Hack Proofing Sun Solaris 8

Author:   Syngress ,  Thomas Vincent
Publisher:   Syngress Media,U.S.
ISBN:  

9781928994442


Pages:   608
Publication Date:   31 October 2001
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $166.19 Quantity:  
Add to Cart

Share |

Hack Proofing Sun Solaris 8


Add your own review!

Overview

Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers. - The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network - Teaches strategy and techniques using forensic-based analysis - Up to the minute Web-based support with solutions@syngress.com

Full Product Details

Author:   Syngress ,  Thomas Vincent
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Dimensions:   Width: 18.40cm , Height: 2.20cm , Length: 26.00cm
Weight:   0.880kg
ISBN:  

9781928994442


ISBN 10:   192899444
Pages:   608
Publication Date:   31 October 2001
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Foreword Chapter 1 Introducing Solaris Security: Evaluating Your Risk Introduction Exposing Default Solaris Security Levels Altering Default Permissions Making Services Available after Installation Working with Default Environmental Settings Evaluating Current Solaris Security Configurations Evaluating Network Services Evaluating Network Processes Monitoring Solaris Systems Using the sdtprocess and sdtperfmeter Applications Monitoring Solaris Logfiles Testing Security Testing Passwords Testing File Permissions Securing against Physical Inspections Securing OpenBoot Documenting Security Procedures and Configurations Documenting Security Procedures Documenting System Configurations Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Securing Solaris with the Bundled Security Tools Introduction The Orange Book Choosing Solaris 8 C2 Security Configuring Auditing Managing the Audit Log Understanding Auditing Classifications Configuring Auditing Extracting and Analyzing Auditing Data Choosing Trusted Solaris 8 Using Trusted Solaris 8’s B1-Level Security Understanding the Concept of Mandatory Access Control Administrative Labels Auditing and Analyzing Trusted Solaris 8 Solaris 8 Security Enhancements Using SunScreen Secure Net Utilizing SunScreen SKIP Using the Solaris Security Toolkit Using OpenSSH Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Securing Solaris with Freeware Security Tools Introduction Detecting Vulnerabilities with Portscanning Advanced Portscanning Discovering Unauthorized Systems Using IP Scanning Using the arp Command on Solaris Detecting Unusual Traffic with Network Traffic Monitoring Using Snoop Using Snort Using a Dedicated Sniffer Using Sudo Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Securing Your Users Introduction Creating Secure Group Memberships Role-Based Access Control Understanding Solaris User Authentication Authenticating Users with NIS and NIS+ Authenticating Users with Kerberos Authenticating Users with the Pluggable Authentication Modules Summary Solutions Fast Track Frequently Asked Questions Chapter 5 Securing Your Files Introduction Establishing Permissions and Ownership Access Control Lists Role-Based Access Control Changing Default Settings Using NFS Share and Share Alike Locking Down FTP Services Using Samba Monitoring and Auditing File Systems Summary 1 Solutions Fast Track Frequently Asked Questions Chapter 6 Securing Your Network Introduction Configuring Solaris as a DHCP Server Using the dhcpmgr GUI Configuration Tool Using the dhcpconfig Command-Line Tool Securing DNS Services on Solaris Using BIND Configuring Solaris to Provide Anonymous FTP Services Using X-Server Services Securely Using Host-Based Authentication Using User-Based Authentication Using X-Windows Securely with SSH Using Remote Commands Using Built-In Remote Access Methods Using SSH for Remote Access Summary Solutions Fast Track Frequently Asked Questions Chapter 7 Providing Secure Web and Mail Services Introduction Configuring the Security Features of an Apache Web Server Limiting CGI Threats Using Virtual Hosts Monitoring Web Page Usage and Activity Configuring the Security Features of Sendmail Stopping the Relay-Host Threat Tracking Attachments Summary Solutions Fast Track Frequently Asked Questions Chapter 8 Configuring Solaris as a Secure Router and Firewall Introduction Configuring Solaris as a Secure Router Reasoning and Rationale Routing Conditions Configuring for Routing Security Optimization Security Implications Unconfiguring Solaris Routing Routing IP Version 6 Configuration Files IPv6 Programs IPv6 Router Procedure Stopping IPv6 Routing IP Version 6 Hosts Automatic Configuration Manual Configuration Configuring Solaris as a Secure Gateway Configuring Solaris as a Firewall General Firewall Theory General Firewall Design SunScreen Lite IP Filter Using NAT Guarding Internet Access with Snort Snort Configuration File Snort Log Analysis Summary Solutions Fast Track Frequently Asked Questions Chapter 9 Using Squid on Solaris Introduction The Default Settings of a Squid Installation Configuring Squid The http_port Tag The cache_dir Tag Access Control Lists Configuring SNMP Configuring the cachemgr.cgi Utility New in Squid 2.4—Help for IE Users Configuring Access to Squid Services The Basics of Basic-Auth Access Control for Users Access Control Lifetime Configuring Proxy Clients Excluding Access to Restricted Web Sites Filtering Content by URL Filtering by Destination Domain Filtering by MIME Type Filtering by Content-Length Header Summary Solutions Fast Track Frequently Asked Questions Chapter 10 Dissecting Hacks Introduction Securing against Denial of Service Hacks Ping of Death Syn Flood E-Mail Flood Securing against Buffer Overflow Hacks Buffer Overflow against a Web Server Buffer Overflow against an FTP Server Securing against Brute Force Hacks Defending against Password Crackers Securing against Trojan Horse Hacks Defending against Rootkits Defusing Logic Bombs Defending against PATH and Command Substitution Securing against IP Spoofing Securing Your .rhosts File MAC Address Spoofing Summary Solutions Fast Track Frequently Asked Questions Chapter 11 Detecting and Denying Hacks Introduction Monitoring for Hacker Activity Using Tripwire Using Shell Scripts to Alert Systems Administrators Monitoring Running Processes Monitoring CPU Activity Putting It All Together What to Do Once You’ve Detected a Hack What’s a Honeypot Monitoring Solaris Log Files Solaris Log Files to Review Creating Daily Reports A State-of-the-System Report Summary Solutions Fast Track Frequently Asked Questions Hack Proofing Sun Solaris 8 Fast Track Index 381

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List