McGraw-Hill, 2003 - 256 p.
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!
Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
Protect against privilege escalation attacks
Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
Learn in-depth and current Linux and Unix system hardening guidelines
Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
Understand the latest wireless (802.11) hacking techniques, tools, and defenses