Linux Operating System Security
Links from the class materials and other supplemental information, grouped by chapter:
Chapter 1: Introduction
Chapter 2: General Security Issues
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Links to vendor security information:
These web sites should all have information about subscribing to the
security alert mailing list. They should also have pointers to the keys
they use to sign their software, information about security advisories,
etc.
Chapter 3: Logging
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Log file tools:
Chapter 4: Authentication
Links from the text:
Chapter 5: Local security issues
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Original COPS web page by Dan
Farmer.
Another COPS web page, from Dan
Anderson.
Chapter 6: nmap and network mapping
Links from the text:
Chapter 7: Penetration testing
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Nessus:
To save the file, do a right click and choose "save target as..."
Chapter 8: Network access control
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
iptables file for the lab. I created it
with iptables-save. Restore it to make it active.
Chapter 9: Intrusion Detection Overview
Chapter 10: Host-based Intrusion Detection Systems
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Tripwire:
Portsentry:
Chapter 11: Network Intrusion Detection Systems
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Local copies of snort files:
Bro web site
Chapter 12: SELinux
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Chapter 13: Cryptography Overview
Links from the text:
Chapter 14: Cryptographic Tools
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Signing key for linux kernel
Kernel source 2.4.25
Signature for the kernel source 2.4.25
Chapter 15: SSL and TLS
Links from the text:
Chapter 16: IPsec
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Chapter 17: Review of networking concepts
Chapter 18: Loop filesystem
Chapter 19: Security packages and distributions
Additional links, not from the course text, or, software needed for the chapter:
Bastille Linux:
LIDS:
Others:
Chapter 20: Kernel configuration options (optional)
Links from the text:
Additional links, not from the course text, or, software needed for the chapter:
Chapter 21: Network Configuration
Links from the text:
Chapter 22: Network services
Links from the text:
SkillBridge Training
Examples from the class notes (or,
all as one file).
Selected Solutions from the class notes (no
looking until you have solved the problems!). Note that all solutions
are in an appendix of your course book.
All solutions in a compressed tar file.
Evaluation form (if needed)