You are on page 1of 1

Linux Security Testing http://www.koenig-solutions.com/securing-linux...

Linux Security Testing

Linux and its Secret (Module -1)

Hacking Methodology
Ultimate goal of Hacking
General Linux Security
Vulnerability Scanner
Scan Detector
Hardening Linux Box.

Network Attack (Module-2)

Information Gathering Technique


Scan technique
Enumeration
Sniffing
Spoofing
Dos
Social Engineering
Trojan and Rootkit

Log and Integrity (Module-3)

Log management
Event Correlation
Log Analysis Tools
Integrity and its benefits
Integrity Tools: Tripwire

Secure File and Directory (Module-4)

Gnupg protection on Files


Prohibit Directory listing
Securing Shared Directory
Encrypting file and directory
Digital signature on text file

Secure File and Directory (Module-4)

Gnupg protection on Files


Prohibit Directory listing
Securing Shared Directory
Encrypting file and directory
Digital signature on text file

Control on Authorization (Module-5)

Restrict root login shell


Run X program as root
Control user activities via sudo
Control Priviledge via ssh

Firewall with iptable(Module-6)

Restrict Network Attack


Control access via Mac address
Testing a firewall configuration
Logging simplified

IDS and Honeypot (Module-7)

IDS and its benefits


Open Source IDS tools: Snort
Honeypot
Honeypot tools: Honeyd
Web server scanner tools: NIkto
Monitoring ARP table
Implement Antivirus

Testing and Monitoring (Module-8)

Password Cracking Technique


Password Cracking tools
Monitoring File system
Checking for suspicious account

1 of 1 20/03/17 08:54

You might also like