Andrew Allentuck
Monday, December 30, 2002
Hacking Linux Exposed
Second Edition
McGraw-Hill, 2003, 712 pages
The authors, each a network security maven, confront the problem
of Linux, an security open source operating system, from attack. They
discuss the security features of various flavours of Linux including Red
Hat, Debian SuSE and Slackware. As well, they pay a lot of attention to
housekeeping as well as emergency response. They look at kernel hacks,
password cracks, firewall strategies, and ways of hardening systems.
Organizationally, Hacking Linux Exposed uses icons to identify
attacks. They employ a spherical bomb with a burning fuse to designate a
danger, a countermeasure that looks like a European traffic sign, and
various note tips with stencil-like icons.
The book starts off with an overview of Linux and its built-in
security features, a discussion of routine countermeasures such as log file
analysis, and an alarming walk through the ways hackers find a system and
decides to attack it.
The hacker or cracker has to find a way to let a user or system
administrator to allow a compromised or compromising file to pass via
network attacks, DNS or ARP cache poisoning, and how pluggable access
modules can add security to Linux systems.
There are server issues in e-mail and servers, all duly examined.
The authors show how web servers can be configured in terms of cracking
problems, how denial of service attacks affect servers, and how crackers
hide while removing log entries that may indicate where he operates. If the
cracker puts in his own back doors, they have to be found and disabled.
A valuable appendix deals with discovering and recovering from
attacks. If web pages or defaced, unknown files installed, if the computer
begins behaving oddly, then an attack may have happened. What to do? Turn
off all network interfaces, move the system to single user mode, turn off
official root processes, reboot from a pristine Linux floppy or CD-ROM, and
read
the rest of the appendix very carefully.
McGraw-Hill has printed a banner at the top of the cover of the
book that declares this work to be "an awesome reference" that should be of
value "across all aspects of information security." We'd agree and say
that, if anything, the blurb is too modest. This is definitive,
readable, essential stuff for any Linux system administrator, security
manager, heavy system user, apps developer and for all security
buffs. Unfortunately, crackers will probably glom through the book, making
it necessary for the authors to crank out the eagerly awaited third edition
in a year or two.
|