|
|
Àâòîðèçàöèÿ |
|
|
Ïîèñê ïî óêàçàòåëÿì |
|
|
|
|
|
|
|
|
|
|
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions |
|
|
Ïðåäìåòíûé óêàçàòåëü |
OpenSSL libraries 424
Openwall Linux patch 34
Operating system calls 452—455
Operating systems, default configuration 186—187
Operating systems, detection of 96 100—108
Operating systems, dual-boot systems 163—164
Operating systems, fingerprinting 103—108
Operating systems, hardening 32—36
Operating systems, impersonating 106
Operating systems, network banners 101—103
Operating systems, open ports 101
Operating systems, scanners 24—27
Operating systems, single-user mode 62 167—172 362
Operating systems, SNMP and 101—102
OPIE (One Time Passwords in Everything) tool 312
ORBS (Open Relay Behavior-Modification System) 383
OS See "Operating systems"
OSPF (Open Shortest Path First) 217 219
OTPs (one-time passwords) 312
Package installations 63
package management tools 492—499
packet filtering 477—480
Packet filters 239—241
Packet filters, Cisco Pix packet filter 486
Packet filters, described 478
packet filters, stateful 477
Packet-filtering firewalls 476 477—480
Packets, accepting 478
Packets, denying 478—479
Packets, described 477
Packets, firewall strategy 483—485
Packets, network broadcast 221
Packets, routing 220
Packets, source-routed 217—218
Packetstorm web site 298 299
PAM (pluggable authentication modules) 304—305 311 345—347
PAM libraries 345—347
Partitions 17
Passive stack fingerprinting 106—108
passwd command 260—261 303
passwd file 321
passwd program 321
passwd+ program 310
password attacks 285
Password files, changes to 320—321
Password files, new users in 61
Password files, null characters in 451
Password safe 158
Passwordless access, r-commands 323—326
Passwordless access, SSH 326—329
Passwords for different systems 309—310
Passwords in Linux 284—289
Passwords in system files 254—255
Passwords in user files 253—254
Passwords on command lines 256—257
Passwords on multiple machines 293
passwords, /etc/passwd file See "/etc/passwd file"
Passwords, /etc/shadow file 253 299—305 320—322
Passwords, anlpasswd program 311
Passwords, Apache Web server 303—304
Passwords, BIOS settings 165—166
Passwords, brute-force attacks See "Brute-force attacks"
Passwords, Cisco products and 523
Passwords, cleartext 253—256 389—391 394—395
passwords, cracking 283—313
Passwords, crypt () 290—291 298
passwords, default 187 190—192
Passwords, deleted 285
Passwords, DES passwords 307 313
Passwords, dial-up access 255
passwords, dictionary attacks 289 290
Passwords, dynamic 185 199
passwords, encrypted 7 158 255—256 284—289
Passwords, encryption algorithms 286—289
Passwords, environment variables and 257
passwords, expiration 311—312
Passwords, forcing good passwords 310—311
Passwords, FTP and 394—395
passwords, guessing 196—199
Passwords, guidelines 306—309
Passwords, history files and 257
Passwords, HTTP authentication and 421—424 435
Passwords, identity passwords 328—329
Passwords, length of 196 198
Passwords, LILO and 168—172
Passwords, magic passwords 344—345
Passwords, MD5 passwords 313
Passwords, Netscape and 187
passwords, network 190—192 196—199
Passwords, network devices 191—192
Passwords, nonuser accounts and 320
Passwords, npasswd program 310—311
Passwords, one-time passwords (OTPs) 312
Passwords, OPIE system 312
Passwords, PAM libraries 345—347
Passwords, passwd+program 310
Passwords, password cracking programs 289—299 313
Passwords, PGP and 309
Passwords, Piranha virtual servers 190—191
Passwords, Pluggable Authentication Modules system 304—305 311
Passwords, POP clients 391
Passwords, precautions for 158
Passwords, protection 299 305—313
Passwords, recoverable 255—256
Passwords, requirements for 198—199
Passwords, reversible hashes 253—254
passwords, root password 190 294
Passwords, S/Key OTP system 312
Passwords, screen savers 160—161
Passwords, SecurelD system 312
Passwords, shadow passwords 292 296 299—303 310
Passwords, sniffers and 193—194 226
Passwords, storage of 253—257
Passwords, Sudo tool and 260—265
Passwords, UNIX passwords 328—329
Passwords, usage 253—257
Passwords, web sites 304
PASV command 394 399 401—404
PASV FTP data hijacking 401—404
patches, kernel patches 34—35 267 279
Patches, no-setuseridbatch 322 323
Patches, Openwall Linux 34
Patches, Postfix 388
Patches, trojaned 144
Paths 250—253
PDAs (Personal Data Assistants) 162—163
Performance, network 183
Period (.) symbol 251—252 466 467
Perl code, CGI problems and 443—444
Perl code, checking data length 447
Perl language 5 6 293 538
Perl scripts 333—335
Perl scripts, connections 536—537
Perl scripts, generating checksum/permissions database 49—50
Perl scripts, Nabou program 26—27
Permissions, /proc filesystem 34
Permissions, default permissions 14—16
Permissions, devices 258—259
permissions, directories 10 13—16
Permissions, execute permission 12—14
permissions, files 10—16 48—49 55
Permissions, groups 258
Permissions, log files 40 48
Permissions, mail server files 379—381
Permissions, POSIX capabilities 19—20
Permissions, programs 48
Permissions, scripts 48
Permissions, setXid programs 49
Permissions, symlink and 277—278
Permissions, write permission 13
| Personal Data Assistants (PDAs) 162—163
PGP (Pretty Good Privacy) 143—144 158 309 388
PGP keys 143 144
PGP signatures 143—144
Phone numbers, formats 451—452
Phone numbers, JavaScript preprocessing 451—452
Phone numbers, locating 137 157
Phone numbers, wardialers 185—186
physical attacks 155—175
Physical attacks, boot access 163—173
Physical attacks, console access 160—161
Physical attacks, dumpster diving 158—159
Physical attacks, encrypted filesystems and 173—174
Physical attacks, laptop theft 162—163 174
Physical attacks, network facilities 159—160
Physical attacks, precautions 174—175
Physical attacks, workplace 156—163
Ping command 78
Ping floods 232—233
Ping sweeps 77—80
Ping sweeps, countermeasures 80
Ping sweeps, echo port pings 78
Ping sweeps, Fping utility 79
Ping sweeps, ICMP pings 78
Ping sweeps, Nmap utility 79—80
ping utility 232—233
pings 90 96 480—482
Pipes, exploiting 452—455
Pipes, opening 454—455
Piranha virtual server 190—191
pkgtool program 498—499
Pluggable Authentication Modules See "PAM"
POP clients 391
POP mail server 467
POP protocol 389—391
POP3 authentication 255—256
Popauth authentication 255—256
popd service 200
Port 111 108 110
port command 398—401 408 409 412
PORT FTP data hijacking 404—406 415
port scanning 90—100
Port scanning, countermeasures 100
Port scanning, described 90
Port scanning, detection tools 29—32
Port scanning, FTP servers and 398—406
Port scanning, netcat port scanning 91—92
Port scanning, nmap FTP bounce scanning 398—401
Port scanning, nmap port scanning 94—100 109—110
Port scanning, PASV FTP data hijacking 401—404
Port scanning, PORT FTP data hijacking 404—406
Port scanning, Scanlogd program and 30
Port scanning, stoke tool 92—34
Port scanning, UDF ports 207
portmap daemon 108—109
Portmapper 108—109
Ports, binding to 21
Ports, echo ports 78 80
Ports, firewalls and 410—413
Ports, ident/auth port 32
Ports, inbound access to 337
Ports, Isof tool 205—206
Ports, Klaxon and 29
ports, open 101
Ports, privileged 21
Ports, probing 121
Ports, RPC 108
Ports, SNMP 117
Ports, TCP ports 91—100 181
Ports, UDP ports 91—32 115
PortSentry scan detector 31—32
POSIX capabilities 19—20
Post connections 443
postdrop program 387
Postfix 372—373
Postfix, email relaying and 382
Postfix, encryption and 388
Postfix, mail server file permissions 380
Postfix, resource restrictions 385—386
Postfix, running as non-root 374
Postfix, security and 414
Postfix, SMTP banner 376
Postfix, SMTP EXPN command 379
Postfix, spam and 382 384
Postfix, VRFY responses 388
Postfix, world-writable maildrop directory 386—387
PPDD filesystem 174
Pretty Good Privacy (PGP) See "PGP"
Printers, access to 254
Privilege elevation attacks 272—282
privileged ports 21
Privileges, elevation of 247—282
Privileges, root user 248—250
Privileges, users 248—250
Processes, hiding 340—341
Processes, killing 20—21
Processes, reporting 340—341
Processes, signals to 20—21
Processes, suspicious 61
Procmail rules 383
ProFTPD 397—398
Programming flaws 272—282
Programs See also "Software"
Programs, deleting 49
Programs, helper applications 268
Programs, installation of 49
Programs, keeping current 491—499
Programs, logging levels 37
Programs, password cracking 289—299
Programs, passwords and 304
Programs, permissions for 48
Programs, Trojan horse 138—139
Programs, unneeded 501—508
Programs, upgrades 420
promiscuous mode 60 192—193
protocol stack 178
Protocols 178—184 225—226 227
Proxies, described 188
Proxies, HTTP 438—439
Proxy firewalls 477
Proxy servers 438—439 476 477
ps command 319
PTR records 87
Public phone networks 184—186
Publicfile FTP server 414
Public_html directories 438
pwck program 301—302
pwconv program 302
pwunconv program 302
Qmail, described 372
Qmail, email relaying and 382
Qmail, encryption and 388
Qmail, mail server file permissions 380
Qmail, resource restrictions 385
Qmail, running as non-root 374
Qmail, security and 414
Qmail, SMTP banner 375
Qmail, SMTP EXPN command 379
Qmail, spam and 382 384
Qmail, VRFY responses 377
Queries, DNS 82—87
Queso tool 103—104
Quotas 17—18
r- commands 239—241 323—327
race conditions 272—274
Ramen worm 149—152 413
Raymond, Eric 5—6
RBL (Realtime Blackhole List) 383
Rblsmtpd 384
rc#.d entries 504—508
|
|
|
Ðåêëàìà |
|
|
|