Linux Security Cookbook

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

m4 macro processor 

MAC addresses

    controlling access by 

    spoofed 

mail  [See email IMAP POP]

Mail application (Mozilla) 

mail clients

    connecting to mail server over SSL 

    support for secure POP and IMAP using SSL 

mail facility (system messages) 

mail servers

    receiving Internet email without visible server 

    support for SSL 

    testing SSL connection locally 

Mailcrypt

    mc-deactivate-passwd to force passphrase erasure 

    official web site 

    using with GnuPG 

mailpgp (script for encrypting/sending email) 

mailsnarf command 

    -v option, capturing only unencrypted messages 

malicious program, /tmp/ls 

man-in-the-middle (MITM) attacks

    dsniff, proof of concept with 

    self-signed certificates, risk of 

    services deployed with dummy keys 

manual integrity checks 

mask format, CIDR 

Massachusetts Institute of Technology (MIT) Kerberos 

matching anything (ALL keyword)  2nd 

max_load keyword (xinetd)  2nd 

mc-encrypt function 

MD5 checksum

    verifying for RPM-installed files 

merging system log files 

MH (mail handler) 

mirroring a set of files securely between machines 

MIT Kerberos 

MITM  [See man-in-the-middle attacks]

modules

    PAM 

        CrackLib 

        listfile  2nd 

        pam_stack 

    Perl

        Sys::Lastlog and Sys::Utmp 

        Sys::Syslog 

        XML::Simple 

monitoring systems for suspicious activity 

    account use 

        checking on multiple systems 

    device special files 

    directing system messages to log files 

    displaying executed commands 

    executed command, monitoring 

    filesystems 

        searching effectively 

    finding accounts with no password 

    finding superuser accounts 

    finding writable files 

    insecure network protocols, detecting 

    local network activities 

    log files, combining 

    logging 

    login passwords 

    logins and passwords 

    logwatch filter for services not supported 

    lsof command, investigating processes with 

    network-intrusion detection with Snort  2nd 

        decoding alert messages 

        logging output 

        partitioning logs into files 

        ruleset, upgrading and tuning 

    networking 

    observing network traffic 

        with Ethereal GUI 

    open network ports, testing for 

    packet sniffing with Snort 

    recovering from a hack 

    rootkits 

    rotating log files 

    scanning log files for problem reports 

    search path, testing 

    searching for strings in network traffic 

    security incident report, filing 

    sending messages to system logger 

    setuid and setgid programs, insecure 

    syslog configuration, testing 

    syslog messages, logging remotely 

    tracing processes 

    writing system log entries

        shell scripts 

        with C 

        with Perl scripts 

monitoring tools for networks

    NIH page 

    web page information on 

morepgp (script for decrypting/reading email) 

mount command 

    -o nodev (prohibiting device special files) 

    grpid option 

    noexec option 

    nosuid option 

    setuid and setgid programs, protecting against misuse 

mounts file (/proc) 

Mozilla

    certificate storage 

    encrypted mail with Mail & Newsgroups 

Muffet, Alec (Crack utility) 

multi-homed hosts

    firewall for 

    SSH client, problems with canonical hostname 

multi-homed server machines, socket mail server is listening on 

multicast packets 

multithreaded services (in inetd.conf) 

mutt mailer 

    home web page 

    securing POP/IMAP with SSL 

Категории