... and /var/kerberos/krb5kdc/kdc.acl files to reflect your Kerberos
realm and DNS domain names.You must then add an administrative user, as well
as additional principals, to the database.
Using kadmin.local
Because ... a Kerberos administrator uses the kadmin pro-
gram to add a principal to the database. Note that the ticket does not actually
contain the password. It is only signed by...
... to Open Source Security
™
1 YEAR UPGRADE
BUYER PROTECTION PLAN
Linux:
A Guide to Open Source Security
The Only Way to Stop a Hacker Is to Think Like One
James Stanger
Patrick T. Lane
138 _linux_ FM ... such as IBM, Compaq, and Intel.
138 _linux_ FM 6/ 20/01 9:29 AM Page viii
14 Chapter 1 • Introduction to Open Source Security
Packetstorm
Packetstorm is spec...
... supplied a username and
password. If a user attempts to run the command via sudo and that user is not in
the sudoers file, an e-mail is automatically sent to the administrator, indicating
that an unauthorized ... that all administrators down-
load and install the security upgrades to avoid denial-of-service (DoS)
and intrusion attacks that can result from these weaknesses. For exam...
... adns (www.gnu.org/software/
adns), gnome, and libpcap (libpcap is on the accompanying CD). All but
adns are installed by default in Red Hat 7.0 systems, and all of the RPM
packages are available ... 9:35 AM Page 124
152 Chapter 3 • System Scanning and Probing
■
The ability to add an entire IP network or DNS domain to the map,
and then have Cheops automatically add new hosts to the map
■...
... creates its database, it is said to enter database
initialization mode.
5. You can then set Tripwire to rescan these files and compare their signa-
tures to the signatures stored in the database.This ... generally extends your logging
capability by placing additional information into a
log file or into a database.
Alerting An IDS often has the ability to send alert messages
to...
... data?
A: As you have learned, packet sniffing is a powerful tool. It allows malicious
hackers to capture packets that contain passwords and usernames.The only
way to protect yourself against hackers ... directories, and databases.
; An IDS can act as a supplement to a firewall, because it can help you
monitor traffic on the internal network. Sometimes it may be useful to
place an...
... Red
Hat Package Manager (RPM) packages are already installed (you may need to
update them later in this section).
To check if an RPM is installed, enter rpm -qa | grep rpm_name .To
install an RPM, ... time and trouble by acquiring
FreeS/WAN through one of these alternate sources.
Some available script sets are designed to allow you to manage firewalls
that also serve as FreeS/WAN IPSe...
... Ipchains and Iptables also allow you to configure your Linux router to
masquerade traffic (i.e., to rewrite IP headers so that a packet appears to
originate from a certain host), and/or to examine ... own
dynamic database. If this database senses a number of ports that have
been scanned in a row, the firewall can take action. Some actions the
firewall can take may include auto...
... rules database One of the common moves by a hacker is
to alter the rules database in subtle ways that make it easier for the
hacker to gain access to the network. Check your rules and compare
them ... problems, because it will require you to ensure that this daemon is not sub-
ject to bugs that can cause a security problem. Any daemon, such as Cron, that
acts automatically can...
... that all
Application layer data is encrypted. No passwords, usernames, or usable data
www.syngress.com
Chapter 7 Continued
138 _linux_ AppB 6/ 20/01 9:55 AM Page 62 4
Hack Proofing Linux Fast Track ... database. Determine if any unauthorized changes have been
made to your database. Use the diff command to compare the two files to
see if any changes have occurred.You may also use md5...