TY - BOOK AU - Binnie,Chris TI - Linux Server security: hack and defend SN - 9781119283096 AV - QA76.9.A25 U1 - 005.8 23 PY - 2016/// CY - Indianapolis, IN PB - Wiley KW - Linux KW - fast KW - Computer security KW - Client/server computing KW - Web servers KW - Computer Security KW - S�ecurit�e informatique KW - Architecture client-serveur (Informatique) KW - Serveurs Web KW - COMPUTERS KW - Security KW - Networking KW - bisacsh N1 - Introduction -- How This Book Is Organized -- Who Should Read This Book -- Summary -- Chapter 1: Invisibility Cloak -- Background -- Installing knockd -- Some Config Options -- Testing Your Install -- Making Your Server Invisible -- Further Considerations -- Summary -- Chapter 2: Digitally Fingerprint Your Files -- Filesystem Integrity -- Whole Filesystem -- Rootkits -- Configuration -- False Positives -- Well Designed -- Summary -- Chapter 3: Twenty-First-Century Netcat -- History -- Installation Packages -- Transferring Files -- Chaining Commands Together -- Secure Communications -- Executables -- Access Control Lists -- Miscellaneous Options -- Summary -- Chapter 4: Denying Service -- NTP Infrastructure -- NTP Reflection Attacks -- Attack Reporting -- Preventing SNMP Reflection -- DNS Resolvers -- Complicity -- Bringing a Nation to Its Knees -- Mapping Attacks -- Summary -- Chapter 5: Nping -- Functionality -- TCP -- Interpreter -- UDP -- ICMP -- ARP -- Payload Options -- Echo Mode -- Other Nping Options -- Summary -- Chapter 6: Logging Reconnoiters -- ICMP Misconceptions -- tcpdump -- Iptables -- Multipart Rules -- Log Everything for Forensic Analysis -- Hardening -- Summary -- Chapter 7: Nmap's Prodigious NSE -- Basic Port Scanning -- The Nmap Scripting Engine -- Timing Templates -- Categorizing Scripts -- Contributing Factors -- Security Holes -- Authentication Checks -- Discovery -- Updating Scripts -- Script Type -- Regular Expressions -- Graphical User Interfaces -- Zenmap -- Summary -- Chapter 8: Malware Detection -- Getting Started -- Configuration -- Summary -- Chapter 9: Password Cracking with Hashcat -- History -- Understanding Passwords -- Using Hashcat -- Running Hashcat -- oclHashcat -- Hashcat-Utils -- Summary -- Chapter 10: SQL Injection Attacks -- History -- Basic SQLi -- Mitigating SQLi in PHP -- Exploiting SQL Flaws; Launching an Attack -- Trying SQLi Legally -- Summary -- End User License Agreement N2 - Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. -- from the publisher UR - https://onlinelibrary.wiley.com/doi/book/10.1002/9781119283096 ER -