Tecnologia
Enviado por juan_noguera • 26 de Enero de 2015 • 219 Palabras (1 Páginas) • 178 Visitas
TALLER
HARDENING LINUX
JOHAN ANDRES POVEDA
DAVIS EDUARDO BAUTITA
JUAN GABRIEL NOGUERA
PROFESOR:
DAVID LEONARDO MORENO ROJAS
SEGURIDAD EN APLICACIONES
FUNDACION SAN MATEO
SEMINARIO TECNOLOGICO
BOGOTA D.C
2015
1 FIREWAL-UFW-INSTALACION
2. Secure shared memory.
Sudo nano vi /etc/fstab
3. SSH Hardening - key based login, disable root login and change port.
sudo nano vi /etc/ssh/sshd_config
4. Apache SSL Hardening - disable SSL v3 support.
sudo nano vi /etc/apache2/mods-available/ssl.conf
5. Protect su by limiting access only to admin group.
6. Harden network with sysctl settings.
sudo nano vi /etc/sysctl.conf
7. Disable Open DNS Recursion and Remove Version Info - BIND DNS Server.
Sudo nano vi /etc/bind/named.conf.options
8. Prevent IP Spoofing.
sudo nano vi /etc/host.conf
9. Harden PHP for security.
sudo nano vi /etc/php5/apache2/php.ini
10. Restrict Apache Information Leakage.
Sudo nano vi /etc/apache2/conf.d/security
11. Web Application Firewall - ModSecurity.
12. Protect from DDOS (Denial of Service) attacks –ModEvasive
1. Install ModSecurity on your server.
13. Scan logs and ban suspicious hosts - DenyHosts and Fail2Ban.
sudo nano vi /etc/fail2ban/jail.conf
sudo fail2ban-client status
14. Intrusion Detection - PSAD.
15. Check for rootkits - RKHunter and CHKRootKit.
16. Scan open ports - Nmap.
17. Analyse system LOG files - LogWatch.
18. SELinux - Apparmor.
19. Audit your
...