Network Security Hacks 2nd Edition
Download is available until [expire_date]
  • Version
  • Download 6
  • File Size 7.75 MB
  • File Count 1
  • Create Date March 19, 2018
  • Last Updated January 9, 2024

Network Security Hacks 2nd Edition

Network Security Hacks 2nd Edition In the fast-moving world of computers, things are always changing.

Since the first edition of this strong-selling book Network Security Hacks 2nd Edition appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity.

The second edition (Network Security Hacks 2nd Edition) offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.

Network Security Hacks 2nd Edition: This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots).

And techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks.

System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

In fact, this "roll up your sleeves and get busy" security book (Network Security Hacks 2nd Edition) features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages.

These hacks are quick, clever, and devilishly effective.

Network Security Hacks 2nd Edition - table of contents -

  1. Chapter 1 Unix Host Security

    1. Secure Mount Points

    2. Scan for SUID and SGID Programs

    3. Scan for World- and Group-Writable Directories

    4. Create Flexible Permissions Hierarchies with POSIX ACLs

    5. Protect Your Logs from Tampering

    6. Delegate Administrative Roles

    7. Automate Cryptographic Signature Verification

    8. Check for Listening Services

    9. Prevent Services from Binding to an Interface

    10. Restrict Services with Sandboxed Environments

    11. Use proftpd with a MySQL Authentication Source

    12. Prevent Stack-Smashing Attacks

    13. Lock Down Your Kernel with grsecurity

    14. Restrict Applications with grsecurity

    15. Restrict System Calls with systrace

    16. Create systrace Policies Automatically

    17. Control Login Access with PAM

    18. Restrict Users to SCP and SFTP

    19. Use Single-Use Passwords for Authentication

    20. Restrict Shell Environments

    21. Enforce User and Group Resource Limits

    22. Automate System Updates

  2. Chapter 2 Windows Host Security

    1. Check Servers for Applied Patches

    2. Use Group Policy to Configure Automatic Updates

    3. List Open Files and Their Owning Processes

    4. List Running Services and Open Ports

    5. Enable Auditing

    6. Enumerate Automatically Executed Programs

    7. Secure Your Event Logs

    8. Change Your Maximum Log File Sizes

    9. Back Up and Clear the Event Logs

    10. Disable Default Shares

    11. Encrypt Your Temp Folder

    12. Back Up EFS

    13. Clear the Paging File at Shutdown

    14. Check for Passwords That Never Expire

  3. Chapter 3 Privacy and Anonymity

    1. Evade Traffic Analysis

    2. Tunnel SSH Through Tor

    3. Encrypt Your Files Seamlessly

    4. Guard Against Phishing

    5. Use the Web with Fewer Passwords

    6. Encrypt Your Email with Thunderbird

    7. Encrypt Your Email in Mac OS X

  4. Chapter 4 Firewalling

    1. Firewall with Netfilter

    2. Firewall with OpenBSD’s PacketFilter

    3. Protect Your Computer with the Windows Firewall

    4. Close Down Open Ports and Block Protocols

    5. Replace the Windows Firewall

    6. Create an Authenticated Gateway

    7. Keep Your Network Self-Contained

    8. Test Your Firewall

    9. MAC Filter with Netfilter

    10. Block Tor

  5. Chapter 5 Encrypting and Securing Services

    1. Encrypt IMAP and POP with SSL

    2. Use TLS-Enabled SMTP with Sendmail

    3. Use TLS-Enabled SMTP with Qmail

    4. Install Apache with SSL and suEXEC

    5. Secure BIND

    6. Set Up a Minimal and Secure DNS Server

    7. Secure MySQL

    8. Share Files Securely in Unix

  6. Chapter 6 Network Security

    1. Detect ARP Spoofing

    2. Create a Static ARP Table

    3. Protect Against SSH Brute-Force Attacks

    4. Fool Remote Operating System Detection Software

    5. Keep an Inventory of Your Network

    6. Scan Your Network for Vulnerabilities

    7. Keep Server Clocks Synchronized

    8. Create Your Own Certificate Authority

    9. Distribute Your CA to Clients

    10. Back Up and Restore a Certificate Authority with Certificate Services

    11. Detect Ethernet Sniffers Remotely

    12. Help Track Attackers

    13. Scan for Viruses on Your Unix Servers

    14. Track Vulnerabilities

  7. Chapter 7 Wireless Security

    1. Turn Your Commodity Wireless Routers into a Sophisticated Security Platform

    2. Use Fine-Grained Authentication for Your Wireless Network

    3. Deploy a Captive Portal

  8. Chapter 8 Logging

    1. Run a Central Syslog Server

    2. Steer Syslog

    3. Integrate Windows into Your Syslog Infrastructure

    4. Summarize Your Logs Automatically

    5. Monitor Your Logs Automatically

    6. Aggregate Logs from Remote Sites

    7. Log User Activity with Process Accounting

    8. Centrally Monitor the Security Posture of Your Servers

  9. Chapter 9 Monitoring and Trending

    1. Monitor Availability

    2. Graph Trends

    3. Get Real-Time Network Stats

    4. Collect Statistics with Firewall Rules

    5. Sniff the Ether Remotely

  10. Chapter 10 Secure Tunnels

    1. Set Up IPsec Under Linux

    2. Set Up IPsec Under FreeBSD

    3. Set Up IPsec in OpenBSD

    4. Encrypt Traffic Automatically with Openswan

    5. Forward and Encrypt Traffic with SSH

    6. Automate Logins with SSH Client Keys

    7. Use a Squid Proxy over SSH

    8. Use SSH As a SOCKS Proxy

    9. Encrypt and Tunnel Traffic with SSL

    10. Tunnel Connections Inside HTTP

    11. Tunnel with VTun and SSH

    12. Generate VTun Configurations Automatically

    13. Create a Cross-Platform VPN

    14. Tunnel PPP

  11. Chapter 11 Network Intrusion Detection

    1. Detect Intrusions with Snort

    2. Keep Track of Alerts

    3. Monitor Your IDS in Real Time

    4. Manage a Sensor Network

    5. Write Your Own Snort Rules

    6. Prevent and Contain Intrusions with Snort_inline

    7. Automatically Firewall Attackers with SnortSam

    8. Detect Anomalous Behavior

    9. Automatically Update Snort’s Rules

    10. Create a Distributed Stealth Sensor Network

    11. Use Snort in High-Performance Environments with Barnyard

    12. Detect and Prevent Web Application Intrusions

    13. Scan Network Traffic for Viruses

    14. Simulate a Network of Vulnerable Hosts

    15. Record Honeypot Activity

  12. Chapter 12 Recovery and Response

    1. Image Mounted Filesystems

    2. Verify File Integrity and Find Compromised Files

    3. Find Compromised Packages

    4. Scan for Rootkits

    5. Find the Owner of a Network

  1. Colophon

Related Posts:

How to secure your Nest account and cameras and keep hackers at bay

Where automotive cyber security is headed

How to download and install Alice 3 Downloads

FAQ Hacked WordPress Website

My little pony learning game in VB.NET

Object-Oriented Programming (OOP)

Methods of teaching programming

Computer Programming Business Requirements Analysis