O'Reilly logo

Configuring IPCop Firewalls by James Eaton-Lee, Barrie Dempster

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Basic Firewall Hardening

First and foremost, we need to consider how IPCop looks to the outside world. The first step taken by any hacker, penetration tester, IT professional, or analyst in assessing the threat that a particular device poses, whether they intend to fix it or break in via it, is to profile that device in order to find out some of the following things:

  • What the device is
  • What operating system it is running
  • What sort of hardware it may be running on
  • What services the server is running, and therefore by inference...
  • What software (services) the server is running in addition to the basic operating system
  • Whether any of the above (particularly the services) are insecure

As a legitimate auditor, manager, and maintainer of IPCop systems, much ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required