Linux Security - Configuring SUDO Access

preview_player
Показать описание
In this video series, we will be taking a look at how to set up, secure, and audit Linux servers. This video covers the process of configuring user permissions, assigning root permissions, and how to disable the root account.

SUPPORT US:

SOCIAL NETWORKS:

WHERE YOU CAN FIND US ONLINE:

LISTEN TO THE CYBERTALK PODCAST:

We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة

#Linux#Security#Cybersecurity
Рекомендации по теме
Комментарии
Автор

I know you hear this. So I just want to thank you for your work. It has been the most valuable teaching tool.

stillchaos
Автор

I watch all in one breath@!! Great man!

canYOUhandle
Автор

Man these are all what I learned manually from linux Bible, but sir your teaching was fantastic 😍😍

radheysenpai
Автор

Timestamps:

0:00 Introduction to the series
2:14 Video starts

HackerSploit
Автор

Aleksis thank u for your video channel!
These are super important things which we all must know!

ivank.
Автор

Sir, i thanks you to providing such valuable content. all the content uploaded on this channel is awesome, and i also learnt a lot from this channel. sir i request you to start a series on privileged escalation as many of us know how to exploit machines but face trouble when we try to escalate our privileges
I would love to hearing from you 🙏

dhruvshyam
Автор

You are great man, you are doing great work I really really appreciate your work your are doing ❤️

Love your bro from INDIA 🇮🇳

dronpatel
Автор

To lock down sudo even further you could take these two steps:
Another thing you could do is log all your sudo commands to a separate log file as by default sudo gets logged to syslog files
You can enter the following below in your visudo

Defaults log_host, log_year, logfile="/var/log/sudo.log"

^ This will create a log file in /var/log called sudo.log and will log what user and what time on what host executed what command
example:
Oct 17 13:07:08 2020 : admin : HOST=mitchell : TTY=pts/2 ; PWD=/var/log ;
USER=root ; COMMAND=/bin/cat sudo.log

Oct 17 13:06:43 2020 : admin : HOST=mitchell : TTY=pts/2 ; PWD=/var/log ;
USER=root ; COMMAND=/usr/bin/apt update

Admin would be the user who executes the command.
Then simply just cat /var/log/sudo.log to view the contents of the log

You could also:
Configure sudo to not allow users to switch to root or any another account. but Instead, configure sudo to allow users to run specific commands as the users they need to operate as, while still having root disabled.

For eg: There’s a need for a user to install software. Allow them to run only RPM or APT or YUM as root without even switching to the root user as shown below:
Entered in the sudo config file:
usernameHere ALL =(ALL) PASSWD : /usr/bin/apt-get, /usr/bin/yum, /bin/rpm
This would allow said user to run sudo apt-get, sudo yum and sudo rpm without any password but would not allow any other commands!

in case a user types a wrong password, sudo will display insults on the terminal with the insults parameter. Enter this into your visudo file to enable insults on wrong password attemps:
Defaults insults



Also thx HS, Very informative video

UxRandom
Автор

Damn this is good stuff. And especially for YouTube. Thanks for creating this great content

marlo_stanfield
Автор

very nice video...
would love to see a more in-depth video specifically on configuring sudoers and using sudoers.d to manage privileged commands a user can run. thanks for this one though.

MrChurchie
Автор

Thank you for all your great content!!!

overland
Автор

Good evening sir,
Sir I want to convert my chromebook714 - 1W - 390Y but it is required to enable Sudo if I want to bypass the VT2 terminal.

Liberator_OO
Автор

Thanks hackersploit, not sure what i did but obviously missed 1 through 5, could you pls send through this missing series... Greatly appreciated, yours truly - Myne

mynealways
Автор

Thanks a lot sir, when you get time can you make some video on hardware hacking or BIOS hacking

Grn
Автор

So what's keeping the dev user account from unlocking the root arround or changing the shell of the root?

satyamfifa
Автор

Which process monitor was that at the beginning of video?

nirav_multani
Автор

How is the dev user any more secure than root if it has all the same privileges?

badplayer
Автор

Hi sir. I love your content. Huge respect from india. I have a doubt sir. If I know the password for dev account who is in sudo group, what is the use of locking password for root account. Because they can unlock it again and switch to root account ryt ?please answer my question if it makes sense and if am wrong pls correct me. Thank you so much.

hatit
Автор

7:55 root has to use sudo command?!? wat... I think usermod ( /sbin/ ) just isn't in $PATH. ??

andrewbuckau
Автор

what if dev does $ sudo su in order to access root?

future-jim