Index
A
- Access Control Lists
- used, for accessing files / Using ACLs to access files, How to do it..., There's more...
- Access Management
- with IDAM / Access Management using IDAM, How to do it...
- acct
- used, for monitoring user activity / Monitoring user activity using acct, Getting ready, How to do it...
- antivirus
- installing, on Linux / Installing an antivirus on Linux, How to do it...
- ARM images / Kali Linux
- auditd daemon
- using / Using the auditd daemon, How to do it...
- aureport
- used, for reading logs / Using ausearch and aureport to read logs, How to do it..., How it works...
- ausearch
- used, for reading logs / Using ausearch and aureport to read logs, How to do it..., How it works...
B
- backup plans
- missing / Missing backup plans
- fwbackups / fwbackups
- rsync / rsync
- Amanda / Amanda (Advanced Maryland Automatic Network Disk Archiver)
- Simple Backup Solution (SBS) / Simple Backup Solution (SBS)
- Bacula / Bacula
- bash vulnerability
C
- Certificate Signing Request (CSR) / There's more...
- chmod command
- used, for setting permissions on files / Using chmod to set permissions on files and directories, How to do it..., There's more...
- used, for setting permissions on directories / Using chmod to set permissions on files and directories, How to do it..., There's more...
- chown command
- used, for changing ownership of files / Using chown to change ownership of files and directories, How to do it...
- used, for changing ownership of directories / Using chown to change ownership of files and directories, How to do it...
- ClamAV
- Core Set Rules (CSR) / How to do it...
- country-specific traffic
- blocking, country-specific traffic used / Blocking country-specific traffic using mod_security, How to do it...
- Current Working Directory (CWD) / How to do it...
D
- Denial of Service (DoS) / Blocking spoofed addresses
- Detection System (IDS) / Tripwire
- Digital Evidence and Forensic Toolkit (DEFT) / Digital Evidence and Forensic Toolkit (DEFT)
- directories
- permissions, setting with chmod command / Using chmod to set permissions on files and directories, How to do it..., There's more...
- ownership, changing with chown command / Using chown to change ownership of files and directories, How to do it...
- directories details
- viewing, with Is command / Viewing files and directory details using ls, How to do it…
E
- extended file attributes
- used, for protecting sensitive files / Using extended file attributes to protect sensitive files, How to do it...
F
- files
- permissions, setting with chmod command / Using chmod to set permissions on files and directories, How to do it..., There's more...
- ownership, changing with chown command / Using chown to change ownership of files and directories, How to do it...
- accessing, with Access Control Lists / Using ACLs to access files, How to do it..., There's more...
- handling, with mv command / File handling using the mv command (moving and renaming), How it works...
- copying, remotely / Copying files remotely, How to do it..., How it works...
- files details
- viewing, with Is command / Viewing files and directory details using ls, How to do it…
- file transfer security / File transfer security – FTP
- firewall
- configuring, IP tables used / Using IP tables for configuring a firewall, How to do it..., How it works...
- FTP, secure data transfer
- standard FTP, disabling / File transfer security – FTP
- encryption / File transfer security – FTP
- hashing / File transfer security – FTP
- FTP, security risks
- FTP bounce attack / File transfer security – FTP
- FTP brute force attack / File transfer security – FTP
- packet capture / File transfer security – FTP
- spoof attack / File transfer security – FTP
- Fully Qualified Domain Name (FQDN) / Getting ready
G
- Glances
- used, for system monitoring / Using Glances for system monitoring, How to do it...
- Grsync / Rsync and Grsync – backup tool, How to do it...
H
- hosts
- scanning, with Nmap / Scanning hosts with Nmap, How to do it...
I
- IDAM
- used, for Access Management / Access Management using IDAM, How to do it...
- incoming traffic
- blocking / Blocking incoming traffic, How to do it..., How it works...
- integrity of installation medium
- checking, checksum used / Checking the integrity of installation medium by using checksum, See also
- IP tables
- used, for configuring firewall / Using IP tables for configuring a firewall, How to do it..., How it works...
- about / Getting ready
- Is command
- used, for viewing files details / Viewing files and directory details using ls, How to do it…
- used, for viewing directory details / Viewing files and directory details using ls, How to do it…
K
- Kali 2.2
- URL, for downloading / Kali Linux
- Kali Linux / Kali Linux
- Kali Linux VMWare / Kali Linux
- Kerberos server
- setting up, with Ubuntu / Setting up a Kerberos server with Ubuntu, How to do it..., How it works...
- kernel
- configuring / Configuring and building kernel, How to do it...
- building / Configuring and building kernel, How to do it..., How to do it..., How it works...
- installing from / Installing and booting from a kernel, How it works...
- booting from / Installing and booting from a kernel, How it works...
- testing / Kernel testing and debugging, Getting ready, How to do it..., How it works...
- debugging / Kernel testing and debugging, Getting ready, How to do it...
- console, configuring for debug netconsole used / Configuring console for debugging using netconsole
- kernel boot
- debugging / Debugging kernel boot
- kernel errors
- about / Kernel errors
- causes / Causes of kernel errors
- kernel parameters
- checking, Lynis used / Checking kernel parameters using Lynis, How to do it...
- kernel source
- retrieving / Retrieving the kernel source
- key-based login, into SSH
- for restricting remote access / Key-based login into SSH for restricting remote access, How to do it...
L
- LDAP server
- installing, on Ubuntu / Installing and configuring a basic LDAP server on Ubuntu, How to do it..., How it works...
- configuring, on Ubuntu / Installing and configuring a basic LDAP server on Ubuntu, How to do it..., How it works...
- Lightweight Directory Access Protocol (LDAP)
- about / Using LDAP for user authentication and management
- using, user authentication / Using LDAP for user authentication and management, How to do it...
- using, user management / Using LDAP for user authentication and management, How to do it...
- Linux
- patches, applying / Applying patches in Linux, How it works...
- antivirus, installing / Installing an antivirus on Linux
- Linux patch management system / Linux patch management system, How to do it..., How it works...
- Linux security myths / Linux security myths, Myth – as Linux is open source, it is considered to be insecure,
- Linux sXID / Linux sXID, How to do it..., How it works...
- Linux Unified Key Setup (LUKS) / Using LUKS disk encryption
- Linux vulnerabilities / Other well-known Linux vulnerabilities, How it works...
- log files
- viewing, Logcheck used / Viewing and managing log files using Logcheck, How to do it...
- managing, Logcheck used / Viewing and managing log files using Logcheck, How to do it...
- login authentication
- with USB device / Login authentication using a USB device and PAM, How to do it...
- with Pluggable Authentication Modules (PAM) / Login authentication using a USB device and PAM, How to do it...
- login capabilities
- limiting, of users / Limiting login capabilities of users, How to do it..., How it works...
- logs
- monitoring, MultiTail tool used / Monitoring logs using MultiTail, How to do it...
- LUKS disk encryption
- Lynis
- used, for hardening / Hardening using Lynis, How to do it..., How it works...
- about / Hardening using Lynis
M
- Mandatory Access Control (MAC)
- implementing, with SELinux / Implementing Mandatory Access Control with SELinux, How it works...
- MultiTail tool
- used, for monitoring logs / Monitoring logs using MultiTail, How to do it...
- mv command
- used, for handling files / File handling using the mv command (moving and renaming), How it works...
N
- network
- monitoring, Nmap used / Monitoring the network using Nmap, How to do it...
- monitoring, OpenNMS used / Network monitoring using OpenNMS, Getting ready, How to do it...
- Network Mapper (Nmap) / Monitoring the network using Nmap
- network security
- monitoring, Suricata used / Network security monitoring using Suricata, How to do it...
- monitoring, Security Onion used / Network security monitoring using Security Onion, How to do it..., How it works...
- Network Security Toolkit (NST) / Network Security Toolkit (NST), How to do it...
- network traffic
- monitoring, packet sniffer used / Using a packet sniffer to monitor network traffic, How to do it...
- securing, SSL used / Securing network traffic using SSL, How to do it...
- Nikto
- used, for web server scanning / Using Nikto for web server scanning, How to do it...
O
- OpenNMS
- used, for monitoring network / Network monitoring using OpenNMS, Getting ready, How to do it...
- Open SSL server / Open SSL server, How to do it..., There's more...
- OpenVAS
- used, for finding vulnerabilities / Finding vulnerabilities with OpenVAS, How to do it...
- about / Finding vulnerabilities with OpenVAS
- URL / Getting ready
- OSSEC / OSSEC, How to do it...
P
- packet sniffer
- used, for monitoring network traffic / Using a packet sniffer to monitor network traffic, How to do it...
- password logins
- disabling / Disabling username/password logins, How to do it...
- patches
- applying, in Linux / Applying patches in Linux, How it works...
- pfSense / pfSense, How to do it...
- Pluggable Authentication Modules (PAM)
- used, for login authentication / Login authentication using a USB device and PAM, How to do it...
- about / Getting ready
- Port Sentry / Port Sentry, How to do it..., How it works...
- Program Text (TXT) / How to do it...
Q
- Qubes / Qubes OS, How to do it...
- Qubes OS / Qubes OS, How to do it...
- quiet splash option / How to do it...
R
- Real time IP LAN
- monitoring, IPTraf used / Real time IP LAN monitoring using IPTraf, How to do it...
- remote host access
- with Secure Shell (SSH) / Remote server/host access using SSH, How to do it...
- remote server access
- with Secure Shell (SSH) / Remote server/host access using SSH, How to do it...
- remote service login / Remote service login – Telnet, How to do it...
- Remote sync (Rsync) / Rsync and Grsync – backup tool, How to do it...
- Root Directory (RTD) / How to do it...
- rootkits
- finding / Finding rootkits, How to do it...
- root login
- enabling, over SSH / Enabling and disabling root login over SSH, How it works...
- disabling, over SSH / Enabling and disabling root login over SSH, How it works...
S
- secure remote login / Secure remote login – SSH, How to do it...
- Secure Shell (SSH)
- used, for remote server access / Remote server/host access using SSH, How to do it...
- used, for remote host access / Remote server/host access using SSH, How to do it...
- root login, enabling / Enabling and disabling root login over SSH, How it works...
- root login, disabling / Enabling and disabling root login over SSH, How it works...
- security controls
- defining / Defining security controls
- installing / Installation
- boot and disk / Boot and disk
- network and services / Network and services
- intrusion detection / Intrusion detection and Denial of Service (DoS)
- Denial of Service (DoS) / Intrusion detection and Denial of Service (DoS)
- auditing and availability / Auditing and availability
- Security Onion
- about / Security Onion, How to do it..., Network security monitoring using Security Onion
- used, for monitoring network security / Network security monitoring using Security Onion, How to do it..., How it works...
- security policy
- about / Security policy, Security policy – server security
- developing / Developing a security policy
- Linux security myths / Linux security myths
- general policy / General policy
- configuration policy / Configuration policy
- policy, monitoring / Monitoring policy
- SELinux
- used, for implementing Mandatory Access Control (MAC) / Implementing Mandatory Access Control with SELinux, Getting ready, How it works...
- sensitive files
- protecting, with extended file attributes / Using extended file attributes to protect sensitive files, How to do it...
- server security
- configuring / Configuring server security
- user management / User management
- password policy / Password policy
- configuration policy / Configuration policy
- policy, monitoring / Monitoring policy
- Shellshock
- security issues / Security issues – Shellshock, How to do it..., How it works...
- Shorewall / Shorewall, How to do it..., How it works...
- Simple Mail Transfer Protocol (SMTP)
- about / Securing Mail Transfer – SMTP
- securing / Securing Mail Transfer – SMTP, How to do it...
- Snort / Snort, How to do it...
- spoofed addresses
- blocking / Blocking spoofed addresses, How to do it..., How it works...
- Squid proxy
- using / Using Squid proxy, How to do it..., How it works...
- SSL / Securing network traffic using SSL
- sudoer
- usage / Make use of sudoers – configuring sudo access, How it works…
- vulnerability assessment / Vulnerability assessment
- systemd / Auditing system services with systemctl
- system services
- auditing, with systemctl / Auditing system services with systemctl, How it works...
- system tools
- whowatch, using / Using system tools – whowatch, How to do it..., How it works
- stat, using / Using system tools – stat, How to do it...
- lsof, using / Using System tools – lsof, How to do it...
- strace, using / Using System tools – strace, How to do it..., How it works
T
- Tails / Tails OS
- Tails OS / Tails OS, How to do it...
- TCP/IP networks
- managing / Managing TCP/IP networks, How to do it..., How it works...
- TCP Wrappers
- Telnet / Remote service login – Telnet
- TLS / Securing network traffic using SSL
- Tripwire / Tripwire, How to do it...
U
- Ubuntu
- LDAP server, installing / Installing and configuring a basic LDAP server on Ubuntu, How to do it..., How it works...
- LDAP server, configuring / Installing and configuring a basic LDAP server on Ubuntu, How to do it..., How it works...
- Kerberos server, setting up / Setting up a Kerberos server with Ubuntu, How to do it..., How it works...
- USB boot media
- creating / Creating USB boot media
- USB device
- used, for login authentication / Login authentication using a USB device and PAM, How to do it...
- user activity
- monitoring, with acct / Monitoring user activity using acct, Getting ready, How to do it...
- user authentication
- about / User authentication and logging, How to do it..., How it works...
- Lightweight Directory Access Protocol (LDAP), using / Using LDAP for user authentication and management, How to do it...
- user authorization controls
- defining / Defining user authorization controls, How to do it...
- user logging / User authentication and logging, How to do it..., How it works...
- user management
- Lightweight Directory Access Protocol (LDAP), using / Using LDAP for user authentication and management, How to do it...
- username logins
- disabling / Disabling username/password logins, How to do it...
- users
- login capabilities, limiting / Limiting login capabilities of users, How to do it..., How it works...
V
- VirtualBox / Kali Linux
- vulnerabilities
- finding, with OpenVAS / Finding vulnerabilities with OpenVAS, How to do it...
- vulnerable Linux system
- root, gaining / Gaining root on a vulnerable Linux system, How to do it...
W
- Web Application Firewall (WAF) / How to do it...
- web server
- about / Web server – HTTPD, How to do it...
- scanning, Nikto used / Using Nikto for web server scanning, How to do it...
X
- Xen hypervisor / How it works...