System
1) How to change DNS settings in Linux?
Linux:
/etc/resolv.conf
add a line of "nameserver x.x.x.x"2) How to change DNS settings in Windows:
Control Panel -> Network and Sharing Center -> Change adapter settings
Right-click on the adapter you want to configure and select 'properties.'
Double-Click on TCP/IPv4
Change the DNS settings to the server(s) you want, and apply your changes.3) Linux Server Hardening List
Account: (disabling guest/anonymous accounts, unique id, no generic/shared account, )
Password: (Change default passwords, set expiration dates and password length)
File System (no unnecessary shares, file permissions are checked)
Applications (Logging, File Integrity Monitoring, Antivirus)
Services: (disable unnecessary functionality and services)
System: (Use a Central NTP server, Check Crontab for scheduled tasks )
Remote Access (secure method - ssh, set session timeout, use VPN)
Network (disable Insecure services, no unnecessary services)2.1 ASLR (Address Space Layout Randomization)
The goal of ASLR is to introduce randomness for executables, libraries, and stacks in the memory address space; this makes it more difficult for an attacker to predict memory addresses and causes exploits to fail and crash in the process.
When ASLR is activated, the OS loads the same executables at different location in memory every time.
It is important to note that ASLR is not enabled for all modules. This means that, even if a process has ASLR enabled, there could be a DLL in the address space without this protection which could make the process vulnerable to the ASLR bypass attack.
Software: To verify the status of ASLR on different programs, download Process Explorer and verify yourself.
Windows provides another tool that helps solve the problem of exploitation, the Enhanced Mitigation Experience Toolkit (EMET)
2.2 DEP (Data Execution Prevention)
DEP is a defensive hardware and software measure that prevents the execution of code from pages in memory that are not explicitly marked as executable. The code injected into the memory cannot be run from that region; this makes buffer overflow exploitations even harder.
2.3 Stack Cookies (Canary)
The canary, or stack cookie, is a security implementation that places a value next to the return address on the stack.
The function prologue loads a value into this location, while the epilogue makes sure that the value is in tact. As a result, when the epilogue runs, it checks that the value is still there and that is correct.
If it is not, a buffer overflow has probably taken place .This is because a buffer overflow usually overwrites data in the stack.
Last updated
Was this helpful?