Linux Hacking

Hacking the Linux Kernel

Linux Hacking Internet Security Whitepapers

This document describes the common routines and general requirements for kernel code: its goal is to serve as a primer for Linux kernel development for experienced C programmers. I avoid implementation details: that’s what the code is for, and I ignore whole tracts of useful routines. Before you read this, please understand that I never wanted to write this document, being grossly under-qualified, but I always wanted to read it, and this was the only way. I hope it will grow into a compendium of best practice, common starting points and random information.

HPING Tutorial

Linux Hacking Internet Security Whitepapers

HPING is a command-line oriented TCP/IP packet crafter. HPING can be used to create IP packets containing TCP, UDP or ICMP payloads. All header fields can be modified and controlled using the command line. A good understanding of IP and TCP/UDP is mandatory to use and understand the utility.

Securing Linux Servers for Service Providers

Linux Hacking Internet Security Whitepapers

The term "xSP" is simply the consolidation of the Service Provider acronyms. Initially only ISPs and ASPs were known in this domain, but as the Internet and eBusiness matured, new service provider business models quickly followed. Infrastructure "SPs" such as managed service providers (MSPs) which provide fully managed services (network, storage, servers, administration, etc.) and business service providers (BSPs), who provide business value to their customers through application access or aggregation (ASPs), content providers or increasingly through outsourced business processes.

Security Evaluation of the Linux Operating System

Linux Hacking Internet Security Whitepapers

Linux is an open source operating system that has gained much popularity. More and more people are using it for a variety of tasks. However, due to its open source nature, how secure is Linux? And are these people just setting themselves up for an attack? These are viable questions that every Linux user should be aware of. Therefore, this report will examine the overall security of Linux as a server as well as provide some possible solutions for increasing security.