Next:
List of Figures
Up:
SysHackAdminer : Overcoming host
Previous:
Abstract
Contents
Contents
List of Figures
1. Introduction
1.1 Document Layout
2. The SysHackAdminer
2.1 Ethics
2.1.1 Networking Ethics
2.1.2 Applying real life ethics to Computing Issues
2.2 The Hacker
2.2.1 Hacker vs Cracker?
2.2.2 Types of Hacker
2.2.3 Hacker Ethics
2.3 The System Administrator
2.3.1 Traditional roles
2.3.2 Security Strategies
2.3.3 System Administrator Ethics
2.3.4 Security Obstacles
2.3.5 The change
2.4 The SysHackAdminer
2.4.1 Roles
2.4.2 Security strategy
2.4.3 SysHackAdminer Ethics
2.4.4 Qualities
2.5 Summary
3. Host Security Problems
3.1 Theory
3.1.1 Denial of Service
3.1.2 Password Cracking
3.1.3 Misconfigured Software
3.1.4 Buffer Overflows
3.1.5 Set User ID Files
3.1.6 Backdoors and Trojans
3.1.7 Keystroke Logging
3.2 Practical
3.2.1 Denial of Service
3.2.2 Password Cracking
3.2.3 Misconfigured Software
3.2.4 Buffer Overflows
3.2.5 SUID files
3.2.6 Backdoors and Trojans
3.2.7 Keystroke Logging
3.3 Summary
4. Network Security Problems
4.1 Theory
4.1.1 An Introduction to Networking Concepts
4.1.2 An Introduction to Network Security Concepts
4.1.3 Backdoors and Trojans
4.1.4 Packet Sniffing
4.1.5 Port Scanning
4.1.6 Denial of Service
4.1.7 IP Spoofing, Hijacking and Associated problems
4.1.8 ICMP Tunnelling
4.2 Practical
4.2.1 Backdoors and Trojans
4.2.2 Packet Sniffing
4.2.3 Port Scanning
4.2.4 Denial of Service
4.2.5 IP Spoofing, Hijacking and Associated Problems
4.2.6 ICMP Tunnelling
4.3 Summary
5. Case Studies
5.1 Host Security
5.2 Network Security
5.2.1 Internal Security
5.2.2 External Security
5.3 Combined
5.4 Summary
6. Host Security Solutions
6.1 Theory
6.1.1 Denial of Service
6.1.2 Password Cracking
6.1.3 Misconfigured Software
6.1.4 Buffer Overflows
6.1.5 Set User ID Files
6.1.6 Backdoors and Trojan Horses
6.1.7 Keystroke Logging
6.2 Practical
6.2.1 Denial of Service
6.2.2 Password Cracking
6.2.3 Misconfigured Software
6.2.4 Buffer Overflows
6.2.5 Set User ID Files
6.2.6 Backdoors and Trojan Horses
6.2.7 Keystroke Logging
6.3 Summary
7. Network Security Solutions
7.1 Theory
7.1.1 Firewalls
7.1.2 Backdoors and Trojans
7.1.3 Packet Sniffing
7.1.4 Port Scanning
7.1.5 Denial of Service
7.1.6 IP Spoofing, Hijacking and Associated Problems
7.1.7 ICMP Tunnelling
7.2 Practical
7.2.1 Firewalls
7.2.2 Backdoors and Trojans
7.2.3 Packet Sniffing
7.2.4 Port Scanning
7.2.5 Denial of Service
7.2.6 IP Spoofing, Hijacking and Associated Problems
7.2.7 ICMP Tunnelling
7.3 Summary
8. Case Studies - Solutions
8.1 Packet Filters
8.1.1 Our Feature Packet Filter
8.1.2 An example
8.1.3 Explanation of the rules
8.2 Application Proxies
8.2.1 Our Feature Application Proxy
8.2.2 The 'netperm-table' file and configuration issues
8.2.3 An Example
8.3 A Joint Solution
8.4 Summary
9. Conclusions
9.1 The SysHackAdminer
9.2 Security Issues
9.3 Concluding remarks
Bibliography
Shaun Bangay
1998-11-19