-
Notifications
You must be signed in to change notification settings - Fork 0
110: Security
Description: Candidates should know how to review system configuration to ensure host security in accordance with local security policies.
Key Knowledge Areas:
Audit a system to find files with the suid/sgid bit set Set or change user passwords and password aging information Being able to use nmap and netstat to discover open ports on a system Set up limits on user logins, processes and memory usage Determine which users have logged in to the system or are currently logged in Basic sudo configuration and usage
Terms and Utilities:
find
passwd
fuser
lsof
nmap
chage
netstat
sudo
/etc/sudoers
su
usermod
ulimit
who, w, last
UrbanPenguin: Security Administration
UrbanPenguin: Audit logins using last
Steve Gordon - Users: whoami, /etc/passwd, /etc/shadow, su, sudo
Steven Gordon - ifconfig, ethtool, arp, netstat
Description: Candidates should know how to set up a basic level of host security.
Key Knowledge Areas:
Awareness of shadow passwords and how they work Turn off network services not in use Understand the role of TCP wrappers
Terms and Utilities:
/etc/nologin
/etc/passwd
/etc/shadow
/etc/xinetd.d/
/etc/xinetd.conf
/etc/inetd.d/
/etc/inetd.conf
/etc/inittab
/etc/init.d/
/etc/hosts.allow
/etc/hosts.deny
UrbanPenguin: Setup host security
Description: The candidate should be able to use public key techniques to secure data and communication.
Key Knowledge Areas:
Perform basic OpenSSH 2 client configuration and usage Understand the role of OpenSSH 2 server host keys Perform basic GnuPG configuration, usage and revocation Understand SSH port tunnels (including X11 tunnels)
Terms and Utilities:
ssh
ssh-keygen
ssh-agent
ssh-add
~/.ssh/id_rsa and id_rsa.pub
~/.ssh/id_dsa and id_dsa.pub
/etc/ssh/ssh_host_rsa_key and ssh_host_rsa_key.pub
/etc/ssh/ssh_host_dsa_key and ssh_host_dsa_key.pub
~/.ssh/authorized_keys
ssh_known_hosts
gpg
~/.gnupg/
UrbanPenguin: Securing data with encryption
Command Line Basics 6: Using SSH and SCP
tutorialLinux: SSH: The Absolute Basics
tutorialLinux: SSH: Setting up
tutorialLinux: SSH: Browse the Web Safely
Joe Collins: Use SSH and SCP to Manage Lots of Linux Machines
Joe Collins: How To Use SSH Remote Login
Quidsup: How to use SSH in Ubuntu
Hak5: SSH - from symmetric and asymmetric to block and stream ciphers
Passwords in Unix, One-Time-Passwords and 2 Factor Authentication, Hak5 1114 part1
SSH Server Configuration for Yubikey One-Time-Passwords, Hak5 1114 part2
Hak5 - Emails: GatewayPorts, Known_Hosts and Win-SSH, Hak5 1114 part3
Hak5 - Setup SSH Key Pairs in Linux, Hak5 1110 part3
Hak5 - Configuring an OpenSSH Server in Linux, Hak5 1109.3
Hak5 - SSH Protocol Layers and Public Key Authentication, Hak5 1109.1
Hak5 - SSH Tunneling with Proxychains, Hak5 1119 part1
Hak5 - SSH Tunneling with Proxychains, Hak5 1119 part2
Hak5 - SSH Tunneling with Proxychains, Hak5 1119 part3
Joe Collins: Anti-Virus and Firewall Software for Linux
Joe Collins: Linux Tip | Setup a Simple Firewall
Quidsup: Uncomplicated Firewall UFW / GUFW Setup Guide for Ubuntu
Joe Collins: Mr. Desktop & Mr. Server Episode 3 | Linux Security Tips
Discussion on
Vulnerably vs a virus/trojan/root like - an unwanted program
-
Linux hardening - Flash / Java & Updating the kernel and other libraries ,Ghostery and adblock
-
Firewalls - software and hardware
-
Installing an additional router and connecting your devices to that NOT the provided ISP one that they can log into
-
Hardening router by using programs like OpenWRT and DD-WRT mention PFSense and MikroTik
-
Password security using LastPass and/or KeePass + SeaHorse
-
Keys should have passwords assigned for added protection
-
IoT of many insecure devices
-
VPN technology using client programs or setting up at the router
-
Encryption like gpg and openpgp