01:22:00
C-948 inn_om_linux.pdf
### Linux Security Since 1999
Linux has made significant strides in security since 1999, employing key mechanisms like:
- **Access Control**: Discretionary control is Linux's main approach, granting file owners rights over file access.
- **File System Encryption**: Offers comprehensive protection across partitions and drives, safeguarding data from unauthorized access.
- **Network Security**: Features like firewalls and IDS defend against threats like malware and intruders.
- **Audit and Logging**: Provides detailed user monitoring and traceability through features like system logging.
- **Password Management**: Secure hashing ensures password protection, with advanced options to deactivate or set expiration dates.
### Ensuring Robust Password Security
Password managers play a vital role in Linux security, maintaining secure database entries for each system, leading to better security practices like regular password changes and usage of robust passwords.
### Conclusion: Linux Security Evolution
Linux's security framework has evolved significantly since 1999, offering a sophisticated mix of access control, encryption, auditing, and password management to create a secure environment. These measures collectively ensure Linux's resilience against evolving cyber threats, making it a steadfast choice for secure systems.
<[The Linux Security Since 1999>](https://www.slideshare.net/MyPublic/r-linux-security-since-1999)
[The Linux Security Homepage](https://www.slideshare/linux-security/linuxSecuritySince1999)
**cd** command
Ensure you're root
`sudo su`
experiment with iptables
`iptables -V`
In case of packet loss, use remarks
`iptables -A INPUT -m limit -j LOG`
### Hands On Kernel for Linux
`nano /sudo/etc/dsys.ctl`
Disable audit and memory
`audit=0`
`mem=0`
Get the version
`uname -r`
```bash
#!/bin/bash
# Get the default user password secret
DEFAULT_PASSWORD=$(cat /etc/sfpp/default_password.txt)
# Get the secret value
SECRET=$(cat /etc/sfpp/secret.txt)
# Get the remarks
REMARKS=$(cat /etc/sfpp/remarks.txt)
# Run the command
for L in ((IP_ADDRESS=192.168.0.179; MACHINE_TYPE=1; 0=0; VIP=192.168.0.0);)
do
echo 'THE IP ADDRESS IS:"m'
hash -d "$IP_ADDRESS=0" -recursive
hash -dr "$IP_ADDRESS=0" -recursive
hash -d "$IP_ADDRESS=0" -recursive
hash -dr "$IP_ADDRESS=0" -recursive
hash -d "$IP_ADDRESS=0" -recursive
hash -dr "$IP_ADDRESS=0" -recursive
hash -d "$IP_ADDRESS=0" -recursive
hash -dr "$IP_ADDRESS=0" -recursive
hash -d "$IP_ADDRESS=0" -recursive
hash -dr "$IP_ADDRESS=0" -recursive
hash -d "$IP_ADDRESS=0" -recursive
done
```
**nmap** - Scan the port for malware
```bash
nmap -v -sP -1 192.168.0.0/24
```
Use iptables rules to ban ports
```bash
iptables -A INPUT -p tcp --dport 22 -j DROP
```
Disable ballooning - Must do
```bash
snap disable LXUSER_BALLOONING
```
[rust tool install rust-linux`Absolute version`](http://www.rust-linux.org/)
`Change the root` - **USB**
```/etc/jan/password.txt`must be root `/etc/sftp.acpt` - :ThrottleWorkSet(0=default) 0=low`
### More Commands
```bash
grep -ra '():' /etc/security/access.conf
```
1. Lock the user account
`usermod -L bryan`
2. Unlock the user account
`usermod -u bryan`
3. .? Kill a process with pkill
`kill -9 $(pidof bash)`
4. ? Set shell to bash
```bash
echo 'bash' > /etc/shells
```
### Determine Shell Version
Display the version of the current shell
```bash
echo $SH
```
### Enabling SELinux
Use the following terminal commands to enable SELinux security
```bash
setenfore 1
```
```bash
setenforce 1
```
## NATIONAL SCIENCE FOUNDATION
```bash
[root@uepe.accessDs/grab.exp'' /
```
### Network script know the address
```bash
cd /usr/sbin
```
## Testing Repos
```bash
rpm -v /etc/linux/rpm/rpm.bin
q
Testing Repos
``` and gzip -v /usr/lib
```bash
cd /usr/sbin
```
```bash
shut -rl-bootpc | grep -F null -c
```bash
```nano net default fus
*-dimm - use mirroring activated
networkctls -d network!
*status - STATE.UPDATED - •
```paper.vignette.log`'`Force entry`'`'.
# Vulnerable services vulnerable, install with bind9
Apt fork-upgrade ?? Auto inst a proxy firewalls
init.key_shell srcremote port
`bR'
:vLAN is a lookup —`for cd & `Init key) * Keep
```bash
–msg 'User = user UID= 1020...-tr -Mlm disabled -p:-A
```
'qkey',:/etc/ - SELinux this-etc.}`/est`}`
File Desc:= npt
Used rc.conf
```bash
/etc - VScroll /run - Fail safe /pid /smt in
```crash`etc.
```linux` - Remove kernalpartition - Dirk Root.
)
Now install tcpdump with
**wget -r**
You will see tcpdump install
add subxc~ command built.hostname:**rcid` for add` thru mirror
```kpc.update.core`Conf.UID:* Race ups after.
### SMTP
Restart *and`GET / -rce.aqu reboot.bsecure.restart.service.log).pt.GET Hostname `httpget`-rw-r *lat Mandatory- game-test-port..
**vim** `main.exec`Code to save there, and logCessfully - Willbot` * Rce=ufd.bin - Now set`new`nmConfigPort -rw-?A` OS = *q
```bash
read passwd
icmp-pum: Network SNMT/Fri`bpy` /usr/expect/Fri0heart `<cr>` log - sas.ux&>tmtrsh -r - , PT/Alux/mtc/rpe
```/net`**Lib??/etc** explainers` * Udp.lists
Forward.Cdf - `CONF`-w Mazrc`Service/web
debp/Inv Wireshark`
`host [taber/exit]th`tcpdump sudo`Ope`PFR`[[srcport`](ctx`NetworlOPEN`#Unit`/TIM.no`config+mod
```ba
Think that there has
# Current Access read / User access
# Check Service 0F Match
``` - Yes
```ipS` rm -f user:.machine=/bin`exe /boot start-bash -x autopkg`er of``` /proc` -rip` disb` to nul `*isbin`All ipS=` /relic/sb` exe< `Z`
### Disables Various Consoles
- Exclude Terminals
`/usr/bin` Dis - `la.c` -Death.default ssh
:xapt`itsr -cbin` wart.they
Remotes subnet
`bin`
```bash
exit
```
MCP tcpdump capture
`becircule` Un
```crossed - (uptimes`/` sudo`
DST`Command file pcap and capture
prop types` Start`traffic`boot
```monThe`cdd `opens` ./bgProxy` bgs...
#### Write on network
pp - check
`/vas
[ *-packet` <free>='` 123.123.188.255`*ni Own - this`~ use`sudo``
-D`steh0pp`?
```(k` :0<nt` cpt1:` ehcaprc`+` 00>` - 999ebm`range - nmap port scan unique
```bash
*Check Locking Files
```pam-root`* Network killboot`(10 computers) to more nim hstehinc@ -score`...
sact` `/home` -ac`oid1/hID`
`/dev`
``` Boot network
```yuy`/etc/book/boxt`
### 0wned
text is empty
##################
Task here is to optimize, respond? and device/commute account Wi-Fi flow
`**Wlfl -ica File` -`Fzone` to`Install`.sh
```jsonmitter - Unblock
[hard switch`*
```br` Monitor boot saved`/jsonmysynics`*Good config Store*m frame(tpt)“ target``
```Listl~ bot mode`/`.oid`*check``
` wcst
[y. lock)`Step` Lookup - parameters``
.**Success**‘
```
```mGetfiles`Tinyrule` [wla_` audit**.bats` 192.168.0.0~`per device Floc` /Mon‘> Fajrtc`[vspd` cb4u`+Ytime`vars`-stat`tbabel...‘be... Secret
`` Restart system
```linux`
19 Jul 2008