Nitesh Dhanjani (Belleview, WA) is an information systems security consultant for Foundstone. He has had over 6 years of experience with system administration and information security. Prior to joining Foundstone's team, Nitesh was involved with the development of various Linux loadable kernel modules. He continues to be active with systems programming. Nitesh has also worked with Ernst & Young LLP where he performed various attack and penetration reviews for many significant companies in the IT arena. Nitesh graduated from Purdue University with both a Bachelors and Masters in Computer Science. While at Purdue, he was involved in numerous research projects with the CERIAS(Center for Education and Research in Information Assurance and Security) team. He also helped teach C and C++ courses. Mike Horton (Seattle, WA), series editor for the HackNotes[trademark] series, is an information systems security consultant for Foundstone, with an emphasis on secure system design, security architecture, operational security and ethical hacking. Prior to joining Foundstone, Mike was the Founder and Chief Technology Architect for Mercury Prime, a provider of secure real-time communication software. Previously, Mike was a senior consultant with Ernst & Young LLP where he was responsible for their ethical hacking and security architecture solutions services. Mike has performed numerous ethical hacking exercises for many significant companies in the IT and business arenas.
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!
- Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
- Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
- Protect against privilege escalation attacks
- Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
- Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
- Learn in-depth and current Linux and Unix system hardening guidelines
- Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
- Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
- Understand the latest wireless (802.11) hacking techniques, tools, and defenses