19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

238<br />

Part IV: Hacking Operating Systems<br />

chkconfig<br />

If you don’t have an inetd.conf file (or it’s empty), your version of Linux is<br />

probably running the xinetd program (www.xinetd.org) — a more secure<br />

replacement for inetd — to listen for incoming network application requests.<br />

You can edit the /etc/xinetd.conf file if this is the case. For more information<br />

on the usage of xinetd and xinetd.conf, enter man xinetd or man<br />

xinetd.conf at a Linux command prompt. If you’re running Red Hat 7.0 or<br />

later, you can run the /sbin/chkconfig program to turn off the daemons<br />

you don’t want to load.<br />

You can also enter chkconfig --list at a command prompt to see what services<br />

are enabled in the xinetd.conf file.<br />

If you want to disable a specific service, say snmp, enter the following:<br />

chkconfig --del snmpd<br />

You can use the chkconfig program to disable other services, such as FTP,<br />

telnet, and web server.<br />

Access control<br />

TCP Wrappers can control access to critical services that you run, such as<br />

FTP or HTTP. This program controls access for TCP services and logs their<br />

usage, helping you control access via hostname or IP address and track malicious<br />

activities.<br />

You can find more information about TCP Wrappers from http://protect.<br />

iu.edu/cybersecurity/tcp-wrappers.<br />

Always make sure that your operating system and the applications running<br />

on it are not open to the world (or your internal network) by ensuring that<br />

reasonable password requirements are in place. Don’t forget to disable anonymous<br />

FTP unless you absolutely need it. Even if you do, limit system access to<br />

only those with a business need to access sensitive information.<br />

Securing the .rhosts and hosts.equiv Files<br />

Linux — and all the flavors of UNIX — are file-based operating systems.<br />

Practically everything that’s done on the system involves the manipulation of<br />

files. This is why so many attacks against Linux are at the file level.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!