Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Linux (Hacking Exposed) Paperback – March 27, 2001
Frequently Bought Together
Customers Who Bought This Item Also Bought
This book covers pretty much everything you'd want to do with a Linux machine as a network server. Read it and see some of the weaknesses in your system--and do something about them before someone else does. --David Wall
Topics covered: Security best practices, approached from the perspective of what can go wrong and what can be done about the problems. Specific coverage goes to all major services, including user management, FTP, HTTP, and firewalling. --This text refers to an out of print or unavailable edition of this title.
If you’re the author, publisher, or rights holder of this book, let ACX help you produce the audiobook.Learn more.
Top Customer Reviews
The "Hacking Exposed" series is known for its unique example-driven style. Rather than telling the reader about a technique or problem, the authors demonstrate the issue using command-line examples. I find myself reading with book and laptop at hand, ready to duplicate the authors' sample commands. This process reinforces the authors' message, while the reader learns if a specific problem applies to his situation. Furthermore, by showing exactly how to execute certain commands, the authors impart bits of wisdom and trickery not found elsewhere.
For example, chapter 11 describes attacks and defenses for FTP servers. To explain active and passive FTP sessions, the authors demonstrate running an FTP client with the -d switch to illustrate raw instructions sent by the client over the FTP command channel. I had never seen this switch in use, but as an intrusion detector I constantly see raw FTP instructions like those revealed by the -d switch. These and other tidbits, like using the chattr -i command or setting the "sticky bit", make HLE exceptional.
Beyond these benefits, readers will enjoy clear, thorough explanations of Linux security issues. HLE gives first-rate descriptions of ssh and web man-in-the-middle attacks, race conditions, and FTP data hijacking. HLE also provides great illustrated examples of FTP bounce attacks, giving intrusion detectors the minutiae we need to recognize these techniques.Read more ›
Well, we're not about to switch. However this book covered so many unexpected issues that affected our *BSD boxen that we spent a solid week implementing changes on all our systems. The detail of this book was superb, and it was easy to figure out the differences between their Linux-specific solutions and what was needed on our *BSD systems when they weren't exactly the same.
Got Unix? Buy this book.
The best way to learn while reading HE:L2E is to try the sample commands. I also recommend visiting the links mentioned and installing many of the tools described by the authors. I found programs like raccess, nsat (ch. 3), sslsniff (ch. 7), nstx, and httptunnel (ch. 15) particularly interesting from an attacker's point of view. From a system administration standpoint, coverage of passlogd (ch. 2), lilo and grub (ch. 5), and X (ch. 6) were very helpful.
The authors share many novel ways to abuse Linux systems, but counter those exploits with little-known features or third-party tools. I never knew I could use bash's HISTCONTROL feature to selectively remove entries from shell history files. HE:L2E goes the extra mile to help secure your system, such as including sample C code in ch. 13 to allow one to compile TCP Wrappers support into one's own programs. Other clear, concise defensive measures were introduced in excellent chapters on keeping the kernel and packages current (appendix B) and pro-active security measures (ch. 2). The last appendix gives a short yet powerful description of the damage an intruder can perform, showing how he hid unauthorized programs and how those programs were discovered.
If you use Linux, you'll find HE:L2E indispensable. I even applied many of the tools and techniques to my FreeBSD system, showing that that good security advice can be a cross-platform endeavor.
Most Recent Customer Reviews
First, this book does _NOT_ have a installation walk through...YES!!!
You will not find another book this comprehensive in the length in HLE has accomplished. Read more
The Hacking Exposed books have set the bar for this genre of security book. Hacking Linux Exposed - 2nd Edition doesn't fail in meeting that bar as well. Read morePublished on February 10, 2005 by sixmonkeyjungle
When I first starting using Linux systems and putting them online I had NO idea what sort of grief I was in for. Read morePublished on April 30, 2003
I just finished going through the entire book line by line. I am extreemly new to Linux and security, and this book made it all very clear. Read morePublished on March 7, 2003 by Edward Kakani
Hacking Linux Exposed proves itself the leader again in this, the Second Edition . The authors go into great depth showing you every nuance of Linux from a secur ity standpoint,... Read morePublished on March 7, 2003 by jjtus
Given the complexity of Linux systems, and the years spent hardening such systems against would-be intruders, it is amazing how a simple, clever idea can still translate into a... Read morePublished on March 6, 2003 by Doug M
"Hacking Linux Exposed", 2nd edition does what few books do - it exceeds its first edition in both the extent of coverage and presentation style. Read morePublished on January 11, 2003 by Dr Anton Chuvakin
I am very new to Linux. I've got a lot of windows experience and an MCSE, but recently my job has included a few Linux machines when other guys were downsized. Read morePublished on December 29, 2002 by Nicky Boran
If you're looking for a book that doesn't hold it's punches, this is the one. These chapters are filled with tricks that can be used for good or ill. Read morePublished on December 27, 2002