- Joshua Mukonyi
- August 31, 2021
How to Securing Linux system
In this article we shall focus on simple ways to make Linux systems more secure, from attackers point of view.
All the unused ports need to be disabled. Ports such as 80/http, 22/ssh, 21/ftp if they are not in use. In Kali Linux all ports are disabled by default on boot. To disable port starting on boot use systemctl disable [service name].
systemctl disable ssh if on Debian systems and
systemctl disable sshd on RedHat like systems. A remainder do only to those ports that are not being used.
Removal of unused kernel modules
Unused kernel modules should also be removed from system they may contain exploit weakness.
To remove kernel modules you us :
sudo rmmod [Linux Kernel module name]
Use of firewalls
On ports that are being used you can use the software firewalls, such as the iptables or firewall-cmd. But new upgrades iptables has changed little bit.
sudo iptables -I INPUT -m recent --set --name SSH
sudo iptables -I INPUT -p tcp --dport 22 -m state --state NEW,ESTABLISHED -m recent --update --seconds 60 --hitcount 4 -j DROP this command will block/drop NEW or any connection established previously if it attempts more then 3 connections under one minute.
Use of administrative accounts
Use of administrative user accounts is highly supported, locking the root using the passwd.
passwd -l root this will prevent any user to try logging to the root account. A user with administrative privileges can only run that command.
You can use my previous article on how to edit the sudoers file and gain administrative privileges https://www.hackerxone.com/2021/08/25/how-to-edit-the-sudoers-file.
When a Linux boots with the standard procedures, it can be very easy for one to change the parameters and gain access to root.
/etc/default/grub file with you favorite editor having the sudo privileges. Find timeout and change from original value to 0 seconds.
the update grub with
sudo update-grub to the new configurations to
In this article, we have simple security basics of Linux security.
Leave a Reply
You must be logged in to post a comment.