TLS-Enabled SMTP
Hack 49 Detect Ethernet Sniffers Remotely
Hack 50 Install Apache with SSL and suEXEC
Hack 51 Secure BIND
Hack 52 Secure MySQL
Hack 53 Share Files Securely in Unix
Chapter 4. Logging
Hacks #54-60
Hack 54 Run a Central Syslog Server
Hack 55 Steer Syslog
Hack 56 Integrate Windows into Your Syslog Infrastructure
Hack 57 Automatically Summarize Your Logs
Hack 58 Monitor Your Logs Automatically
Hack 59 Aggregate Logs from Remote Sites
Hack 60 Log User Activity with Process Accounting
Chapter 5. Monitoring and Trending
Hacks #61-66
Hack 61 Monitor Availability
Hack 62 Graph Trends
Hack 63 Run ntop for Real-Time Network Stats
Hack 64 Audit Network Traffic
Hack 65 Collect Statistics with Firewall Rules
Hack 66 Sniff the Ether Remotely
Chapter 6. Secure Tunnels
Hacks #67-81
Hack 67 Set Up IPsec Under Linux
Hack 68 Set Up IPsec Under FreeBSD
Hack 69 Set Up IPsec in OpenBSD
Hack 70 PPTP Tunneling
Hack 71 Opportunistic Encryption with FreeS/WAN
Hack 72 Forward and Encrypt Traffic with SSH
Hack 73 Quick Logins with SSH Client Keys
Hack 74 Squid Proxy over SSH
Hack 75 Use SSH as a SOCKS Proxy
Hack 76 Encrypt and Tunnel Traffic with SSL
Hack 77 Tunnel Connections Inside HTTP
Hack 78 Tunnel with VTun and SSH
Hack 79 Automatic vtund.conf Generator
Hack 80 Create a Cross-Platform VPN
Hack 81 Tunnel PPP
Chapter 7. Network Intrusion Detection
Hacks #82-95
Hack 82 Detect Intrusions with Snort
Hack 83 Keep Track of Alerts
Hack 84 Real-Time Monitoring
Hack 85 Manage a Sensor Network
Hack 86 Write Your Own Snort Rules
Hack 87 Prevent and Contain Intrusions with Snort_inline
Hack 88 Automated Dynamic Firewalling with SnortSam
Hack 89 Detect Anomalous Behavior
Hack 90 Automatically Update Snort's Rules
Hack 91 Create a Distributed Stealth Sensor Network
Hack 92 Use Snort in High-Performance Environments with Barnyard
Hack 93 Detect and Prevent Web Application Intrusions
Hack 94 Simulate a Network of Vulnerable Hosts
Hack 95 Record Honeypot Activity
Chapter 8. Recovery and Response
Hacks #96-100
Hack 96 Image Mounted Filesystems
Hack 97 Verify File Integrity and Find Compromised Files
Hack 98 Find Compromised Packages with RPM
Hack 99 Scan for Root Kits
Hack 100 Find the Owner of a Network
Colophon
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.