|
|
Àâòîðèçàöèÿ |
|
|
Ïîèñê ïî óêàçàòåëÿì |
|
|
|
|
|
|
|
|
|
|
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions |
|
|
Ïðåäìåòíûé óêàçàòåëü |
ISPs (Internet Service Providers), break-ins 519—528
ISPs (Internet Service Providers), traceroutes 89
ISPs (Internet Service Providers), vulnerabilities 455—456
ISPs (Internet Service Providers), web hosting and 455—456
ISS (Internet Security Scanner) 117—118
JavaScript 451—452
Jigsaw server 456
John the Ripper program 295—297
K files 503
Karpski program 196
Kerberos authentication 114
Kernel log 355
Kernel modules 352—358
Kernel, code for 359
Kernel, compiling 100
Kernel, countermeasures 362
Kernel, described 358—359
Kernel, hacking 352—358
Kernel, memory and 259
Kernel, patches 34—35 267 279
Kernel, superuser and 361
Kernel, upgrading 237 238
Kernel, version number 478
Kernel, weakening 357—358
Key argument 287
keystroke logging 189
killall command 20—21
killing processes 20—21
Klaxon scan detector 29
Korn Shell 8
KPOP authentication 391
ksh (Korn shell) 8
laptop computers 162—163 174
lchown() system call 278
LIDS (Linux Intrusion Detection System) 34—36 259
LILO (LInux LOader) 167—173
Links, /tmp directory 34
Links, files 55
links, symbolic 427—428
Linux dictionary 299
Linux Intrusion Detection System (LIDS) 34—36 259
Linux kernel, code for 359
Linux kernel, compiling 100
Linux kernel, countermeasures 362
Linux kernel, described 358—359
Linux kernel, hacking 352—358
Linux kernel, memory and 259
Linux kernel, patches 34—35 267 279
Linux kernel, superuser and 361
Linux kernel, upgrading 237 238
Linux kernel, version number 478
Linux kernel, weakening 357—358
Linux Loader (LILO) 167—173
Linux Root Kit (LRK) 363—364
Linux Router project 486
Linux systems, default configuration problems 436—438
Linux systems, distributions of 510
Linux systems, passwords in 284—289
Linux systems, patches to 34
Linux systems, physical access to 163—173
Linux systems, reinstalling 63
Linux systems, shells 7—8
Linux-sniff program 195
list command 398—399 408
Loadable kernel modules 352—358
Local access 193 194 250
Log files, analyzing 36—46 63
Log files, brute force attacks and 289
Log files, constantly running checkers 39—40
Log files, Crack program and 292
Log files, cronjob 39
Log files, kernel log 355
Log files, log checking programs 39—46
Log files, monitoring 526
Log files, mountd service and 114
Log files, permissions for 40 48
Log files, process-managed 36
Log files, scanning 39—40
Log files, syslog messages 36—39
Log files, system logs 22 376—377
Log files, truncated 60
Log files, UNIX platform 36—39
Log files, wiped 60
logcheck utility 41
Logging, facility for 22
Logging, hiding 339—340
logging, levels 37
Logging, system logging 22
Logins, hiding 338—339
Logins, passwordless 323—329
Logins, reporting 338—339
Logsurfer utility 44—46 518
logtail utility 41
Lookups, arin IP block 77
Lookups, DNS 82 469
Lookups, network 76—77
lookups, reverse 86—87
lp user 9
LRK (Linux Root Kit) 363—364
ls command 10 251 393
lsattr command 16—17
lsmod command 352—353
lstat() system call 276 279
MAC addresses, ARP spoofing and 221—223 225
MAC addresses, flooding network with 226
MAC addresses, obtaining 116
MAC addresses, sniffers and 192—193
Macof program 226 227
Magic Cookies See "Cookies"
Magic passwords 344—345
Magic strings 347—349
Mail See "Email"
Mail Abuse Prevention System (MAPS) 383
Mail delivery agent (MDA) 370
mail servers 414—415
Mail servers, banners 374—376
Mail servers, file permissions 379—381
Mail servers, insecurities 373—391
Mail servers, running as separate userid 374
Mail Transfer Agents (MTAs) 370—373
Mailbombing 384—386
maildrop program 387
Mailing lists, Bugtraq 71 510
Mailing lists, Linux distributions 510
Mailing lists, posting to 71—73
Mailing lists, precautions 73
Mailing lists, security 510
Mailing lists, vendors 510
Mailsnarf program 227
man pages 113 266
Management Information Base (MIB) 115—117
Manuals, online 436—437
MAPS (Mail Abuse Prevention System) 383
Matt's Traceroute (MTR) 89—90
MD5 algorithm 288—289
MD5 algorithm, Apache password file 303 304
MD5 algorithm, passwords 307 313
MD5 algorithm, validating hidden fields 445—446
MD5 checksums 47 56 141 143
md5sum program 47 141
MDA (mail delivery agent) 370
Melissa virus 146
Memory, BIOS 166
Memory, C-MOS 166
Memory, clearing 166
Memory, consumption of 21
Memory, kernel 259
Memory, leaks 21
Memory, managing 21—22
Memory, security and 21—22
| Memory, virtual 21—22
metacharacters 280—281 453—454
MIB (management information base) 115—117
mkdir command 273—274
mkstemp function 273—274
mktemp utility 278
Modems, authentication and 185
Modems, connections 184—186
Modems, public phone networks 184—186
Modems, wardialing and 185—186
Monitors, unattended 160—161
Morris Internet worm 149 371
motherboards 166
mount command 186—187 264 269—270
mountd service 114
MRTG tool 236
Msgsnarf program 227
MTAs (Mail Transfer Agents) 370—373
MTR (Mart's Traceroute) 89—90
Nabou program 26—27
name service 212
NASL (Nessus Attack Scripting Language) 121
NC See "netcat"
Nemesis utility 234 235
Nessus Attack Scripting Language (NASL) 121
Nessus security scanner 121—125
Net-SNMP 115—117
Netcat (nc) utility, arguments 91
Netcat (nc) utility, clients 537—538
Netcat (nc) utility, connections 536—537
Netcat (nc) utility, creating inbound root shells 332—335
Netcat (nc) utility, PORT FTP hijacking 405—406
Netcat (nc) utility, port scanning 91—92
Netfilter 479
Netmask 77
Netmask pair 467
Netscape browser, attacks to 187—188
Netscape browser, default configurations 187—188
Netscape browser, open source and 5
Netscape browser, passwords 187
netstat command 203—206
Network banners 102—103
Network broadcast packets 221
Network daemons 347—348
Network devices, default passwords 191—192
Network devices, labels and 160
Network devices, listed 191—192
Network Information System (NIS) 240—241 292
Network interface card (NIC) 192—193
Network lookups 76—77
network scanners 27—32 117—125
Network scanners, countermeasures 124—125
Network scanners, described 24 117
Network scanners, ISS 117—118
Network scanners, Nessus 121—125 125
Network scanners, SAINT 118—119
Network scanners, SARA 120
Network scanners, SATAN 118—119
Network scanning, ipconfig command 27—28
Network scanning, performing 27—32
Network services, back doors 344
Network services, hidden 344 351
Network services, scanning for 539—540
network sniffers 161
Network switches 525—526
networks 177—243
Networks, abusing trust relationships 239—241
Networks, access restrictions 344
Networks, accessible root shells 329—338
Networks, activity 60
Networks, attacking 211—243
Networks, attacks over 177—209
Networks, basic concepts 178—190
Networks, blocking access to 480—483
Networks, default configurations and 186—190
Networks, default passwords and 190—192
Networks, denial of service See "Denial-of-service (DoS) attacks"
Networks, DNS exploits 212—217
Networks, egress filtering 242—243
Networks, hiding information on 343
networks, interfaces 27—28 62
Networks, IP networks 178
Networks, password guessing 196—199
Networks, performance 183
Networks, physical attacks to 159—160
Networks, ping sweeps 77—80
Networks, public phone 184—186
Networks, reporting tools 343
Networks, route additions 219—220
Networks, routing issues 217—220
Networks, scan detectors 29—32
Networks, scanners See "Scanning"
Networks, services in 202—209
Networks, session hijacking 220—232
Networks, sniffers See "Sniffers"
Networks, switched 193—194 221—223
networks, TCP/IP 178—184
Networks, turning off services 207—208
Networks, unnecessary services in 202—209
Networks, vulnerabilities 199—202
Newsgroups 71—73 512
NFS (network file service), blocking at firewall 187
NFS (network file service), countermeasures 240
NFS (network file service), file sharing with 111—114
NFS (network file service), insecure NFS exports 318—319
NFS (network file service), IP addresses and 240
NFS (network file service), Novell NetWare and 270—271
NFS (network file service), setuserid binaries 270
NFS (network file service), turning off 187
NFS files 226
NFS mounts 186—187
NFS servers 111—114 270—271
NIC (network interface card) 192—193
NIS (Network Information System) 240—241 292
NIS netgroups 467
Nmap (network mapper) utility, bounce scans 398—401
Nmap (network mapper) utility, configuration options 96—97
Nmap (network mapper) utility, identifying services with 206—207
Nmap (network mapper) utility, listing RPC services 109—110
Nmap (network mapper) utility, OS identification 104—106
Nmap (network mapper) utility, ping sweeping 79—80
Nmap (network mapper) utility, port scanning 94—100 110—111
Nmap (network mapper) utility, web servers 528—529
Nmap front end (nmapfe) 99
Nmapfe (nmap front end) 99
No-setuseridbatch patch 322 323
nobody user 9 263 427
Noexec flag 271
Nonatomic functions 272
Nonuser accounts 320
Nosuid flag 271
Novell Netware 270—271
Novell NFS servers 270—271
npasswd program 310—311
nph-finger CGI program 440—441
nslookup utility 82
Null characters 450—451
NULL scans 95 96 100
number sign (#) 208 465
Office See "Workplace"
One Time Passwords in Everything (OPIE) tool 312
one-time passwords (OTPs) 312
Online manuals 436—437
Online searches 70—73
Open Relay Behavior-Modification System (ORBS) 383
Open Shortest Path First (OSPF) 217 219
open source software 5—6
open() function 450 455
open() system call 278
OpenSSH 226 326
|
|
|
Ðåêëàìà |
|
|
|