From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Securing GRUB

Securing GRUB

- In this sub-lesson we're going to do a lab where we secure GRUB. And this is going to be Lab 17, so if you're working with the repository, find "Lab 17 - Securing GRUB." GRUB is known as the GRand Unified Boot Loader, so it's what runs before all of Linux loads up. We use it to manage the boot process. It's not the only way of booting Linux, but it's the most common boot loader out there. So in this lab, we're going to show how to access the GRUB command line and then we'll demonstrate how to configure a secure hashed password for GRUB. So, feel free to follow along with this lab within the lab document, and I'm going to be working in my Debian client. So, in order to get to the GRUB area, you have to boot your system. Or in this case, we'll reboot our system, so I'm just going to go to Restart right now. And when we actually restart the system, right at the beginning, you're going to want to press the C key on your keyboard to get into GRUB. So, we'll click Restart now and start…

Contents