SystemYou must be aware that you are responsible for the system you manage. We should fully understand how the system and server software work and regularly check system configurations and security policies. In addition, you should always pay attention to the latest security vulnerabilities and problems posted by the Security site related to the self-managed operating systems and software.9. Check file integrityWhen it is determined that the system has not been intruded, all binary programs and
])Search in the left direction, the Y coordinate is constant, the x-coordinate is traversed, and reflected in the map (up to the 1th), look closely will find: the first subscript represents the Y value, the second subscript represents the X-value, which is exactly the opposite of the coordinate valueOther directions and so on ...(2) HorseCOM.BYLAW.M = function (x,y,map,my) {var d=[];//1 o ' clock no tripwire 1 points no checkers or 1 piece color diffe
;/etc/issueCp-f/etc/issue/etc/issue.netEcho >>/etc/issue2) for Apache configuration file, find Servertokens and serversignature two directive, modify its default properties as follows, use no echo version number:Servertokens PRODServersignature OFFVi. iptables Firewall Rules:Iptables-a input-p--dport 22-j ACCEPTIptables-a input-i eth0-p TCP--dport 80-j ACCEPTIptables-a input-m State--state established,related-j ACCEPTIptables-a input-j DROPThe above rule will block TCP active pick-up from the in
, such as: DD, cpio, tar, dump, etc.7 Other 7.1 using firewallsFirewall is an important aspect of network security, we will have another topic to elaborate on the firewall, including the principle of the firewall, Linux 2.2 kernel under the IPChains implementation, Linux 2.4 kernel NetFilter implementation, commercial firewall product applications.7.2 Using third-party security toolsLinux has a lot of good security tools, such as: Tripwire, SSH, Sudo,
Contact C language Two months, from the rectification "C Program Design" Introduction, Tripwire knock on the learning of a not clear. Have studied in computer college and Software College, they have been contacted before and through the self-enrollment by the university to accept the lower points, but also with me the same small white, but slowly also walked to my front. The school also opened the experiment class, but each time the class of activists
system (Linux) is hacked, the complexity depends largely on how well the intruder "cleanup" works. For an invasion to do homework, it would be a delicate and painful thing to get rid of it, usually in a professional third party tool (with Open-source, like Tripwire, like aide).and professional tools, deployment, use relatively troublesome, and not all administrators can skilled use.
In fact, the Linux system itself has provided a set of "checksum" m
intruders "scan the end" and do enough work. For an intrusion that requires sufficient homework, it will be a matter of precision and pain to clean up. In this case, professional third-party tools (open-source, for example, tripwire or aide. Professional tools are difficult to deploy and use, and not all administrators can use them skillfully. In fact, the Linux system itself has provided a "Verification" mechanism, and the program on the inspection
/services // set to irrational attribute
When Linux is started, check the script file. in REDHAT, in/etc/rc. d/rc3.d (rc5.d) (graphical), The Script Name Is the startup sequence.
K indicates killing the process
S indicates the started service
If a service is disabled at startup, you only need to change the upper-case "S" of the script file of the Service to lower-case "s"
Note: There are many vulnerabilities in the following three services. We strongly recommend that you close them.
Yppasswdd (N
and run Backdoor programs, they will find some methods to joke with the system administrator. This involves two aspects: how to hide his files and how to hide his processes.
To hide files, intruders need to do the following: replace some common system commands such as "ls", "du", "fsck ". At the underlying level, they mark some areas in the hard disk as bad blocks and place their files there. Or if he is crazy enough, he will put some files into the boot block.
To hide a process, he can repla
arrays should be prepared to prevent disk damage (security not only refers to system security, but also to data security and communication security)
17. the file integrity check tool tripwire is used to check the file integrity (so it is strongly recommended that the linux system administrator keep work notes during work and make changes to the settings in the modifications to system settings) do not save the integrity check data to the hard disk o
on whether the intruders "scan the end" and do enough work. For an intrusion that requires sufficient homework, it will be a matter of precision and pain to clean up. In this case, professional third-party tools (open-source, for example, tripwire or aide.
Professional tools are difficult to deploy and use, and not all administrators can use them skillfully.
In fact, the Linux system itself has provided a "Verification" mechanism, and the program
assessment. However, enterprises need to understand that this digital game does not need to be perfect, especially when it comes to evaluating the impact of security leaks.
"The evaluation of the impact of security incidents makes it easier for enterprises to discuss and focus on how to mitigate risks, rather than spending a lot of time discussing whether the impact is worth $20 million or $21000, dwayne Melancon, chief technology officer of Tripwire
).
From the Internet perspective, I will implement the appropriate inbound) Access Control List ACL) and try to restrict NAS. For example, using built-in firewall security restrictions can prevent traffic from untrusted interfaces, such as the Internet or DMZ, from flowing to trusted interfaces, such as the Intranet ). In addition, access to the network-oriented DMZ should be limited to the appropriate application ports, such as TCP port 80 and TCP port 443 ). Consider executing a strict outbo
security analysis program. The point here is that you need to check the key configurations and executable files on key systems (such as domain servers, application servers, Web servers, and database servers, attackers usually try to replace these files with new versions to protect their foothold in your environment. The open-source version of Tripwire is a free data integrity monitoring tool, which is a good tool and has been used by security profess
Article Title: List of Linux security tools. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Sxid
Check the suid, sgid, and files without the master in the system.
Skey
One-time password Tool
Logrotate
Log loop Tool
Logcheck
Log Management Tools
Swatch
Log management tools, more real-time than logcheck
Ssh (openssh)
Secure Connection Authentica
of the target operating system through the standard or non-standard port through the text or graphic interface. Therefore, this not only blocks the reverse pipeline itself, but also immune to a lot of intrusion Techniques For general system administrators, this is too harsh!
Iptables attack Countermeasures
Syn-flood protection:
[Root @ ayazero foo] # iptables-a forward-p tcp -- syn-m limit -- limit 1/s-j ACCEPT
Furtive port Detail:
[Root @ ayazero foo] # iptables-a forward-p tcp -- tcp-fl
Gpasswd info gpasswd
Permission management
Ugo rwx P3-8
File vs directory x?
Trojan and virus root or non-root?
SUID SGID stickybit P4-2
Archives vs directory
Investigation Techniques P4-4
Su vs sudo
Su missing passwd? Privilege?
Sudoers Design info sudoers
Archive properties P4-8
Appand only
Read only
File System Design
File type P3-2
Inode block P3-6
Http://www.study-area.org/linux/system/linux_fs.htm#fstab
Mount point
Quota http://www.study-area.org/linux/system/linux_fs.htm#fquota
Read
, and port usage, and users will not be able to get real system situation reports.
Rootkits
Defense methods:
The most effective method to defend against rootkits is to regularly check the integrity of important system files. There are many such tools, such as tripwire, which is a very good file integrity check tool. Once rootkits attacks are detected, it is troublesome. You must reinstall all System File Components and programs to ensure security. Her
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.