00 Linux Hardening Training Intro

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Linux Hardening Training

Introduction and Agenda

Internal 1
Linux Hardening Training
Introduction
Short introduction whoami and whoareyou?
What are your expectations?

What are your operating systems skills?


What are your network (infrastructure) skills?
Do you have IT-Security background?

2014-12-03 Internal 2
Linux Hardening Training
Introduction ERNW GmbH

Heidelberg based security Independent


consulting and assessment
We understand corporate
company.
Deep technical knowledge
Structured (assessment)
approach
Business reasonable
recommendations

Blog: www.insinuator.net
Conference: www.troopers.de
2014-12-03 Internal 3
Linux Hardening Training
Organizational Stuff
Todays schedule
Break, lunch and coffee
Training documents (slides as PDF)
Hands on part

2014-12-03 Internal 4
Linux Hardening Training
Agenda (1)
Part 1 Why do we need IT-Security?
Threats, assets and risks
What the hell has CIA concerning with IT-Security?
Typical attack vectors and privilege escalation

Part 2 Some Linux basics and IT-Security


Local pitfalls handling unix system permissions
Network pitfalls handling network services
Security by obscurity

2014-12-03 Internal 5
Linux Hardening Training
Agenda (2)
Part 3 How to harden my Linux
Harden the file system (permissions, links, setuid
Harden the services (correct binding, pentesting
Harden the running applications
Logging, monitoring, alarming and auditing
Advanced hardening (grsec, pax, apparmor, selinux)

Part 4 Hands on proof the hardening


Why setuid could become dangerous?
Hardlinks and how to use them for privilege escalation
Breaking the system and getting root (via web application and network service)

2014-12-03 Internal 6

You might also like