< Previous | Contents | Next >
7.6. Summary
In this chapter, we took a look at the concept of security policies, highlighting various points to consider when defining such a policy and outlining some of the threats to your system and to you personally as a security professional. We discussed laptop and desktop security measures as well
as firewalls and packet filtering. Finally, we reviewed monitoring tools and strategies and showed how to best implement them to detect potential threats to your system.
Summary Tips:
• Take time to define a comprehensive security policy.
• If you are running Kali on a publicly accessible server, change any default passwords for services that might be configured (see section 7.3, “Securing Network Services” [page 153]) and restrict their access with a firewall (see section 7.4, “Firewall or Packet Filtering” [page 153]) prior to launching them.
• Use fail2ban to detect and block password-guessing attacks and remote brute force password attacks.
• If you run web services, host them over HTTPS to prevent network intermediaries from sniffing your traffic (which might include authentication cookies).
• Real risk often arises when you travel from one customer to the next. For example, your lap- top could be stolen while traveling or seized by customs. Prepare for these unfortunate pos- sibilities by using full disk encryption (see section 4.2.2, “Installation on a Fully Encrypted File System” [page 85]) and consider the nuke feature (see “Adding a Nuke Password for Extra Safety” [page 246]) to protect your clients data.
• Implement firewall rules (see section 7.4, “Firewall or Packet Filtering” [page 153]) to forbid all outbound traffic except the traffic generated by your VPN access. This is meant as a safety net, so that when the VPN is down you immediately notice it (instead of falling back to the local network access).
• Disable services that you do not use. Kali makes it easy to do this since all external network services are disabled by default.
• The Linux kernel embeds the netfilter firewall. There is no turn-key solution for configuring any firewall, since network and user requirements differ. However, you can control netfilter from user space with the iptables and ip6tables commands.
• The logcheck program monitors log files every hour by default and sends unusual log mes- sages in emails to the administrator for further analysis.
• top is an interactive tool that displays a list of currently running processes.
• dpkg --verify (or dpkg -V) displays the system files that have been modified (potentially by an attacker), but relies on checksums, which may be subverted by a clever attacker.
• The Advanced Intrusion Detection Environment (AIDE) tool checks file integrity and detects any changes against a previously-recorded image of the valid system.
• Tripwire is very similar to AIDE but uses a mechanism to sign the configuration file, so that an attacker cannot make it point at a different version of the reference database.
• Consider the use of rkhunter, checksecurity, and chkrootkit to help detect rootkits on your system.
In the next chapter, we are going to dig into Debian fundamentals and package management. You will quickly understand the power behind Kali’s Debian roots and learn how the developers have harnessed that power. Be warned, the next chapter is fairly dense, but it is critical that you un- derstand Debian basics and package management if you are going to be a Kali power user.
Keywords
dpkg apt sources.list Upgrades
Package repositories