Solaris CX-310-301 Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Software Solaris CX-310-301. Solaris CX-310-301 User's Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 77
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes

Resumo do Conteúdo

Página 2 - Exam Time Tips

Solaris 9 Security CX-310-301 9 Undoing SST ...

Página 3 - Additional Resources

Solaris 9 Security CX-310-301 10 Security Administrator for the Solaris 9 Operating System General Security Concepts This section is concern

Página 4

Solaris 9 Security CX-310-301 11 ¾ Detect – You should, at regular intervals, run tests to see if you can break in to your systems. A number

Página 5

Solaris 9 Security CX-310-301 12 is less likely that he/she will continue with the attack. Compare this aspect with adding security to your m

Página 6

Solaris 9 Security CX-310-301 13 ¾ The procedure to follow in the event of a security breach ¾ Any special dispensation procedures, for exa

Página 7

Solaris 9 Security CX-310-301 14 Application Security An insecure application can undermine the entire security policy and must be treated wi

Página 8

Solaris 9 Security CX-310-301 15 ¾ Unnecessary services and ports being available, allowing known vulnerabilities to be exploited ¾ The sys

Página 9

Solaris 9 Security CX-310-301 16 Accountability Accountability is the assignment of responsibility, frequently associated with user accounts

Página 10

Solaris 9 Security CX-310-301 17 ¾ Individual – Detailed information on an individual person, family, company or Government is targeted. Ter

Página 11 - Operating System

Solaris 9 Security CX-310-301 18 ¾ Employees – Probably the worst form of attacker is one from within. Normally an employee with a grudge ag

Página 12 - Good Security

Solaris 9 Security CX-310-301 1 Introduction This CramSession will help you prepare for the Solaris 9 Sun Certified Security Administrator.

Página 13 - Policies and Procedures

Solaris 9 Security CX-310-301 19 information for example, the attacker would consult publicly available sites such as www.cert.org or www.san

Página 14 - Network Security

Solaris 9 Security CX-310-301 20 100000 2 tcp 111 rpcbind 100000 4 udp 111 rpcbind 100000 3 udp 111

Página 15 - Application Security

Solaris 9 Security CX-310-301 21 220 ultra10.example.com ESMTP Sendmail 8.12.10+Sun/8.12.9; Thu, 1 Apr :49 +0100 (BST) 2004 18:38expn john 25

Página 16

Solaris 9 Security CX-310-301 22 ¾ B2 – Fully documented configuration control, facility management and system configuration. Security admin

Página 17

Solaris 9 Security CX-310-301 23 ¾ By operating lax permissions and revealing passwords Detection and Device Management This section looks

Página 18 - Attackers

Solaris 9 Security CX-310-301 24 It should be noted that login attempts using CDE (dtlogin) will not be caught by this facility. Only attempt

Página 19 - Information Gathering

Solaris 9 Security CX-310-301 25 ¾ Hardware error messages ¾ Failed su attempts ¾ User login failures ¾ System software and application e

Página 20 - Gathering Techniques

Solaris 9 Security CX-310-301 26 ¾ daemon – Messages concerning daemon processes (syslogd, inetd for example) ¾ * - All of the facilities ¾

Página 21

Solaris 9 Security CX-310-301 27 *.err;kern.notice;auth.notice /dev/sysmsg *.err;kern.debug;daemon.notice;mail.crit

Página 22 - Evaluation Standards

Solaris 9 Security CX-310-301 28 access to your system. However, if you configure syslog to send its messages to one or more central logging

Página 23 - Invalidating a Certification

Solaris 9 Security CX-310-301 2 Make use of the manual pages because they provide a wealth of information about the utilities as well as full

Página 24

Solaris 9 Security CX-310-301 29 Process Accounting Process accounting is installed as part of a default Solaris 9 installation and, although

Página 25 - /var/adm/messages

Solaris 9 Security CX-310-301 30 ¾ /etc/security/audit_user – Provides more detailed control allowing specific users and actions to be audit

Página 26 - SU logging

Solaris 9 Security CX-310-301 31 ¾ Reboot the system to bring it up with auditing enabled # /etc/security/bsmconv This script is used to en

Página 27

Solaris 9 Security CX-310-301 32 Interpreting the Results Continuing the example scenario, you now want to inspect the audit file(s) to see i

Página 28

Solaris 9 Security CX-310-301 33 Note: A reboot of the system automatically causes the current log file to close and a new one to be opened w

Página 29 - Using Multiple Files

Solaris 9 Security CX-310-301 34 ¾ deallocate – Used to deallocate a device after a user has finished with it ¾ dminfo – Used to report inf

Página 30 - Overview

Solaris 9 Security CX-310-301 35 Security Attacks This section looks at different types of attacks that can be attempted against your systems

Página 31 - Enabling BSM

Solaris 9 Security CX-310-301 36 Preventing DoS Attacks Some DoS attacks can be prevented fairly easily, whilst for others there is little pr

Página 32 - Generating an Audit

Solaris 9 Security CX-310-301 37 Privilege Escalation Attacks Types of Attack ¾ Trojan Horse – As the name implies, this exploit involves i

Página 33 - Audit Log Files

Solaris 9 Security CX-310-301 38 Detecting Attacks There are various methods for detecting that an attack has taken place. This section looks

Página 34 - Device Management

Solaris 9 Security CX-310-301 3 CRAMSESSION™ SINGLE USER LICENSE This is a legal agreement between you, an individual user, and CramSession

Página 35

Solaris 9 Security CX-310-301 39 The result is shown in the next screenshot.

Página 36 - Security Attacks

Solaris 9 Security CX-310-301 40 Note that the checksums match and the 1 match(es) indicates this too. The interactive method is quite labor

Página 37 - How DoS Attacks Execute

Solaris 9 Security CX-310-301 41 Using the find Command If you do not have access to a fingerprinting tool, then the find command is the next

Página 38 - Types of Attack

Solaris 9 Security CX-310-301 42 -r-sr-xr-x 2 root bin 15296 Apr 7 2002 /usr/bin/sparcv9/uptime -r-sr-xr-x 2 root bin 15296 Apr

Página 39 - Detecting Attacks

Solaris 9 Security CX-310-301 43 The following output shows the result of a Tripwire report after running a check on the fingerprint database

Página 40

Solaris 9 Security CX-310-301 44 Include Files 35 0 0 0 Man Pages 35 0 0 0

Página 41 - Using File Digests

Solaris 9 Security CX-310-301 45 Kernel Trust and OpenBoot The kernel is implicitly trusted because it IS the operating system. For this reas

Página 42 - Using the find Command

Solaris 9 Security CX-310-301 46 This prompts the user to enter a password twice. Note: Setting the EEPROM password should not be done light

Página 43 - Using Tripwire

Solaris 9 Security CX-310-301 47 ¾ After a specified time of inactivity ¾ On a specific date ¾ Immediately You can also use a combination

Página 44

Solaris 9 Security CX-310-301 48 Note: The expiry information is stored in /etc/shadow. Restricting root Logins It is bad practice to allow

Página 45

Solaris 9 Security CX-310-301 4 The Content may be subject to export restrictions. You agree that you will not export the Content or any part

Página 46 - OpenBoot

Solaris 9 Security CX-310-301 49 # find / -user 8888 -print -exec chown root {} \; /var/report1 /var/report2 /var/report3 Now list the files

Página 47 - Expiring Accounts

Solaris 9 Security CX-310-301 50 ¾ It has become increasingly common, when choosing a password, to replace some vowels with numerals that ar

Página 48

Solaris 9 Security CX-310-301 51 Another aspect of password aging is to be able to control how frequently a user may change their own passwor

Página 49 - Dormant Accounts

Solaris 9 Security CX-310-301 52 ¾ The step above creates the file passwd.guess, which john will work on to try and obtain the actual passwo

Página 50 - Protecting Passwords

Solaris 9 Security CX-310-301 53 It should also be remembered that password authentication is only one method of gaining access to a system.

Página 51 - Password Aging

Solaris 9 Security CX-310-301 54 ¾ SULOG – Normally set to /var/adm/sulog defines the log file that is written to when the su command is run

Página 52 - Password Cracking Tools

Solaris 9 Security CX-310-301 55 Creating A Profile A profile is created by making an entry with an editor, such as vi, in the file /etc/secu

Página 53

Solaris 9 Security CX-310-301 56 Logging in to a Role To access the functionality of a role, you must first be logged in as a normal user. Th

Página 54 - User Security with SU

Solaris 9 Security CX-310-301 57 ¾ Directories • Read – This allows the directory to be read, but the files cannot be listed • Write – Thi

Página 55 - Role Based Access Control

Solaris 9 Security CX-310-301 58 ¾ An attacker can gain valuable information about the system which can be used later to aid further attacks

Página 56 - Assigning a Role to a User

Solaris 9 Security CX-310-301 5 General Security Concepts ...

Página 57 - Directories and Files

Solaris 9 Security CX-310-301 59 Setting ACLs To set # setfacl -s user::rwx,g::r--,o:---,mask:rw-,u:temptest:r-- testfile To see the ACL jus

Página 58

Solaris 9 Security CX-310-301 60 Deleting an ACL To remove an ACL, use the setfacl –d command to remove the specific permissions. When the la

Página 59 - Identifying an ACL

Solaris 9 Security CX-310-301 61 ¾ Control Flag – The deciding factor on what constitutes a success or failure – can be requisite, required,

Página 60 - Modifying an ACL

Solaris 9 Security CX-310-301 62 ¾ Make sure the module is owned by root and the permissions should be equal to 555 ( or r-xr-xr-x ). You sh

Página 61 - PAM and Kerberos

Solaris 9 Security CX-310-301 63 ¾ Kerberos is not a transparent service, like PAM where modules can be plugged in. In order to use Kerberos

Página 62 - Add a new PAM Module

Solaris 9 Security CX-310-301 64 ¾ Network Address Translation (NAT) – where a corporate network can be made to look (externally) like it ha

Página 63 - Limitations of Kerberos

Solaris 9 Security CX-310-301 65 It is good practice to disable all services and then only re-instate the services that are genuinely necessa

Página 64 - Host and Network Prevention

Solaris 9 Security CX-310-301 66 ¾ Only install the Solaris cluster containing packages that you actually need. There is no need to install

Página 65 - Inetd Services

Solaris 9 Security CX-310-301 67 http://www.sun.com/solutions/blueprints/0601/jass_quick_start-v03.pdf and for a full install, configure and

Página 66 - Host Hardening

Solaris 9 Security CX-310-301 68 ¾ Audit – This contains the scripts to run in order to carry out a verification check jass run. These scrip

Página 67 - Solaris Security Toolkit

Solaris 9 Security CX-310-301 6 Detection and Device Management...2

Página 68 - Configuring SST

Solaris 9 Security CX-310-301 69 [NOTE] Copying /.profile from /opt/SUNWjass/Files/.profile. ================================================

Página 69 - Running SST

Solaris 9 Security CX-310-301 70 You should note that not all SST actions can be undone, only those that are called by a script. This needs t

Página 70 - Undoing SST

Solaris 9 Security CX-310-301 71 Network Connection Access, Authentication and Encryption The final section looks at remote connections and t

Página 71 - Verifying SST

Solaris 9 Security CX-310-301 72 telnet stream tcp nowait root /usr/local/bin/tcpd in.telnetd –d1 Denying and Allowing Host Connects T

Página 72 - Encryption

Solaris 9 Security CX-310-301 73 rm -f nul.c ( ./nul ; cat prototype ) > in.rlogind chmod 644 in.rlogind ¾ This creates banner files for

Página 73

Solaris 9 Security CX-310-301 74 warning: ultra1: hostname alias warning: (official name: ultra1.mobileventures.homeip.net) client: hostnam

Página 74 - Validating TCP Wrappers

Solaris 9 Security CX-310-301 75 ¾ ssh – Secure session connection to replace telnet ¾ scp – Secure copy of files between hosts ¾ sshd – T

Página 75 - Solaris Secure Shell

Solaris 9 Security CX-310-301 76 Generating a Client Key The client generates a key pair (private and public keys) by using the ssh-keygen

Página 76 - Starting and Stopping SSHD

Solaris 9 Security CX-310-301 7 Using File Listings .......

Página 77 - Using ssh

Solaris 9 Security CX-310-301 8 The Set-Uid and Set-Gid Permissions ..................

Comentários a estes Manuais

Sem comentários