Categories: Linux administration, Networking, Security
An intensive workshop dedicated to security mechanisms available in Linux, including the basics of circumventing those mechanisms with examples of attacker’s code hiding techniques.
This workshop is recommended for both administrators and system security testers.
Topics presented during this workshop might also be useful for Linux administrators in big institutions. The acquired knowledge will be helpful when it comes to avoiding “catching” the so-called “nasty surprises” on servers. These are not only individually aimed attacks, but also the common bugs spreading through outdated or not secured “overlooked” machines which can happen extremely easily especially in big environments.
Duration
4 days
Agenda
- Strengthening mechanisms
- SELinux
- GRSec
- AppArmor
- chroot/sandbox/LXC
- ASLR
- PaX
- Advanced compilation techniques
- position independent code
- optimalisations, strengthening
- Security bypassing techniques
- escaping chroot
- bypassing ASLR
- Code hiding methods
- based on the kernel module
- not based on the kernel module
- Honeypots
- structure
- detection
Audience and prerequisites
Medium-advanced knowledge of Linux systems.
Certificates
Course participants receive completion certificates signed by ALX.