Jump to ratings and reviews
Rate this book

Linux Server Security: Hack and Defend

Rate this book
Learn how to attack and defend the world's most popular web server platformLinux Server Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction.The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker's tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these someone else has control of your systems.Master hacking tools and launch sophisticated perform SQL injections, deploy multiple server exploits and crack complex passwords. Defend systems and make your servers invisible, be confident of your security with penetration testing and repel unwelcome attackers. Increase your background knowledge of attacks on systems and networks and improve all-important practical skills required to secure any Linux server. The techniques presented apply to almost all Linux distributions including the many Debian and Red Hat derivatives and some other Unix-type systems. Further your career with this intriguing, deeply insightful, must-have technical book. Diverse, broadly-applicable and hands-on practical, Linux Server Hack and Defend is an essential resource which will sit proudly on any techie's bookshelf.

144 pages, Kindle Edition

First published January 2, 2016

2 people are currently reading
26 people want to read

About the author

Chris Binnie

5 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
3 (20%)
4 stars
4 (26%)
3 stars
6 (40%)
2 stars
2 (13%)
1 star
0 (0%)
Displaying 1 - 2 of 2 reviews
Profile Image for Freso :watermelon:.
24 reviews10 followers
September 12, 2024
This was an interesting read. On one hand, I did learn about various tools I didn’t know about (or only knew about-knew about but never took time to look into) as well as learning some protocol level stuff, on the other hand… is this for beginners or intermediaries? Seasoned system administrators or hobbyist home server/system maintainers?

It claims to be for mid-level admins, software hackers, and other IT professionals, yet still includes instructions on how to use basic standard package management commands (`apt-get`/`yum`). It also includes help with using basic systemd commands and various other very basic system administration commands. On the other hand, it seems to just not cover other (basic, I thought) security concepts—or maybe the audience is supposed to already be familiar with these?

E.g., the first chapter starts right off the bat with an approach on how to make your system “invisible” on the internet, but there is no discussion (here or later on) about how obscurity isn’t security—which I feel is a fairly basic tenet within security (computer and otherwise)? Any discussion about threat modelling is also entirely absent, to the extent where it isn’t mentioned at all (“model” is not in the text once!).

The author also seems to not be very knowledgable about the field and to not have done simple fact-checks of some statements made. E.g., inotify is reportedly in kernels from version 2.6.13 and after. “Reportedly”? Either it’s in the kernel tree or it isn’t! And according to the forums, AMD processor chips suit the XOP version. This should be a very simple case of checking which CPU flags the XOP expects and whether AMD CPUs have them. This could even have included the flag(s) to look for in `/proc/cpuinfo` so readers could determine this on their own, beyond just “AMD CPU or not”.

Some parts also come across as if the author is trying out the software solely for the purpose of including in the book. E.g., Having tried installing LMD […], and having become familiar with how it operates, I believe that LMD is definitely worth considering for use on your
production machines. Does this mean the author has no experience actually running LMD (Linux Malware Detect) on production machines? They’ve just installed it on a test machine and played around with it? And how much did they even try it out? E.g., when discussing Iptables rules in chapter 6, they note that If I’m reading the documentation correctly, [some details about command-line options/flags]. Did he even try it out? Is he writing the chapter based entirely off of his understanding from reading the man page? If he did try it out, why does he need to specify the If I’m reading […] correctly, he would know… no?

There are a number of other small gripes (like, why is the author calling standard `*` globbing “regular expressions”??), but I feel like I have already dug into the writer enough, so let me finish off with some things I did appreciate.

Each chapter is written somewhat like a longer blog post and are mostly self-contained, which makes them good for use as reference material as well as for picking out only chapters of relevance/interest. I did learn about a number of tools I was not familiar with before (e.g., `knock`, LMD) and brought up some other tools that I’ve been meaning to look into but never got around to (e.g., nmap). I also learned some background about TCP and ICMP I didn’t know beforehand.

Overall, it’s… fine. The book is showing its age (being almost 10 years old now), but many of the foundational things covered here are, to my knowledge, still true today, though specifics/implementations may look different. If you’re a war-seasoned system administrator and/or pentester, there likely won’t be much to gather from this, but if you’re reasonably new to Linux and security/system hardening, there might be some decent pointers here. In the latter case, though, there are probably other and better sources to get started with before you begin to look at the things in this book (such as the “Security” article on the ArchWiki).
2 reviews
May 2, 2017
A wonderful source for information security. Hopefully the content is not misused and only should be used for legitimate purposes to defend the threats.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.