Hacking Linux Exposed - Softcover

Lee, James; Hatch, Brian; Kurtz, George

 
9780072127737: Hacking Linux Exposed

Synopsis

Tighten holes and maintain security on your Linux system! From one of the authors of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes a must-have security handbook for anyone running Linux. This cutting-edge volu

"synopsis" may belong to another edition of this title.

About the Authors

Brian Hatch is a UNIX/Linux security consultant, administrator, and expert hacker with Onsight, Inc. He has taught various courses at Northwestern University and is the co-maintainer of Stunnel, a widely used secure SSL wrapper. He is the lead author of the first edition of Hacking Exposed Linux.

James Lee is a Perl hacker, Linux administrator, security consultant, and open source advocate. James is the founder and CEO of Onsight Inc., a consulting firm specializing in Perl training and web development. James is also a co-author of the first edition of Hacking Exposed Linux.

George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfees Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfees CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

From the Back Cover

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is constantly being compromised. Linux has always been considered the digital playground for hackers. Many hacks, exploits, and network security tools are written on Linux because it's readily available. Hacking Linux Exposed: Linux Security Secrets & Solutions shows you, step-by-step, how to defEND against the latest Linux attacks by understanding the hacker's methods and sinister thought processes. You'll learn how your adversaries gather information, acquire targets, escalate privilege, gain control, plant back doors, and cover their tracks. Each chapter is divided into bite-sized chunks, covering highly publicized and little-known break-ins, tips on why they occurred, and detailed countermeasures that no Linux professional can afford to be without.


-Get details on the security features of each Linux distribution, including Red Hat Linux, SuSE, Debian, and Slackware.
-Zero in on vulnerable systems using whois, traceroute, DNS zone transfers, OS detection, ping sweeps, and port scans
-Detect Trojan horses, backdoors, password cracking, IP spoofing, session hijacking, and trail hiding
-Implement Log analysis tools such as the Advanced Intrusion Detection Environment (AIDE) and advanced kernel security patches, including the Linux Intrusion Detection System (LIDS)
-Learn how to prevent local users from getting root privileges
-Prevent Denial of Service and other network attacks
-Configure FTP sites, DNS servers, and other daemons securely
-Plug common and obscure security holes in SENDmail, Qmail, Postfix, POP, and IMAP servers
-DefEND against Web server attacks using secure scripting techniques, user verification, and secure Apache Server configurations
-Design, position, and test secure firewalls and other network access restrictions

"About this title" may belong to another edition of this title.