From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Securing GRUB - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Securing GRUB
- In this sub-lesson we're going to do a lab where we secure GRUB. And this is going to be Lab 17, so if you're working with the repository, find "Lab 17 - Securing GRUB." GRUB is known as the GRand Unified Boot Loader, so it's what runs before all of Linux loads up. We use it to manage the boot process. It's not the only way of booting Linux, but it's the most common boot loader out there. So in this lab, we're going to show how to access the GRUB command line and then we'll demonstrate how to configure a secure hashed password for GRUB. So, feel free to follow along with this lab within the lab document, and I'm going to be working in my Debian client. So, in order to get to the GRUB area, you have to boot your system. Or in this case, we'll reboot our system, so I'm just going to go to Restart right now. And when we actually restart the system, right at the beginning, you're going to want to press the C key on your keyboard to get into GRUB. So, we'll click Restart now and start…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)