The idea of penetrating attacks is generally to scan for vulnerabilities and then exploit different vulnerabilities to attack penetration.Vulnerability Scanning Tool has nessus, the tool can be at the same time on the local or remote control, the vulnerability analysis of the system scan. Nessus a system vulnerability can be scanned by creating a new scan policy and adding a corresponding plug-in.Another vu
Attack One,
When you install a Linux system on a PC, you have a powerful, advanced, multitasking network operating system. But the system is a little too powerful. Some release versions default to start many services (such as: Rlogind, inetd, httpd, Innd, fingerd,timed, RHSD, and so on). As a system administrator you need to be familiar with these services. If the machine is connected to the Internet, it is more necessary to shut down the security of
configured with FTP servers. Their servers allow anonymous connections or set weak passwords or even no passwords. Here is an example to illustrate:
: Anonymous FTP in Linux results in Data Access
In this case, provide anonymous FTP access to the configuration file to obtain the password from the financial management database encoding, where you can obtain the desired information.
Another type of Samba may cause remote user enumeration. When Samba co
configuration, connector and integration with Apache;
8. architecture, design and implementation of large-scale, highly concurrent, and highly available Web Server clusters;
9. Web environment stress testing, system performance evaluation, Result Analysis and Optimization;
9. security-related high-level topics:
1. Principles and Applications of NMAP scanning tools;
2. Principles and Applications of tcpdump and Wireshark Packet Capturing tools;
3. Principles and Applications of
New book Unix/Linux Log Analysis and traffic monitoring is coming soon
The new book "Unix/Linux Log Analysis and traffic monitoring" is about to release the 0.75 million-word book created in three years. It has been approved by the publishing house today and will be published soon. This book provides a comprehensive and systematic explanation of Various Unix/Linux
, such as: DD, cpio, tar, dump, etc.7 Other 7.1 using firewallsFirewall is an important aspect of network security, we will have another topic to elaborate on the firewall, including the principle of the firewall, Linux 2.2 kernel under the IPChains implementation, Linux 2.4 kernel NetFilter implementation, commercial firewall product applications.7.2 Using third-party security toolsLinux has a lot of good
;/etc/issueCp-f/etc/issue/etc/issue.netEcho >>/etc/issue2) for Apache configuration file, find Servertokens and serversignature two directive, modify its default properties as follows, use no echo version number:Servertokens PRODServersignature OFFVi. iptables Firewall Rules:Iptables-a input-p--dport 22-j ACCEPTIptables-a input-i eth0-p TCP--dport 80-j ACCEPTIptables-a input-m State--state established,related-j ACCEPTIptables-a input-j DROPThe above rule will block TCP active pick-up from the in
hydra, nessus, and nmap.Hey! Most tools can only run on Linux!Now Linux is not a problem. After all, it is free and I can run it on my own system. But who wants to spend the last weekend installing and configuring the system? At least I don't want. What if I want to test the machines used at work? Do I need to be authorized to install
Linux services)It is important for Linux users. Disabling unnecessary services can make Linux run more efficiently, but not all Linux services can be disabled. After installing centos Linux today, we found that many services were started when
The best Linux security tool-general Linux technology-Linux technology and application information. See the following for details. As a Linux administrator, it is very important to defend against viruses, spyware, and rootkit.
The following lists 10 Linux security tools
In Linux, apart from binary software distribution, there are also software packages in the form of source code. Let's talk about the installation and uninstallation of these software:
I. Installation and uninstallation of binary distribution software packagesThe binary distribution of Linux software refers to the release form of a compiled binary software package. Its advantage is that it is easy to install
, configuration and advanced applications;5, Nagios Introduction, Advanced and high-level applications;6, integrate cacti, ntop and Nagios to build enterprise-level open source monitoring platform;7. Introduction of other monitoring toolsSeven, HTTP proxy accelerator and application server:1, the introduction of Nginx, advanced, tuning and LNMP implementation; Nginx implement Web reverse proxy, using Nginx to implement Web load balancing application;2. Tomcat architecture, installation configura
Linux-(2) Basic file operations in Linux, linux-linux
In linux, everything is files, directories are files, and hardware is files. Therefore, basic file operations are especially important.
1. List the contents of the directory:
Ls
Parameters:
-A: displays all files (includ
Logout Exit SystemGedit Text Editor ToolsUname–r View kernel version information, uname–a more detailsCat/proc/cpuinfo viewing CPUsCat/proc/meminfo Viewing memoryHostname Viewing host namesIfconfig eth0 view eth0 IP AddressAlias ls= ' ls–ll ' setting aliasesTo view the path of the current terminal: TTYView current Shell:echo $SHELLAll Shell:cat/etc/shells under the current systemView CentOS System hostname Format: Echo $PS 1Distinguish internal or external commands: Type CDWhich find the locatio
;/tmp/dropip
For I in $ (CAT/TMP/DROPIP)
Do
/sbin/iptables-i input-s $i-j DROP
/sbin/iptables-d input-s 122.228.193.245-j DROP
echo "$i kill at ' Date '" >>/var/log/ddos
Done
[Email protected] ddos]#
Protection against ARP attacks
Binding to Ip+mac on a hardware device
To the computer room to do two-way binding (pay)
Protection against CC attacks
Limit the number of connections per unit of time:
Protection for Windows Server
(1), install [Symantec Terminal Prote
.
As we all know,linux system everything is a file, so each process has its file descriptor, The Nginx process writes its own file descriptor to the Nginx.pid, and we need to tell Nginx to reopen a new log file (the configuration details of the log file can be seen here, simply by letting the log record what. So we need this directive:kill -USR1 `cat ${pid_path}`This instruction means: first cat to Nginx PID, is an integer, and then send the signal
Intrusion Prevention SystemHoneypot: Honeypot #诱捕Nessus,nmap Sniffer (scan) tool2, IptablesIptables/netfilter: Network layer firewall, support for connection tracking (stateful detection)Software program for a firewall based on software formIptables, formerly known as Ipfirewall (Kernel 1.x ERA), is a simple access control tool that is ported from FreeBSD to work in the kernel to detect packets. But the ipfirewall work is extremely limited (it requir
Becoming a Senior Programmer proficient in Linux programming has always been the goal of many friends. According to statistics from chinacache, the monthly salary of Linux programmers in Beijing is 1.8 times that of Windows programmers, 2.6 times that of Java programmers, and 2.9 times that of Windows programmers. At the same time, the data shows that with the increase of work experience, the income gap bet
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.