Practical Linux Security Cookbook

Secure your Linux machines and keep them secured with the help of exciting recipes
Preview in Mapt

Practical Linux Security Cookbook

Tajinder Kalsi

1 customer reviews
Secure your Linux machines and keep them secured with the help of exciting recipes
Mapt Subscription
FREE
$29.99/m after trial
eBook
$25.20
RRP $35.99
Save 29%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$25.20
$44.99
$29.99p/m after trial
RRP $35.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Practical Linux Security Cookbook Book Cover
Practical Linux Security Cookbook
$ 35.99
$ 25.20
Linux Shell Scripting Cookbook, Second Edition Book Cover
Linux Shell Scripting Cookbook, Second Edition
$ 26.99
$ 5.40
Buy 2 for $22.90
Save $40.08
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781785286421
Paperback276 pages

Book Description

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.

Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.

With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.

With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.

Table of Contents

Chapter 1: Linux Security Problems
Introduction
The security policy of Linux
Configuring password protection
Configuring server security
Security controls
Conducting integrity checks of the installation medium using checksum
Using the LUKS disk encryption
Making use of sudoers – configuring sudo access
Scanning hosts with Nmap
Gaining a root on a vulnerable Linux system
Chapter 2: Configuring a Secure and Optimized Kernel
Introduction
Requirements for building and using a kernel
Creating a USB boot media
Retrieving a kernel source
Configuring and building a kernel
Installing and booting from a kernel
Testing and debugging a kernel
Configuring a console for debugging using Netconsole
Debugging a kernel on boot
Chapter 3: Local Filesystem Security
Viewing file and directory details using the ls command
Changing the file permissions using the chmod command
Implementing access control list (ACL)
File handling using the mv command (moving and renaming)
Install and configure a basic LDAP server on Ubuntu
Chapter 4: Local Authentication in Linux
User authentication and logging
Limiting the login capabilities of users
Monitoring user activity using acct
Login authentication using a USB device and PAM
Defining user authorization controls
Chapter 5: Remote Authentication
Remote server/host access using SSH
Disabling or enabling SSH root login
Restricting remote access with key-based login into SSH
Copying files remotely
Setting up a Kerberos server with Ubuntu
Chapter 6: Network Security
Managing the TCP/IP network
Using Iptables to configure a firewall
Blocking spoofed addresses
Blocking incoming traffic
Configuring and using the TCP Wrapper
Chapter 7: Security Tools
Linux sXID
PortSentry
Using Squid proxy
OpenSSL Server
Tripwire
Shorewall
Chapter 8: Linux Security Distros
Kali Linux
pfSense
DEFT – Digital Evidence and Forensic Toolkit
NST – Network Security Toolkit
Helix
Chapter 9: Patching a Bash Vulnerability
Understanding the bash vulnerability through Shellshock
Shellshock's security issues
The patch management system
Applying patches on the Linux systems
Chapter 10: Security Monitoring and Logging
Viewing and managing log files using Logcheck
Monitoring a network using Nmap
Using glances for system monitoring
Monitoring logs using MultiTail
Using system tools – Whowatch
Using system tools – stat
Using system tools – lsof
Using system tools – strace
Using Lynis

What You Will Learn

  • Learn about various vulnerabilities and exploits in relation to Linux systems
  • Configure and build a secure kernel and test it
  • Learn about file permissions and security and how to securely modify files
  • Explore various ways to authenticate local users while monitoring their activities.
  • Authenticate users remotely and securely copy files on remote systems
  • Review various network security methods including firewalls using iptables and TCP Wrapper
  • Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
  • Understand Bash vulnerability/security and patch management

Authors

Table of Contents

Chapter 1: Linux Security Problems
Introduction
The security policy of Linux
Configuring password protection
Configuring server security
Security controls
Conducting integrity checks of the installation medium using checksum
Using the LUKS disk encryption
Making use of sudoers – configuring sudo access
Scanning hosts with Nmap
Gaining a root on a vulnerable Linux system
Chapter 2: Configuring a Secure and Optimized Kernel
Introduction
Requirements for building and using a kernel
Creating a USB boot media
Retrieving a kernel source
Configuring and building a kernel
Installing and booting from a kernel
Testing and debugging a kernel
Configuring a console for debugging using Netconsole
Debugging a kernel on boot
Chapter 3: Local Filesystem Security
Viewing file and directory details using the ls command
Changing the file permissions using the chmod command
Implementing access control list (ACL)
File handling using the mv command (moving and renaming)
Install and configure a basic LDAP server on Ubuntu
Chapter 4: Local Authentication in Linux
User authentication and logging
Limiting the login capabilities of users
Monitoring user activity using acct
Login authentication using a USB device and PAM
Defining user authorization controls
Chapter 5: Remote Authentication
Remote server/host access using SSH
Disabling or enabling SSH root login
Restricting remote access with key-based login into SSH
Copying files remotely
Setting up a Kerberos server with Ubuntu
Chapter 6: Network Security
Managing the TCP/IP network
Using Iptables to configure a firewall
Blocking spoofed addresses
Blocking incoming traffic
Configuring and using the TCP Wrapper
Chapter 7: Security Tools
Linux sXID
PortSentry
Using Squid proxy
OpenSSL Server
Tripwire
Shorewall
Chapter 8: Linux Security Distros
Kali Linux
pfSense
DEFT – Digital Evidence and Forensic Toolkit
NST – Network Security Toolkit
Helix
Chapter 9: Patching a Bash Vulnerability
Understanding the bash vulnerability through Shellshock
Shellshock's security issues
The patch management system
Applying patches on the Linux systems
Chapter 10: Security Monitoring and Logging
Viewing and managing log files using Logcheck
Monitoring a network using Nmap
Using glances for system monitoring
Monitoring logs using MultiTail
Using system tools – Whowatch
Using system tools – stat
Using system tools – lsof
Using system tools – strace
Using Lynis

Book Details

ISBN 139781785286421
Paperback276 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Linux Shell Scripting Cookbook, Second Edition Book Cover
Linux Shell Scripting Cookbook, Second Edition
$ 26.99
$ 5.40
Mastering Linux Network Administration Book Cover
Mastering Linux Network Administration
$ 39.99
$ 28.00
Python Machine Learning Book Cover
Python Machine Learning
$ 35.99
$ 25.20
Linux Mint Essentials Book Cover
Linux Mint Essentials
$ 29.99
$ 21.00
Learning Linux Binary Analysis Book Cover
Learning Linux Binary Analysis
$ 35.99
$ 25.20
Learning Docker Book Cover
Learning Docker
$ 39.99
$ 8.00