Linux Security Cookbook

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

NAMEINARGS flag for xinetd 

NAT gateway, canonical client hostname and 

National Infrastructure Protection Center (NIPC) (U.S.) 

    home page 

National Institutes of Health, ÒNetwork and Network Monitoring SoftwareÓ page 

nc command

    -u option (for UDP ports) 

    probing ports with 

netgroups

    customizing shosts.equiv file to restrict hostbased authentication 

    defining 

Netscape, certificate storage 

netstat command

    --all option 

    --inet option (printing active connections) 

    --listening option 

    -e option (adding username) 

    -p option (process ID and command name for each socket) 

    /proc files, reading 

    conversion of IP addresses to hostnames 

    examining network state on your machines 

    printing summary of network use 

    summary for networking on a machine 

network (/etc/init.d startup file) 

network configuration of your systems, attack vulnerability and 

network filesystems

    remote integrity checks 

    searching 

    snooping with filesnarf 

network interfaces 

    bringing up 

network intrusion detection systems (NIDS) 

    attacks against 

    rapid development in 

    Snort  [See Snort]

network monitoring tools

    NIH page 

    web page information on 

network protocols, detecting insecure 

network script 

network services, access control facilities 

network switches, packet sniffers and 

networking

    /proc/net/tcp and /proc/net/upd files 

    disabling for secure integrity checks 

    monitoring and intrusion detection  [See intrusion detection for networks monitoring systems for suspicious activity]

    summary for, printing with netstat 

networks

    access control  [See also firewalls]

        adding a new service (inetd) 

        adding a new service (xinetd) 

        denial-of-service attacks, preventing 

        enabling/disabling a service 

        levels of control 

        listing network interfaces 

        logging access to services 

        prohibiting root logins on terminal devices 

        redirecting connections to another socket 

        restricting access by remote hosts (inetd) 

        restricting access by remote hosts (xinetd with libwrap) 

        restricting access by remote hosts (xinetd with tcpd) 

        restricting access by remote hosts (xinetd) 

        restricting access by remote users 

        restricting access to service by time of day 

        restricting access to SSH server by account 

        restricting access to SSH server by host 

        restricting services to specific directories 

        starting/stopping network interface 

    hacks, system recovery from 

    intrusion detection  [See intrusion detection for networks Snort]

    local activities, examining 

        /proc filesystem 

        lsof command, examining processes 

        printing summary of use with netstat 

    monitoring traffic on 

        observing via GUI 

        searching for strings in 

    protecting outgoing traffic 

        authenticating between SSH2 client and OpenSSH server 

        authenticating between SSH2 server and OpenSSH client with OpenSSH key 

        authenticating between SSH2 server and OpenSSH client with SSH2 key 

        authenticating by public key in OpenSSH 

        authenticating by trusted host 

        authenticating in cron jobs 

        authenticating interactively without password 

        copying files remotely 

        invoking remote programs 

        keeping track of passwords 

        logging into remote host 

        SSH client defaults, changing 

        SSH, using 

        tailoring SSH per host 

        terminating SSH agent on logout 

        tunneling TCP connection through SSH 

    refusal of connections by system logger 

    tracing system calls  2nd 

Newsgroups application (Mozilla) 

NFS  [See network filesystems]

ngrep program 

    -A option, printing extra packets for trailing context 

    -T option (relative times between packets) 

    -t option (timestamps) 

    -X option (searching for binary data) 

    detecting use of insecure protocols 

    download site 

    home page for 

    libcap-format network trace files 

    searching network traffic for data matching extended regular expressions 

NIDS  [See network intrusion detection systems Snort]

nmap command 

    -r option, sequential port scan 

    host discovery, use of TCP and ICMP pings 

    information gathered in network security testing 

    probing a single target 

    running as root 

    scanning range of addresses 

    stealth options, using to test logging and intrusion detection 

    testing for open ports 

        -O option for operating system fingerprints 

        -sU options (for UDP ports) 

        customizing number and ranges of ports scanned 

        port scans 

    testing for vulnerabilities of specific network services 

nmapfe program  2nd 

nmh (mail handler) 

NNTP, tunneling with SSH  2nd 

no_access keyword, xinetd.conf 

non-local mail (acceptance by SMTP server) 

noninteractive commands, invoking securely on remote machine 

NOPASSWD tag (sudo command) 

notice priority, system messages 

null-terminated filenames 

Категории