04-11-2014, 03:43 AM
[align=center]Title: LinuxCBT - Key-Files Edition
Video Format: MOV
File Size: 785 MB[/center]
Key-Files Security - Module XIII
Introduction - Topology - Features
Discuss areas of concern
Expose available systems
Prepare to study important files
Boot Partition
Identify /boot setup on various systems
Enumerate key files regarding boot sequence
Peruse various configuration files
Present hypothetical areas of failure
Contrast with Windows boot implementation
INIT Environment
Discuss traditional INIT implementation
Identify important files across distributions
Examine INIT.D and RC hierarchies
Propose methods of ensuring integrity of environment
Kernel Modules Environment
Identify key directory hierarchy
Discuss applicability
Explore various modules related configuration files
Enumerate loaded modules and correlate to FS taxonomy
Correlate detected modules to loaded and available modules
PROC File System
Discuss usage and applicability
Descend PROC hierarchy accordingly
Identify PID tree and related descriptors
Recover Kernel invocation method
Expose supported Paritions, File Systems and Devices
Dump CPU and Memory configuration
Peruse other applicable PROC entries
SBIN Executables
Identify available SBIN containers
Expose SETGID and SETUID SBIN entries
Enumerate relevant client system binaries
Locate important SBIN daemons | services
Discuss storage management SBIN entries
Find interface and network related SBIN entries
System Control Configuration
Explain applicability
Identify user space process
Enumerate default configuration directives
Define common variables influencing system behavior
Committ variables for persistence
Discuss potential areas of concern with system configuration
Evaluate results
INETD | XINETD Configuration
Explain super server usage
Identify both INETD and XINETD on relevant systems
Expose controlled services
Disable superfluous super-server controlled services
User Accounts Environment
Discuss relevance of securing related files
Explain default files
Suggest areas of concern regarding compromised entries
Tighten default security policy related to user accounts
Pluggable Authentication Modules (PAM)
Identify key files related to PAM AUTH
Expose baseline configuration based on current definition
Locate baseline PAM libraries and discuss strategies
Compare and contrast environmental differences across accounts
Hosts | Protocols | Services
Explain relevance of these key files
Discuss typical name resolution process
Identify baseline confguration
Affect changes to relevant files and evaluate
Discuss typical malware impact on key files
NSSWITCH Configuraton
Explain importance and relevance
Identify various implementations
Make changes to name resolver configuration
Evaluate results
DNS Client Resolution Configuration
Identify key files governing client resolution
Perform queries with incorrect resolution
Correct resolution accordingly
Vary configuration and evaluate results
User Profiles Environment
Discuss applicable entries related to profiles
Delineate between system-wide and user-wide configurations
Examine relevant profile files for $SHELL and GUI environments
Posit suggestions to tighten baseline
Evaluate accordingly
System Scheduler Environment
Discuss importance of CRON
Identify system and user-wide configuration files
Propose methods of tightening configuration
Evaluate resuls
DNS Server Configuration
Discuss importance of traffic direction services
Identify key files across distributions
Suggest areas to enhance security posture
Intersperse corrupt DNS values and evaluate influence
SYSLOG Configuration
Discuss applicability
Review baseline configuration
Hypothesize possible data-leakage opportunities
Propose methods of configuration augmentation
If get link die or problem with unrar file , send request to >>>[[[Reported by Members as URL Shortener! Post the actual link!]]]<<</124uJzh
Use 7zip for unrar if you get "Max 260 character" error
Password for Unrar : tut4dl
Video Format: MOV
File Size: 785 MB[/center]
Key-Files Security - Module XIII
Introduction - Topology - Features
Discuss areas of concern
Expose available systems
Prepare to study important files
Boot Partition
Identify /boot setup on various systems
Enumerate key files regarding boot sequence
Peruse various configuration files
Present hypothetical areas of failure
Contrast with Windows boot implementation
INIT Environment
Discuss traditional INIT implementation
Identify important files across distributions
Examine INIT.D and RC hierarchies
Propose methods of ensuring integrity of environment
Kernel Modules Environment
Identify key directory hierarchy
Discuss applicability
Explore various modules related configuration files
Enumerate loaded modules and correlate to FS taxonomy
Correlate detected modules to loaded and available modules
PROC File System
Discuss usage and applicability
Descend PROC hierarchy accordingly
Identify PID tree and related descriptors
Recover Kernel invocation method
Expose supported Paritions, File Systems and Devices
Dump CPU and Memory configuration
Peruse other applicable PROC entries
SBIN Executables
Identify available SBIN containers
Expose SETGID and SETUID SBIN entries
Enumerate relevant client system binaries
Locate important SBIN daemons | services
Discuss storage management SBIN entries
Find interface and network related SBIN entries
System Control Configuration
Explain applicability
Identify user space process
Enumerate default configuration directives
Define common variables influencing system behavior
Committ variables for persistence
Discuss potential areas of concern with system configuration
Evaluate results
INETD | XINETD Configuration
Explain super server usage
Identify both INETD and XINETD on relevant systems
Expose controlled services
Disable superfluous super-server controlled services
User Accounts Environment
Discuss relevance of securing related files
Explain default files
Suggest areas of concern regarding compromised entries
Tighten default security policy related to user accounts
Pluggable Authentication Modules (PAM)
Identify key files related to PAM AUTH
Expose baseline configuration based on current definition
Locate baseline PAM libraries and discuss strategies
Compare and contrast environmental differences across accounts
Hosts | Protocols | Services
Explain relevance of these key files
Discuss typical name resolution process
Identify baseline confguration
Affect changes to relevant files and evaluate
Discuss typical malware impact on key files
NSSWITCH Configuraton
Explain importance and relevance
Identify various implementations
Make changes to name resolver configuration
Evaluate results
DNS Client Resolution Configuration
Identify key files governing client resolution
Perform queries with incorrect resolution
Correct resolution accordingly
Vary configuration and evaluate results
User Profiles Environment
Discuss applicable entries related to profiles
Delineate between system-wide and user-wide configurations
Examine relevant profile files for $SHELL and GUI environments
Posit suggestions to tighten baseline
Evaluate accordingly
System Scheduler Environment
Discuss importance of CRON
Identify system and user-wide configuration files
Propose methods of tightening configuration
Evaluate resuls
DNS Server Configuration
Discuss importance of traffic direction services
Identify key files across distributions
Suggest areas to enhance security posture
Intersperse corrupt DNS values and evaluate influence
SYSLOG Configuration
Discuss applicability
Review baseline configuration
Hypothesize possible data-leakage opportunities
Propose methods of configuration augmentation
If get link die or problem with unrar file , send request to >>>[[[Reported by Members as URL Shortener! Post the actual link!]]]<<</124uJzh
Use 7zip for unrar if you get "Max 260 character" error
Password for Unrar : tut4dl
Code:
[b][Uploaded][/b]
http://[Reported by Members as spam/premium links]/file/1s0m06th/LinuxCBT.Key-Files.Edition.part1.rar
http://[Reported by Members as spam/premium links]/file/9dvhel56/LinuxCBT.Key-Files.Edition.part2.rar
http://[Reported by Members as spam/premium links]/file/r8kebkgw/LinuxCBT.Key-Files.Edition.part3.rar
http://[Reported by Members as spam/premium links]/file/cm77u379/LinuxCBT.Key-Files.Edition.part4.rar
http://[Reported by Members as spam/premium links]/file/gcss1u3g/LinuxCBT.Key-Files.Edition.part5.rar
[b][[Reported by Members as premium hosting that SUCK! Use MEDIAFIRE or MEGA.NZ :) !!!]][/b]
http://[Reported by Members as premium hosting that SUCK! Use MEDIAFIRE or MEGA.NZ :) !!!].net/file/05633a2be23b470d8d353dc660c72b00/LinuxCBT.Key-Files.Edition.part1.rar.html
http://[Reported by Members as premium hosting that SUCK! Use MEDIAFIRE or MEGA.NZ :) !!!].net/file/21b962f150ae6b009b010b7d673853ec/LinuxCBT.Key-Files.Edition.part2.rar.html
http://[Reported by Members as premium hosting that SUCK! Use MEDIAFIRE or MEGA.NZ :) !!!].net/file/d5125dfd37aa98423263172f7ee76d90/LinuxCBT.Key-Files.Edition.part3.rar.html
http://[Reported by Members as premium hosting that SUCK! Use MEDIAFIRE or MEGA.NZ :) !!!].net/file/84ade9125f54efb77faeb2dfd22a73b6/LinuxCBT.Key-Files.Edition.part4.rar.html
http://[Reported by Members as premium hosting that SUCK! Use MEDIAFIRE or MEGA.NZ :) !!!].net/file/535c13d6558aa5788c0dccd69149255d/LinuxCBT.Key-Files.Edition.part5.rar.html