[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
facilities, system messages
sensitive information in messages
FascistCheck function (CrackLib)
fetchmail
mail delivery with
fgrep command
file attributes, preserving in remote file copying
file command
file permissions
[See permissions] files, protecting
[See also Gnu Privacy Guard]2nd
encrypted, maintaining with Emacs
encrypting directories
encrypting with password
encryption, using
maintaining encrypted files with vim
permissions
[See permissions] PGP keys, using with GnuPG
prohibiting directory listings
revoking a public key
shared directory
sharing public keys
uploading new signatures to keyserver
world-writable, finding
files, searching effectively
[See find command] filesnarf command
filesystems /proc
Andrew Filesystem kaserver
device special files, potential security risks
mounted, listing in /proc/mounts
searching for security risks
filenames, handling carefully
information about your filesystems
local vs. remote filesystems
permissions, examining
preventing crossing filesystem boundaries (find -xdev)
rootkits
skipping directories (find -prune)
Windows VFAT, checking integrity of
filtered email messages (PineGPG)
filters capture expressions Ethereal, using with
selecting specific packets
display expressions Ethereal, using with
tcpdump, using with
logwatch, designing for
protocols matching filter expression, searching network traffic for
Snort, use by
find command device special files, searching for
manual integrity checks, running with
searching filesystems effectively
-exec option (one file at a time)
-perm (permissions) option
-print0 option
-prune option
-xdev option, preventing crossing filesystem boundaries
running locally on its server
setuid and setgid bits
world-writable files, finding and fixing
finger connections
redirecting to another machine
redirecting to another service
fingerprints checking for keys imported from keyserver
operating system
2nd
nmap -O command
public key, verifying for
firewalls blocking access from a remote host
blocking access to a remote host
blocking all network traffic
blocking incoming network traffic
blocking incoming service requests
blocking incoming TCP port for service
blocking outgoing access to all web servers on a network
blocking outgoing network traffic
blocking outgoing Telnet connections
blocking remote access while permitting local
blocking spoofed addresses
controlling remote access by MAC address
decisions based on source addresses, testing with nmap
designing for Linux host, philosophies for
limiting number of incoming connections
Linux machine acting as
loading configuration
logging
network access control
open ports not protected by, finding with nmap
permitting SSH access only
pings, blocking
2nd
portmapper access, reason to block
protecting dedicated server
remote logging host, protecting
rules building complex rule trees
deleting
hostnames instead of IP addresses, using in rules
inserting
listing
loading at boot time
saving configuration
source address verification, enabling
TCP ports blocked by
TCP RST packets for blocked ports, returning
testing configuration
vulnerability to attacks and
flushing a chain
forced commands limiting programs user can run as root
plaintext key, using with
security considerations with
server-side restrictions on public keys in authorized keys
Forum of Incident Response and Security Teams (FIRST)
home page
forwardable credentials (Kerberized Telnet)
FreeS/WAN (IPSec implementation)
fstab file grpid, setting
nodev option to prohibit device special files
prohibiting executables
setuid or setgid attributes for executables
FTP open server, testing for exploitation as a proxy
passwords captured from sessions with dsniff
sftp
fully-qualified directory name
|