Skip to content

110: Security

Tom Ormiston edited this page Aug 29, 2017 · 11 revisions

110.1 Perform security administration tasks

Description: Candidates should know how to review system configuration to ensure host security in accordance with local security policies.

Key Knowledge Areas:

Audit a system to find files with the suid/sgid bit set Set or change user passwords and password aging information Being able to use nmap and netstat to discover open ports on a system Set up limits on user logins, processes and memory usage Determine which users have logged in to the system or are currently logged in Basic sudo configuration and usage

Terms and Utilities:

find
passwd
fuser
lsof
nmap
chage
netstat
sudo
/etc/sudoers
su
usermod
ulimit
who, w, last

UrbanPenguin: Security Administration

UrbanPenguin: Audit logins using last

Steve Gordon - Users: whoami, /etc/passwd, /etc/shadow, su, sudo

Steven Gordon - ifconfig, ethtool, arp, netstat

110.2 Setup host security

Description: Candidates should know how to set up a basic level of host security.

Key Knowledge Areas:

Awareness of shadow passwords and how they work Turn off network services not in use Understand the role of TCP wrappers

Terms and Utilities:

/etc/nologin
/etc/passwd
/etc/shadow
/etc/xinetd.d/
/etc/xinetd.conf
/etc/inetd.d/
/etc/inetd.conf
/etc/inittab
/etc/init.d/
/etc/hosts.allow
/etc/hosts.deny

UrbanPenguin: Setup host security

110.3 Securing data with encryption

Description: The candidate should be able to use public key techniques to secure data and communication.

Key Knowledge Areas:

Perform basic OpenSSH 2 client configuration and usage Understand the role of OpenSSH 2 server host keys Perform basic GnuPG configuration, usage and revocation Understand SSH port tunnels (including X11 tunnels)

Terms and Utilities:

ssh
ssh-keygen
ssh-agent
ssh-add
~/.ssh/id_rsa and id_rsa.pub
~/.ssh/id_dsa and id_dsa.pub
/etc/ssh/ssh_host_rsa_key and ssh_host_rsa_key.pub
/etc/ssh/ssh_host_dsa_key and ssh_host_dsa_key.pub
~/.ssh/authorized_keys
ssh_known_hosts
gpg
~/.gnupg/

UrbanPenguin: Securing data with encryption

Steven Gordon - wget, ssh, nc

Command Line Basics 6: Using SSH and SCP

tutorialLinux: SSH: The Absolute Basics

tutorialLinux: SSH: Setting up

tutorialLinux: SSH: Browse the Web Safely

Joe Collins: Use SSH and SCP to Manage Lots of Linux Machines

Joe Collins: How To Use SSH Remote Login

Quidsup: How to use SSH in Ubuntu

Hak5: SSH - from symmetric and asymmetric to block and stream ciphers

Passwords in Unix, One-Time-Passwords and 2 Factor Authentication, Hak5 1114 part1

SSH Server Configuration for Yubikey One-Time-Passwords, Hak5 1114 part2

Hak5 - Emails: GatewayPorts, Known_Hosts and Win-SSH, Hak5 1114 part3

Hak5 - Setup SSH Key Pairs in Linux, Hak5 1110 part3

Hak5 - Configuring an OpenSSH Server in Linux, Hak5 1109.3

Hak5 - SSH Protocol Layers and Public Key Authentication, Hak5 1109.1

Hak5 - SSH Tunneling with Proxychains, Hak5 1119 part1

Hak5 - SSH Tunneling with Proxychains, Hak5 1119 part2

Hak5 - SSH Tunneling with Proxychains, Hak5 1119 part3


Firewall

Joe Collins: Anti-Virus and Firewall Software for Linux

Joe Collins: Linux Tip | Setup a Simple Firewall

Quidsup: Uncomplicated Firewall UFW / GUFW Setup Guide for Ubuntu


Linux Desktop Security

Joe Collins: Mr. Desktop & Mr. Server Episode 3 | Linux Security Tips

Discussion on

Vulnerably vs a virus/trojan/root like - an unwanted program

  • Linux hardening - Flash / Java & Updating the kernel and other libraries ,Ghostery and adblock

  • Firewalls - software and hardware

  • Installing an additional router and connecting your devices to that NOT the provided ISP one that they can log into

  • Hardening router by using programs like OpenWRT and DD-WRT mention PFSense and MikroTik

  • Password security using LastPass and/or KeePass + SeaHorse

  • Keys should have passwords assigned for added protection

  • IoT of many insecure devices

  • VPN technology using client programs or setting up at the router

  • Encryption like gpg and openpgp