Jump to content

Recommended Posts

hFAhGcC.jpg

 

LinuxCBT Key-Files Edition

English | .MOV | aac, 44100 Hz, mono | h264, yuv420p, 1280x720, 5.00 fps | 785 Mb

Genre: eLearning

 

 

Introduction - Topology - Features

Discuss areas of concern

Expose available systems

Prepare to study important files

 

Boot Partition

Identify /boot setup on various systems

Enumerate key files regarding boot sequence

Peruse various configuration files

Present hypothetical areas of failure

Contrast with Windows boot implementation

 

INIT Environment

Discuss traditional INIT implementation

Identify important files across distributions

Examine INIT.D and RC hierarchies

Propose methods of ensuring integrity of environment

 

Kernel Modules Environment

Identify key directory hierarchy

Discuss applicability

Explore various modules related configuration files

Enumerate loaded modules and correlate to FS taxonomy

Correlate detected modules to loaded and available modules

 

PROC File System

Discuss usage and applicability

Descend PROC hierarchy accordingly

Identify PID tree and related descriptors

Recover Kernel invocation method

Expose supported Paritions, File Systems & Devices

Dump CPU & Memory configuration

Peruse other applicable PROC entries

 

SBIN Executables

Identify available SBIN containers

Expose SETGID and SETUID SBIN entries

Enumerate relevant client system binaries

Locate important SBIN daemons | services

Discuss storage management SBIN entries

Find interface and network related SBIN entries

 

System Control Configuration

Explain applicability

Identify user space process

Enumerate default configuration directives

Define common variables influencing system behavior

Committ variables for persistence

Discuss potential areas of concern with system configuration

Evaluate results

 

INETD | XINETD Configuration

Explain super server usage

Identify both INETD and XINETD on relevant systems

Expose controlled services

Disable superfluous super-server controlled services

 

User Accounts Environment

Discuss relevance of securing related files

Explain default files

Suggest areas of concern regarding compromised entries

Tighten default security policy related to user accounts

 

Pluggable Authentication Modules (PAM)

Identify key files related to PAM AUTH

Expose baseline configuration based on current definition

Locate baseline PAM libraries and discuss strategies

Compare and contrast environmental differences across accounts

 

Hosts | Protocols | Services

Explain relevance of these key files

Discuss typical name resolution process

Identify baseline confguration

Affect changes to relevant files and evaluate

Discuss typical malware impact on key files

 

NSSWITCH Configuraton

Explain importance and relevance

Identify various implementations

Make changes to name resolver configuration

Evaluate results

 

DNS Client Resolution Configuration

Identify key files governing client resolution

Perform queries with incorrect resolution

Correct resolution accordingly

Vary configuration and evaluate results

 

User Profiles Environment

Discuss applicable entries related to profiles

Delineate between system-wide and user-wide configurations

Examine relevant profile files for $SHELL and GUI environments

Posit suggestions to tighten baseline

Evaluate accordingly

 

System Scheduler Environment

Discuss importance of CRON

Identify system and user-wide configuration files

Propose methods of tightening configuration

Evaluate resuls

 

DNS Server Configuration

Discuss importance of traffic direction services

Identify key files across distributions

Suggest areas to enhance security posture

Intersperse corrupt DNS values and evaluate influence

 

SYSLOG Configuration

Discuss applicability

Review baseline configuration

Hypothesize possible data-leakage opportunities

Propose methods of configuration augmentation

 

SSH | Client | Server | Files

Discuss importance of file correlation

Identify key client files

Change client file data and evaluate behavior

Identify outdated key file information

Generate usage keys and propagate

Test communications

Identify key server files

Discuss implications of SSH configuration

DOWNLOAD

 

http://rapidgator.net/file/cb88ffc790727a59c78620abd22c2693/aKey.part1.rar.html
http://rapidgator.net/file/59a54843515b4f4e06e355b29383f3c6/aKey.part2.rar.html
http://rapidgator.net/file/8a9a0dfe0d8f0ba498fb932bbd1535bf/aKey.part3.rar.html
http://rapidgator.net/file/1c267abd8bee4e4c7fe94d44f9d468d9/aKey.part4.rar.html
http://rapidgator.net/file/5b6b1380bd7953a6cc66c64b9419a662/aKey.part5.rar.html
http://rapidgator.net/file/ce2fec287d0da0fae0e5abeb65616bf1/aKey.part6.rar.html
http://rapidgator.net/file/c7b62ff8f19c992c694a49ac98edce73/aKey.part7.rar.html
http://rapidgator.net/file/c621dd70f3b96918d1009614120e8f64/aKey.part8.rar.html


http://uploaded.net/file/c8nfcf10/aKey.part1.rar
http://uploaded.net/file/qkzxhjw3/aKey.part2.rar
http://uploaded.net/file/yy5j6xwb/aKey.part3.rar
http://uploaded.net/file/jsp1eqk6/aKey.part4.rar
http://uploaded.net/file/x11u5oeg/aKey.part5.rar
http://uploaded.net/file/2mudlqw0/aKey.part6.rar
http://uploaded.net/file/gdmzj1ez/aKey.part7.rar
http://uploaded.net/file/zj1oq1ef/aKey.part8.rar


http://www.uploadable.ch/file/asrfCCuyMQgA/aKey.part1.rar
http://www.uploadable.ch/file/2BbQyY68NShH/aKey.part2.rar
http://www.uploadable.ch/file/vAyfetuJfz7N/aKey.part3.rar
http://www.uploadable.ch/file/7RJcwFG6p4Mm/aKey.part4.rar
http://www.uploadable.ch/file/zwNhU5Z2EWyq/aKey.part5.rar
http://www.uploadable.ch/file/wJBN7y4wTFCN/aKey.part6.rar
http://www.uploadable.ch/file/b85DSmsUzMH5/aKey.part7.rar
http://www.uploadable.ch/file/cAdJj8j7BkDZ/aKey.part8.rar


http://www.hitfile.net/2Nur/aKey.part1.rar.html
http://www.hitfile.net/2NoB/aKey.part2.rar.html
http://www.hitfile.net/2NIu/aKey.part3.rar.html
http://www.hitfile.net/2O4I/aKey.part4.rar.html
http://www.hitfile.net/2NkQ/aKey.part5.rar.html
http://www.hitfile.net/2NFy/aKey.part6.rar.html
http://www.hitfile.net/2Nz1/aKey.part7.rar.html
http://www.hitfile.net/2NiQ/aKey.part8.rar.html
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...