Entry-level cybersecurity with Linux
Linux is the central operating system used on the Internet. Many cloud platforms and network devices are based on Linux kernels. All mobile devices and building platforms in the Internet of Things are Linux-based. Raspberry Pi and Android are Linux clones.
How hackers utilize mistakes in file and directory rights configurations
Explanations of directory traversal
Can malicious actors’ traces with simple commands be find
This can be done, but one needs to learn the basics of Linux to understand the following topics…
Peripheral devices management
User and process rights
Files and directory protection
What are Preferred places for adversaries’ malicious code
Why is it worth learning Linux?
For event dates and additional information, leave a phone number or email address in the contact menu.
Part 1 Entry-level Linux security course
Linux and Unix protection
Operating system environment and user environment. Hidden bootloader scripts.
Directory structure. File access rights. Types of users and groups. User rights. Change of user rights. Change of owner. chown. Inheritance of rights. Hidden files. File with hashed user passwords.
Input-output processes. Error console. Input and output commands. Telnet protocol. Communication between terminals. User behaviour tracking.
Command line language with the bash interpreter. A script for communicating between terminals.
Peripheral device management. Directory with peripheral device names.
File system structure from an operating system perspective. Create a partition and initialize the file system for the peripheral device. mke2fs. Mounting and unmounting a device. List of installed devices. df –H. df –version.
Operating system processes and user-owned processes. Inheritance of rights. Background processes. Hide a background process. Bringing a process from background to normal mode.
Overcoming user privilege restrictions with su and sudo. Change the user in the current shell session. Directory traversal.
Process priority. Change the priority of a process. Deferred Execution Schedule.
Part 2 Hardening Linux basics
Relevant file and directory permitions. Proceses permitions. User rights. Services and network ports.
Module repositories. Installing a module in the operating system. Configure the module list.
Attaching and hiding a screen.
Monitoring user behaviour. Internal user monitoring commands in bash. Last and cat commands /home/user/.bash_history, sudo lastlog. Installing sysdig. sysdig –c spy_users. Additional packages psacct or acct
Configuring monitoring services. ssh logging, ftp logging.
Part X Depends upon participants
There are ready-made themes, but if desired
The topics can be based on their themes or issues with Linux administration…
Resume
Linux is the central operating system used on the Internet. Many cloud platforms and network devices are based on Linux kernels. All mobile devices and building platforms in the Internet of Things are Linux-based. Raspberry Pi and Android are Linux clones.
Why is it worth learning Linux?
Linux makes the fundamental concepts of operating systems transparent, and understanding them is a solid basis for expertise in information systems.
Unfortunately, finding a systematized course that provides training in Linux is difficult.
Should cybersecurity specialists study Linux? The answer is YES and in the aspect of operating system configuration security.
When investigating the most profound information system security incidents, it often turns out that the causes are based on errors in operating system administration.
How should Linux security training begin?
Configuring Linux security starts with the beginner’s first steps because the perspective differs from that of Linux administration.