Ubuntu Server Hardening Guide: Quick and Secure

Ubuntu Server Hardening Guide The system hardening process of a server is critical during and after installation. It helps the system to perform its duties properly and stay secured as much as possible. This blog post about Ubuntu system hardening will look into the most critical steps to take first. More detailed system hardening steps can be added on top of these, for which we will share some tools and guides at the end. As most security guides only tell […]

Read more

Show vulnerable packages on Arch Linux with arch-audit

Vulnerable Software Packages on Arch Linux Vulnerabilities happen and are usually fairly quickly fixed. This is also true for Arch Linux. This rolling distribution can be considered to be always up-to-date, as it uses the latest versions of software packages from the upstream. When there is an update, it doesn’t take long that it becomes available and can be installed with package manager pacman. One problem that remained was the inability to quickly test if you have any vulnerable packages. After all […]

Read more

Linux Security Guide (extended version)

Linux Security Guide (extended version) With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won’t show any specific configuration values, as it would implicate a possible best value. Instead, related articles and […]

Read more

Discover to which package a file belongs to

Determine the package a file belongs do Sometimes you want to know the related package of a file, before installation, or when it is already there. This is of great help during system hardening or general system cleanups. In this article we have a look at several ways to determine the relationships between files and the package they belong to. CentOS, Fedora, RHEL Show files per installed package To show what files are in a package, use the rpm command. rpm -ql […]

Read more

More love for infosec defenders

Infosec defenders are a rare breed Most security conferences focus on the offensive side of security. Recently O’Reilly decided to change things a bit and come with a conference focused on defensive security. If you ask us, a great step to give defense a boost in attention. As O’Reilly is also focusing on open source, a perfect match with our audience. Disclaimer: we have no affiliation with O’Reilly, their conference, or services. We promote them as they increase knowledge sharing. Conferences […]

Read more

Grep command examples and usage tips

Grep The grep command is one of the oldest tools for Linux and other platforms. Actually, it is much older than Linux, as is written by Ken Thompson more than 40 years ago. The name grep stands for “globally regular expression print”. This name comes from its predecessor ed and the specific mode in which you would globally search, using a regular expression, and print the output. The related command was “g/re/p”. Enough history, let’s dig through some grep examples, to maximize […]

Read more

When should you do a penetration test?

Penetration Testing and Linux The information security field is filled with all kind of tests and assessments. One of them is the penetration test, also abbreviated to pentest or pen test. Last years, many security consultancy firms offer this test as part of their security services. So what is it really and when should you undergo a penetration test? Continue reading! What is a pentest? The short question to what a penetration is: a hack attack on your environment, executed by […]

Read more

Linux system hardening: adding hidepid to /proc

Hiding processes for other users The pseudo-filesystem /proc contains a lot of useful information for the system administrator. It also shares a lot to normal users on the system. We can change what can be seen by using the right mount options. When looking in /proc you will discover a lot of files and directories. A lot of these directories are just numbers and represent the information about a particular process ID (PID). By default, Linux systems are deployed to allow […]

Read more
1234527