SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Linux Server Administration
Most Popular Server Operating System
CentOS
RedHat
Microsoft Windows Server
Fedora
Ubuntu
Telnet
Bi-directional interactive text-oriented communication
facility using a virtual terminal.

Port 23(TCP).

Client-Server Architecture
Vulnerability:
Plain text sent over the connection

No authentication to ensure connection between
two desired hosts.
Secure Shell(SSH)

Cryptographic Network Protocol.

Secure data-communication.

Remote Command execution.

Cipered text(encrypted) is sent over the connection.

Port 22(TCP)
Applications:

Secure Access to shell Accounts.
File Transfer Protocol(FTP)

Transfer files from one host to another.

Client-serverArchitecture.

Port 20(Data-channel)

Port 21(Client-Server)
Vulnerability:

Brute Force Attacks

Packet Capture(Sniffing).

Spoof Attacks.
Domain Name Service(DNS)

Hierarchical distributed naming system for devices
on internet or on the private network.

Translates domain name to IP Addresses and vice-
versa.

Port 53(UDP).

Zones:

Forward Zone-Translates Name to its IP.

Reverse Zone-Translates IP to its Name.
Domain Name Service(DNS)
Common Keywords:

A-Address records

NS-Nameserver records

MX-Mail Exchanger records.
Vulnerabilities:

DNS Cache Poisoning.

DNS Spoofing.
Dynamic Host Configuration
Protocol(DHCP)

Dynamically Distributes IP for interaces and
services.
Operations(DORA):

DHCP Discover.

DHCP Offer.

DHCP Request.

DHCP Acknowlegement.
Features:

Periodic Renewal,Rebinding,Failover Mechanisms.
Dynamic Host Configuration
Protocol(DHCP)
Port 67(Connection to Server).
Port 68(Connection to Client).
Types of Allocations:

Static ,Dynamic and Automatic.
Vulnerabilites:

No way to validate Identity of DHCP Server.

Resource Exhaustion Attacks from malicious DHCP
Clients.
Apache Web Server

Most Popular Web Server(Worldwide).

Can be implemented on all OS'es.

Port 80(HTTP),443(HTTPS).

Support compiled modules(mod_ssl,mod_status).

Support Virtual Hosting.

Support Web Authentication Mechanisms.

Supports PHP,Perl,HTML,other web-based
languages.
Apache Web Server
Vulnerabilities:

SQL Injection.

Cross Site Scripting(XSS).

DOS Attacks.
Server Message Block(SMB)

File and Printer Services for Windows Clients.

Primary Domain Controller for Windows Clients.

Encrypted Data communication by default.
Protocol NetBios-
NameService(ns)
NetBios-
Datagram(dgm)
NetBios-
Session(ssn)
Active
Directory(ad)
Port No. 137(UDP,TCP) 138(UDP) 139(TCP) 445(TCP)
Postfix Webmail Server

Mail Transfer agent that routes and deliver emails.

MIME Encapsulation,SASL Authentication.

Delivery Status Notifications(DSN).

Port 25(SMTP).
Features:

Defense against malware and spambots.

Combines with Message storage access(Dovecot).

Provides GUI with Squirrel(Web-based email
Client).
Proxy Server

Intermediate between the Client and Originial
Server.
Advantages:

Monitoring and filtering.

Improves Caching,Performance and Load
Balancing.

Protect the Actual Server from Attacks.

Spoon Feeding to Slow Clients.

Accessing services anonymously.
Proxy Server
Types of Proxies:

Tunneling Proxies.

Forwarding Proxies.

Reverse Proxies.
Examples:

Socks Proxy.

Squid Proxy Server(Port 3128).
Linux Security

Apache Web Based Authentication.

Cryptography.

Sudoers.

Access Control Lists(ACL).

Secured Enhanced Linux.

Firewall.
Web based Authentication

Permitted Users have access to Critical Directory.

Authentication Required.
Cryptography

Converts Plain text to Ciphered text.

Confidentiality,Integrity,Accuracy.

SSL Security with Apache(port 80/HTTPS).
Mechanisms-

Encryption -plain to ciphered text.

Decryption-ciphered to plain text.
Cryptography
Types
Encryption:

AES-128,192,256 bit keys,block size 128
bits,highly secured.

DES-56 bit keys,block size of 64 bits,Less Secured.
Cryptogaphy Advantages Security No. of Keys Alias Name
Symmetic Key Simpler and
Faster.
Less Secured. 1 Key(Shared) Secret Key
Cryptography
Asymmetric Key More Secured
Authentication
Complex(Highly
Secured)
2 Keys(Public
,Private)
Public Key
Cryptography
Sudoers

Security Policy in Linux Architecture.
Users: Normal Users. Super Users.

Users can execute commands on behalf of super
users using 'sudo'.

Uses Caching.
Command:

User_alias Hostname_alias=(User_spec)
Cmnd_alias.
Access Control List(ACL)

Sets Different permissions to different users on the
same directory.

Grant Permissions to user,group even if they are not
belong to the actual group.
Types

Default ACL's-Setting ACL's on a specific
Directory.

Access ACL's-Granting permissions to any file or
Directory.
Secured Enhanced Linux(SELinux)

Linux Kernel Security Module.

Enforces minimum privileges to services to do their
jobs.

Helpful when Server is under Attack.
Types:

Permissive-access denied services can be operated
even if it is enabled.

Enforcing-enforces access denials to services.

Disabled-disables SELinux protection permanently.
Firewall

Weitere ähnliche Inhalte

Was ist angesagt?

TLS/SSL Protocol Design
TLS/SSL Protocol DesignTLS/SSL Protocol Design
TLS/SSL Protocol DesignNate Lawson
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityHuda Seyam
 
TLS Optimization
TLS OptimizationTLS Optimization
TLS OptimizationNate Lawson
 
Introduction enovy
Introduction enovyIntroduction enovy
Introduction enovy岩 夏
 
security in transport layer ssl
 security in transport layer ssl security in transport layer ssl
security in transport layer sslSTUDENT
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik TambekarPratik Tambekar
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer securityMaarten Smeets
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerPina Parmar
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesJaroslavChmurny
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik TambekarPratik Tambekar
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSLSagar Mali
 
Webinar SSL English
Webinar SSL EnglishWebinar SSL English
Webinar SSL EnglishSSL247®
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to knowGökhan Şengün
 

Was ist angesagt? (20)

TLS/SSL Protocol Design
TLS/SSL Protocol DesignTLS/SSL Protocol Design
TLS/SSL Protocol Design
 
Tunneling
TunnelingTunneling
Tunneling
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
TLS Optimization
TLS OptimizationTLS Optimization
TLS Optimization
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
 
Introduction enovy
Introduction enovyIntroduction enovy
Introduction enovy
 
security in transport layer ssl
 security in transport layer ssl security in transport layer ssl
security in transport layer ssl
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
 
暗認本読書会9
暗認本読書会9暗認本読書会9
暗認本読書会9
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
Webinar SSL English
Webinar SSL EnglishWebinar SSL English
Webinar SSL English
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 

Andere mochten auch

Linux Network commands
Linux Network commandsLinux Network commands
Linux Network commandsHanan Nmr
 
Samba server installation and File sharing
Samba server installation and File sharingSamba server installation and File sharing
Samba server installation and File sharingEagle Eyes
 
Installing and deploying ubuntu server box
Installing and deploying ubuntu server boxInstalling and deploying ubuntu server box
Installing and deploying ubuntu server boxJuan Carlos Pérez Pardo
 
Lpi Part 1 Linux Fundamentals
Lpi Part 1 Linux FundamentalsLpi Part 1 Linux Fundamentals
Lpi Part 1 Linux FundamentalsYemenLinux
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configurationThamizharasan P
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configurationRohit Phulsunge
 
Linux Network Administration (LPI-1,LPI-2)
Linux Network Administration (LPI-1,LPI-2)Linux Network Administration (LPI-1,LPI-2)
Linux Network Administration (LPI-1,LPI-2)laonap166
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba serverVeeral Bhateja
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH ConfigurationVinod Gour
 
Mail server on linux
Mail server on linux Mail server on linux
Mail server on linux Roshni17
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesDustin Kirkland
 
Leading the Perfect Q&A in Any Presentation
Leading the Perfect Q&A in Any PresentationLeading the Perfect Q&A in Any Presentation
Leading the Perfect Q&A in Any PresentationSketchBubble
 
How to Have Difficult Conversations
How to Have Difficult ConversationsHow to Have Difficult Conversations
How to Have Difficult ConversationsMattan Griffel
 

Andere mochten auch (15)

Linux Network commands
Linux Network commandsLinux Network commands
Linux Network commands
 
Lapres firewall
Lapres firewallLapres firewall
Lapres firewall
 
Samba server installation and File sharing
Samba server installation and File sharingSamba server installation and File sharing
Samba server installation and File sharing
 
Installing and deploying ubuntu server box
Installing and deploying ubuntu server boxInstalling and deploying ubuntu server box
Installing and deploying ubuntu server box
 
Lpi Part 1 Linux Fundamentals
Lpi Part 1 Linux FundamentalsLpi Part 1 Linux Fundamentals
Lpi Part 1 Linux Fundamentals
 
Linux02 install SSh
Linux02 install SShLinux02 install SSh
Linux02 install SSh
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
 
Linux Network Administration (LPI-1,LPI-2)
Linux Network Administration (LPI-1,LPI-2)Linux Network Administration (LPI-1,LPI-2)
Linux Network Administration (LPI-1,LPI-2)
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba server
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
 
Mail server on linux
Mail server on linux Mail server on linux
Mail server on linux
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security Features
 
Leading the Perfect Q&A in Any Presentation
Leading the Perfect Q&A in Any PresentationLeading the Perfect Q&A in Any Presentation
Leading the Perfect Q&A in Any Presentation
 
How to Have Difficult Conversations
How to Have Difficult ConversationsHow to Have Difficult Conversations
How to Have Difficult Conversations
 

Ähnlich wie server_ppt

The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisitedinbroker
 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suiteYash Kotak
 
Protecting Web Services from DDOS Attack
Protecting Web Services from DDOS AttackProtecting Web Services from DDOS Attack
Protecting Web Services from DDOS AttackPonraj
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1Abu Sayed Adhar
 
Windows Server2008 Overview
Windows Server2008 OverviewWindows Server2008 Overview
Windows Server2008 OverviewZernike College
 
Windows Server2008 Overview 090222022333 Phpapp01
Windows Server2008 Overview 090222022333 Phpapp01Windows Server2008 Overview 090222022333 Phpapp01
Windows Server2008 Overview 090222022333 Phpapp01rakiin
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.pptcharacteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.pptRamkumardevendiranDe
 
20 Common Ports and their purposes
20 Common Ports and their purposes 20 Common Ports and their purposes
20 Common Ports and their purposes MaryamAlGhaith
 

Ähnlich wie server_ppt (20)

The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 
tor
tortor
tor
 
6 networking
6 networking6 networking
6 networking
 
Protecting Web Services from DDOS Attack
Protecting Web Services from DDOS AttackProtecting Web Services from DDOS Attack
Protecting Web Services from DDOS Attack
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
4 vpn s
4 vpn s4 vpn s
4 vpn s
 
P2P .NET short seminar
P2P .NET short seminarP2P .NET short seminar
P2P .NET short seminar
 
Windows Server2008 Overview
Windows Server2008 OverviewWindows Server2008 Overview
Windows Server2008 Overview
 
Windows Server2008 Overview 090222022333 Phpapp01
Windows Server2008 Overview 090222022333 Phpapp01Windows Server2008 Overview 090222022333 Phpapp01
Windows Server2008 Overview 090222022333 Phpapp01
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
App layer
App layerApp layer
App layer
 
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.pptcharacteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
 
20 Common Ports and their purposes
20 Common Ports and their purposes 20 Common Ports and their purposes
20 Common Ports and their purposes
 
12 tcp-dns
12 tcp-dns12 tcp-dns
12 tcp-dns
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 

server_ppt

  • 1. Linux Server Administration Most Popular Server Operating System CentOS RedHat Microsoft Windows Server Fedora Ubuntu
  • 2. Telnet Bi-directional interactive text-oriented communication facility using a virtual terminal.  Port 23(TCP).  Client-Server Architecture Vulnerability: Plain text sent over the connection  No authentication to ensure connection between two desired hosts.
  • 3. Secure Shell(SSH)  Cryptographic Network Protocol.  Secure data-communication.  Remote Command execution.  Cipered text(encrypted) is sent over the connection.  Port 22(TCP) Applications:  Secure Access to shell Accounts.
  • 4. File Transfer Protocol(FTP)  Transfer files from one host to another.  Client-serverArchitecture.  Port 20(Data-channel)  Port 21(Client-Server) Vulnerability:  Brute Force Attacks  Packet Capture(Sniffing).  Spoof Attacks.
  • 5. Domain Name Service(DNS)  Hierarchical distributed naming system for devices on internet or on the private network.  Translates domain name to IP Addresses and vice- versa.  Port 53(UDP).  Zones:  Forward Zone-Translates Name to its IP.  Reverse Zone-Translates IP to its Name.
  • 6. Domain Name Service(DNS) Common Keywords:  A-Address records  NS-Nameserver records  MX-Mail Exchanger records. Vulnerabilities:  DNS Cache Poisoning.  DNS Spoofing.
  • 7. Dynamic Host Configuration Protocol(DHCP)  Dynamically Distributes IP for interaces and services. Operations(DORA):  DHCP Discover.  DHCP Offer.  DHCP Request.  DHCP Acknowlegement. Features:  Periodic Renewal,Rebinding,Failover Mechanisms.
  • 8. Dynamic Host Configuration Protocol(DHCP) Port 67(Connection to Server). Port 68(Connection to Client). Types of Allocations:  Static ,Dynamic and Automatic. Vulnerabilites:  No way to validate Identity of DHCP Server.  Resource Exhaustion Attacks from malicious DHCP Clients.
  • 9. Apache Web Server  Most Popular Web Server(Worldwide).  Can be implemented on all OS'es.  Port 80(HTTP),443(HTTPS).  Support compiled modules(mod_ssl,mod_status).  Support Virtual Hosting.  Support Web Authentication Mechanisms.  Supports PHP,Perl,HTML,other web-based languages.
  • 10. Apache Web Server Vulnerabilities:  SQL Injection.  Cross Site Scripting(XSS).  DOS Attacks.
  • 11. Server Message Block(SMB)  File and Printer Services for Windows Clients.  Primary Domain Controller for Windows Clients.  Encrypted Data communication by default. Protocol NetBios- NameService(ns) NetBios- Datagram(dgm) NetBios- Session(ssn) Active Directory(ad) Port No. 137(UDP,TCP) 138(UDP) 139(TCP) 445(TCP)
  • 12. Postfix Webmail Server  Mail Transfer agent that routes and deliver emails.  MIME Encapsulation,SASL Authentication.  Delivery Status Notifications(DSN).  Port 25(SMTP). Features:  Defense against malware and spambots.  Combines with Message storage access(Dovecot).  Provides GUI with Squirrel(Web-based email Client).
  • 13. Proxy Server  Intermediate between the Client and Originial Server. Advantages:  Monitoring and filtering.  Improves Caching,Performance and Load Balancing.  Protect the Actual Server from Attacks.  Spoon Feeding to Slow Clients.  Accessing services anonymously.
  • 14. Proxy Server Types of Proxies:  Tunneling Proxies.  Forwarding Proxies.  Reverse Proxies. Examples:  Socks Proxy.  Squid Proxy Server(Port 3128).
  • 15. Linux Security  Apache Web Based Authentication.  Cryptography.  Sudoers.  Access Control Lists(ACL).  Secured Enhanced Linux.  Firewall.
  • 16. Web based Authentication  Permitted Users have access to Critical Directory.  Authentication Required.
  • 17. Cryptography  Converts Plain text to Ciphered text.  Confidentiality,Integrity,Accuracy.  SSL Security with Apache(port 80/HTTPS). Mechanisms-  Encryption -plain to ciphered text.  Decryption-ciphered to plain text.
  • 18. Cryptography Types Encryption:  AES-128,192,256 bit keys,block size 128 bits,highly secured.  DES-56 bit keys,block size of 64 bits,Less Secured. Cryptogaphy Advantages Security No. of Keys Alias Name Symmetic Key Simpler and Faster. Less Secured. 1 Key(Shared) Secret Key Cryptography Asymmetric Key More Secured Authentication Complex(Highly Secured) 2 Keys(Public ,Private) Public Key Cryptography
  • 19. Sudoers  Security Policy in Linux Architecture. Users: Normal Users. Super Users.  Users can execute commands on behalf of super users using 'sudo'.  Uses Caching. Command:  User_alias Hostname_alias=(User_spec) Cmnd_alias.
  • 20. Access Control List(ACL)  Sets Different permissions to different users on the same directory.  Grant Permissions to user,group even if they are not belong to the actual group. Types  Default ACL's-Setting ACL's on a specific Directory.  Access ACL's-Granting permissions to any file or Directory.
  • 21. Secured Enhanced Linux(SELinux)  Linux Kernel Security Module.  Enforces minimum privileges to services to do their jobs.  Helpful when Server is under Attack. Types:  Permissive-access denied services can be operated even if it is enabled.  Enforcing-enforces access denials to services.  Disabled-disables SELinux protection permanently.