Hacking Linux Exposed

About
Authors
Contents
Reviews
Foreword
Purchase

Articles
Books
Sourcecode
Tools
Errata

Home

 


Secure your Linux network by thinking like an attacker.

In Hacking Linux Exposed, Second Edition we are able to cover Linux hacking in more detail than ever before. We are able to show you where Linux may differ from other Unix-like systems and give you Linux-specific countermeasures that you can implement immediately. In the hard-hitting style of Hacking Exposed, Hacking Linux Exposed, Second Edition once again dives into the actual attacks used by the enemy. Look no further for the actual exploitation techniques used to surreptitiously gain access to Linux systems.




Hacking Linux Exposed, Second Edition covers the myriad ways a malicious hacker will attack your Linux system, and the rationale behind such behaviour. While the bad guys are well versed in such techniques, this book serves to educate the home user as well as the overworked and underpaid system administrator who is not only responsible for the operation of mission-critical Linux servers, but who must vigilantly secure them on a daily basis.

For more information, see the About page. Hacking Linux Exposed, 3rd edition Hacking Linux Exposed, 3rd edition is a complete rewrite by the folks at ISECOM. Maybe one day they'll give us text to put here... it at amazon.com.



Linux Security: Tips, Tricks, and Hackery Newsletter

Linux Security: Tips, Tricks, and Hackery is a weekly newsletter penned by HLE author Bri Hatch. Each week he tackles Linux and Unix security issues that can affect you and your systems. Unlike traditional columns which are filled with vague answers and thinly veiled product advertisements, the Linux Security: Tips, Tricks, and Hackery newsletter will show you examples and code that can be directly applied. You can sign up by visiting lists.onsight.com, and archives are available.


 


2008/04/25 Bri gave two talks at LinuxFest Northwest this year, Network Protocols Illuminated and Shell Scripting from Scratch. All of presentations are available.

Hacking Linux Exposed, 3rd edition is coming out in August. Preorder it at amazon.com.

2008/01/01 Hacking Linux Exposed, 3rd edition is coming out in August. Preorder it at amazon.com.

2005/07/28 Stealing the Network: How to own an identity, which contains a chapter by Bri Hatch, has been released. Reviews on /..

2005/04/30 Bri gave a talk at LinuxFest Northwest this year titled "The Command line is for everyone!", to dispell all those "Unix is hard" rumours from Redmond. The slides are available.

2004/04/17 Bri gave a talk at LinuxFest Northwest this year missnamed "Practical SSH Encryption, Tunneling, and Automation". The slides are available.

2004/01/21 Bri's Twins have been born! Pictures are available.

2003/10/29 Bri was interviewed by LinuxQuestions.org. Good stuff.

2003/09/25 Bri gave a talk about "Covert Channels" at SecureWorld, Seattle. The slides are available on my Presentations Page now that I've finished correcting some embarrassing spelllinng mistakes. Luckily, no one mentioned them during the presentation.

2003/01/15 Appendix A, "Discovering and Recovering From an Attack", is available online at LinuxWorld

2003/01/07 Huzzah, it's time for a good slashdotting. A review by David Schaffter is available here. I've commented there under slashdot id 523490.

2002/12/15 Hacking Linux Exposed, Second Edition is out the door. Order through our website, and we'll donate any commissions to the EFF.

2002/09/24 Bri Hatch has a weekly Linux Security column. You can sign up to receive them in email, or check the archives.

2002/06/26 An interview with Bri Hatch at New Riders is available here. A previous interview is also available.

2002/06/17 Bri Hatch has a four-part article about reducing spam with Postfix and Procmail available at SecurityFocus. See parts 1, 2, 3, and 4.

2002/02/27 Bri Hatch's next book, Building Linux VPNs is on the shelves. You can see the book's website for contents and ordering information.

2001/10/17 Bri Hatch wrote an article about LIDS for Security Focus which is now online. The four-parter teaches you in depth about how LIDS can extend the traditional Linux security model to enforce stricter file and capabilities ACLs. See parts 1, 2, 3, and 4.