A security story: Get the ROOT permission of the Belkin Wemo Switch
There are many activities on SecTor 2015, among which my favorite is the Internet of Things Hack Lab initiated by Tripwire ).
Internet of Things (IOT) is a physical device with network functions. These devices have diverse functions, such as smart bulbs, Smart thermostats, smart sockets, and the smart switches we will talk about below.
At the conference,
programs such as nginx php msyql. After that, no matter whether they are running properly or legally, it will be useless even if it overflows or is infiltrated, what are php and mysql reading passwd files? They are all off the cloud! Even if php, nginx, and mysql have vulnerabilities, we are not afraid of them. We are immune and worried about daily upgrades!6. When grsecuriy is set to control global resources, tomyo-ccs controls the behavior of key programs and then runs nginx and php. mysql ha
have used tripwire before, you can use tripwire for verification. Or use the MD5 checksum function of rpm.
================
Survey System Vulnerabilities
================
Check the versions of various services, applications, kernels, and patches, check the list of known vulnerabilities on bugtraq, find system vulnerabilities, and discover potential and possibly ignored vulnerabilities from the front. This
in the installation and maintenance of Apache:
Check the permissions of files and directories properly.
Httpd.conf, srm.conf, and access.conf These three configuration file settings are appropriate.
Use the password protection mechanism (. htaccess) for certain directories that require special protection.
Make the server log files as detailed as possible to record information.
Encapsulate the CGI script, and if the CGI script is written in Perl, be sure to examine its security in detail.
Use th
articles and reply as much as possible, encourage old friends to participate in discussions as much as possible and encourage new users to express their opinions. As moderators, they should often communicate with various netizens. There are many types of such communication, such as chat rooms, OICQ, e-mail, Community messages, phone calls, and user gatherings, this method can greatly increase the loyalty of netizens. The promotion of the jar and the Community can often go to chat rooms, other c
httpd the world has recently changed its domain name, and the new domain name is www.wbhw.com, which is more brief and easy to remember. At this time need to the original domain name webhosting-world.com, as well as the Forum address webhosting-world.com/forums/directed to the new domain name, so that users can find, and so that the original forum URL continues to be valid without appearing 404 Not Found, For example, the original http://www.webhosti
Apache rewrite example setForward one domain name to another in httpdThe VM domain name has recently changed. The new domain name isWww.wbhw.comTo make it easier to remember. In this case, you need to direct the original domain name webhosting-world.com, and the address of the Forum webhosting-world.com/forums/ to the new domain name, so that the user can find, and make the original Forum URL continue to be valid without 404 not found, for example, th
6. Modify common. php. (skip this step unless necessary)
A) Modify $ inf_path to the directory where you put forums. php.
B) modify $ include_path to the directory where the stored ded file is stored.
C) Modify $ admindir to the directory where you put the admin file.
E) set the name of the main management script ($ admin_page) (index. php by default ).
F) configure the Phorum and your DBMS interfaces. modify this line:
Require.
Label:Messages table:Mysql>create Table Messages (->message_id int Auto_increment primary KEY,->user_name varchar () NOT NULL,->author_id int NOT NULL,->body text,->forum_id int not NULL);Forums Table:Mysql>create Table Forums (->forum_id int Auto_increment primary KEY,->name varchar (150),->description text,->owner_id int);Two of the most common engines are MyISAM and inndb. (MyISAM is faster and table sto
and is also the market leader. Currently, there are many Chinese documents, unlike when I first came into contact with it a few years ago. The following books are recommended: Symbianos software development and development-application C ++ introduction to smartphone application development (the UI part is the uiq Platform ), Series60 Application Development (mainly on the s60 platform and recommended) Symbianosc ++ Mobile Application Development (vol. 2nd) In addition, a new book on uiq3.0
intruders "scan the end" and do enough work. For an intrusion that requires sufficient homework, it will be a matter of precision and pain to clean up. In this case, professional third-party tools (open-source, for example, tripwire or aide. Professional tools are difficult to deploy and use, and not all administrators can use them skillfully. In fact, the Linux system itself has provided a "Verification" mechanism, and the program on the inspection
/services // set to irrational attribute
When Linux is started, check the script file. in REDHAT, in/etc/rc. d/rc3.d (rc5.d) (graphical), The Script Name Is the startup sequence.
K indicates killing the process
S indicates the started service
If a service is disabled at startup, you only need to change the upper-case "S" of the script file of the Service to lower-case "s"
Note: There are many vulnerabilities in the following three services. We strongly recommend that you close them.
Yppasswdd (N
and run Backdoor programs, they will find some methods to joke with the system administrator. This involves two aspects: how to hide his files and how to hide his processes.
To hide files, intruders need to do the following: replace some common system commands such as "ls", "du", "fsck ". At the underlying level, they mark some areas in the hard disk as bad blocks and place their files there. Or if he is crazy enough, he will put some files into the boot block.
To hide a process, he can repla
arrays should be prepared to prevent disk damage (security not only refers to system security, but also to data security and communication security)
17. the file integrity check tool tripwire is used to check the file integrity (so it is strongly recommended that the linux system administrator keep work notes during work and make changes to the settings in the modifications to system settings) do not save the integrity check data to the hard disk o
on whether the intruders "scan the end" and do enough work. For an intrusion that requires sufficient homework, it will be a matter of precision and pain to clean up. In this case, professional third-party tools (open-source, for example, tripwire or aide.
Professional tools are difficult to deploy and use, and not all administrators can use them skillfully.
In fact, the Linux system itself has provided a "Verification" mechanism, and the program
assessment. However, enterprises need to understand that this digital game does not need to be perfect, especially when it comes to evaluating the impact of security leaks.
"The evaluation of the impact of security incidents makes it easier for enterprises to discuss and focus on how to mitigate risks, rather than spending a lot of time discussing whether the impact is worth $20 million or $21000, dwayne Melancon, chief technology officer of Tripwire
).
From the Internet perspective, I will implement the appropriate inbound) Access Control List ACL) and try to restrict NAS. For example, using built-in firewall security restrictions can prevent traffic from untrusted interfaces, such as the Internet or DMZ, from flowing to trusted interfaces, such as the Intranet ). In addition, access to the network-oriented DMZ should be limited to the appropriate application ports, such as TCP port 80 and TCP port 443 ). Consider executing a strict outbo
security analysis program. The point here is that you need to check the key configurations and executable files on key systems (such as domain servers, application servers, Web servers, and database servers, attackers usually try to replace these files with new versions to protect their foothold in your environment. The open-source version of Tripwire is a free data integrity monitoring tool, which is a good tool and has been used by security profess
Article Title: List of Linux security tools. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Sxid
Check the suid, sgid, and files without the master in the system.
Skey
One-time password Tool
Logrotate
Log loop Tool
Logcheck
Log Management Tools
Swatch
Log management tools, more real-time than logcheck
Ssh (openssh)
Secure Connection Authentica
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.