Tcpdump. For this exercise you must again be root. Login and obtain root privileges: Note that we use three computers for this exercise.
|
|
- Trevor Whitehead
- 6 years ago
- Views:
Transcription
1 1 For this exercise you must again be root. Login and obtain root privileges: sudo su Note that we use three computers for this exercise. C S H
2 2 Create an account on the server that can be used from the client: adduser username accept default answers to questions asked by adduser
3 3 Install a telnet daemon at the server aptitude install inetutils telnetd # activate telnetd in /etc/inetd.conf and reload telnet stream tcp nowait root /usr/sbin/telnetd telnetd /etc/init.d/openbsd inetd reload Make sure INPUT telnet and ssh connections are accepted by the server add rules to /etc/iptables/rules
4 4 Install tcpdump at the hacker's computer: aptitude install tcpdump Start tcpdump, let it write packages to /tmp/tcpdump.out tcpdump i eth0 w /tmp/tcpdump.out
5 5 At the client computer: use the account created earlier to login at the server using telnet: telnet ip address Enter some commands (ls, mkdir, cd, etc.) Eventually logout by entering exit or ctrl d
6 6 At the hacker's computer: end tcpdump (using ctrl C is OK) Use tcpdump to filter all telnet communication from the client computer telnet nxtqr /tmp/tcpdump.out host client ip Try to obtain the username and password... Find the login: and Password: prompts, then determine what was sent from the client to the server
7 7 At the hacker's computer: login at the server using the harvested username and password
8 8 At the server's computer: realize that clear text protocols requiring credentials are dangerous But not only those protocols. Any other reason why they could be dangerous? Change the server's configuration so that telnet no longer can be used Does this prevent the hacker from accessing the client's account?
9 9 At the server's computer: Change the server's configuration so that telnet no longer can be used aptitude purge inetutils telnetd /etc/init.d/openbsd inetd reload Does this prevent the hacker from accessing the client's account? No. Why not?
10 1 For this exercise you must again be root. Login and obtain root privileges: sudo su Note that we use three computers for this exercise. C S H
11 2 Create an account on the server that can be used from the client: adduser username accept default answers to questions asked by adduser
12 3 Install a telnet daemon at the server aptitude install inetutils telnetd # activate telnetd in /etc/inetd.conf and reload telnet stream tcp nowait root /usr/sbin/telnetd telnetd /etc/init.d/openbsd inetd reload Make sure INPUT telnet and ssh connections are accepted by the server add rules to /etc/iptables/rules
13 4 Install tcpdump at the hacker's computer: aptitude install tcpdump Start tcpdump, let it write packages to /tmp/tcpdump.out tcpdump i eth0 w /tmp/tcpdump.out
14 5 At the client computer: use the account created earlier to login at the server using telnet: telnet ip address Enter some commands (ls, mkdir, cd, etc.) Eventually logout by entering exit or ctrl d
15 6 At the hacker's computer: end tcpdump (using ctrl C is OK) Use tcpdump to filter all telnet communication from the client computer telnet nxtqr /tmp/tcpdump.out host client ip Try to obtain the username and password... Find the login: and Password: prompts, then determine what was sent from the client to the server
16 7 At the hacker's computer: login at the server using the harvested username and password
17 8 At the server's computer: realize that clear text protocols requiring credentials are dangerous But not only those protocols. Any other reason why they could be dangerous? Change the server's configuration so that telnet no longer can be used Does this prevent the hacker from accessing the client's account?
18 9 At the server's computer: Change the server's configuration so that telnet no longer can be used aptitude purge inetutils telnetd /etc/init.d/openbsd inetd reload Does this prevent the hacker from accessing the client's account? No. Why not? After a clear-text protocol requiring credentials has been removed, all users should be required to change their passwords
14. Configuring Telnet in Knoppix
14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix
More informationNatlog. For this exercise you must again be root. Login and obtain root privileges:
1 For this exercise you must again be root. Login and obtain root privileges: sudo su Caveat: this exercise requires at least one computer with two network interfaces. 2 Make sure natlog is installed First
More informationcommands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes
Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with
More informationLab Authentication, Authorization, and Accounting
Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices
More informationSetting up a Chaincoin Masternode
Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version
More informationSECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System
SECURITY+ LAB SERIES Lab 3: Protocols and Default Network Ports Connecting to a Remote System Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported
More informationInstituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities
Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security Lab guide: Traffic analysis and TCP/IP Vulnerabilities Revised on 2016-10-18 Alpha version: This is an early version and
More informationChecklists for Configuring the Gateway
CHAPTER 7 The Cisco Unified Communications Manager Business Edition 3000 uses either Cisco 2901 Integrated Services Router (ISR2901) or Cisco Media Convergence Server 7890C1 (MCS7890-C1) to serve as your
More information5. Write a capture filter for question 4.
Pre-Lab 2: Single Segment IP Networks 1. Review Linux man pages for arp at www.linuxmanpages.com (in both Sections 7 and 8), the ARP RFC (RFC 826) at www.ietf.org, and Section 3.4 of the IBM Red Book.
More informationDGS-3630-Series Switches
DGS-3630-Series Switches Switch Management Interfaces Adding Administrator Account Enabling Remote Management (SSH) Changing Switch IP Address Saving Configuration Resetting to Factory Defaults Switch
More informationUsing RANCID. Contents. 1 Introduction Goals Notes Install rancid Add alias Configure rancid...
Using RANCID Contents 1 Introduction 2 1.1 Goals................................. 2 1.2 Notes................................. 2 2 Install rancid 2 2.1 Add alias............................... 3 2.2 Configure
More informationLab Working with Linux Command Line
Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed
More informationLab - Examining Telnet and SSH in Wireshark
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices
More informationPlease review the Infoblox CCS Scripting Guide for more information on the above optional statements
Overview Network engineers are always looking for ways to automate the tasks of maintaining network devices. Logging into network devices to make changes or to upgrade software is tedious, time consuming,
More informationLab 8: Introduction to Pen Testing (HPING)
Lab 8: Introduction to Pen Testing (HPING) Aim: To provide a foundation in understanding of email with a focus on hping to provide security assessments and in understanding the trails of evidence produced.
More information1. Add these options in kernel configuration file and recompile the kernel
Chapter 21 Security Firewall (1) Using ipfw 1. Add these options in kernel configuration file and recompile the kernel options IPFIREWALL options IPFIREWALL_VERBOSE options IPFIREWALL_FORWARD options IPFIREWALL_DEFAULT_TO_ACCEPT
More informationFreeBSD Security Advisories
Security FreeBSD Security Advisories http://www.freebsd.org/security/advisories.html 2 FreeBSD Security Advisories Advisory Security information Where to find it Web page (Security Advisories Channel)
More informationAssignment 2 TCP/IP Vulnerabilities
LEIC/MEIC - IST Alameda LEIC/MEIC/MERC IST Taguspark DEASegInf Network and Computer Security 2012/2013 Assignment 2 TCP/IP Vulnerabilities Goals Gather information about the machines in the network. Explore
More informationLog Management Part 1: Using rsyslog
Log Management Part 1: Using rsyslog Contents 1 Notes 1 2 Exercise 1 2.1 Configure sending of syslog messages from your group s router.. 2 2.2 Configure rsyslog........................... 3 2.3 Test syslog..............................
More informationDownloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018
Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 This guide will help you download and install IBM Db2 software, Data
More informationLinux Kung Fu. Ross Ventresca UBNetDef, Fall 2017
Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built
More informationExercise Sheet 2. (Classifications of Operating Systems)
Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user
More informationLab Command Line Fundamentals Instructor Version 2500
Lab 2.2.9 Command Line Fundamentals Instructor Version 2500 Objective Log into a router and go to the user and privileged modes. Use several basic router commands to determine how the router is configured.
More informationLab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationUbuntu LTS Install Guide
Ubuntu 16.04.5 LTS Install Guide Sirenia September 17, 2018 Contents 1 Content 2 2 Login to server 2 3 Ensure access to repositories 3 4 Install Docker 3 5 Install Docker Compose 4 6 Pull software 4 7
More informationFreeBSD Security Advisories
Security FreeBSD Security Advisories http://www.freebsd.org/security/advisories.html 2 FreeBSD Security Advisories Advisory Security information Where to find it Web page (Security Advisories Channel)
More informationJackson State University Department of Computer Science CSC / Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan
Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 2: Running Secure Shell (SSH) Server in a Virtual
More informationInstallation of the DigitalSystemsVM virtual machine
Installation of the DigitalSystemsVM virtual machine Notice This document explains how to install the DigitalSystemsVM virtual machine on a computer with Linux Ubuntu 16.04 LTS. If questions or problems
More informationPost Ubuntu Install Exercises
Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control
More informationHOW TO SETUP A NEW USER
In this guide you will learn how to create a new user, define their settings, assign limits and permissions, and establish their Single Sign On credentials in the Online Banking System. User Administration
More informationCryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh
Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I
More informationTicketing Service 1 Request Tracker (RT) Installation and Configuration
Ticketing Service 1 Request Tracker (RT) Installation and Configuration 1.1 Notes: This lab note is taken from NSRC Workshop LAB, therefore requested to change pcx.ws.nsrc.org with your domain. Commands
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationSpring 2017 Gabriel Kuri
Lab 2 ECE 431L Spring 2017 Gabriel Kuri This lab is made up of two parts. Part 1 will consist of familiarizing yourself with the Raspberry Pi (RPi). It includes running Unix/Linux commands to become somewhat
More informationStormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002
StormTracker EMS 2.3 Installation Instructions Document Number EMS-A2-GN10-00 July 2002 Contents Overview... 2 Basic StormTracker EMS Functionality... 2 Oware and StormTracker EMS... 2 Supported Systems...
More informationGetting Started Using Cisco License Manager
CHAPTER 5 This chapter provides information about the initial setup of Cisco License Manager and an overview of recommended steps to quickly add users and devices and obtain and deploy licenses. This chapter
More informationUbuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand
Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Update /etc/apt/sources.list
More informationCSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1B: Essential Linux and Caine Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Essential Linux and Caine You will learn in this lecture: Essential Command
More informationBPPM Patrol Agent Installation Steps on Linux and Automation Integration
BPPM Patrol Agent Installation Steps on Linux and Automation Integration Author: Karlis Peterson, Software Consultant, BMC Software Version: 1.0 Date: May 12, 2013 DISCLAIMER NOTICE This is Field Developed
More informationNo Food or Drink in this room. Logon to Windows machine
While you are waiting No Food or Drink in this room Logon to Windows machine Username/password on right-hand monitor Not the username/password I gave you earlier We will walk through connecting to the
More informationLab AAA Authorization and Accounting
Lab 11.3.2 AAA Authorization and Accounting Objective Scenario Step 1 In this lab, the student will use the exec-timeout command to control the amount of time before an idle telnet or console session is
More informationAdministration of Cisco WLC
Using the Controller Interface, on page 1 Enabling Web and Secure Web Modes, on page 6 Telnet and Secure Shell Sessions, on page 8 Management over Wireless, on page 13 Configuring Management using Dynamic
More informationLinux Survival Guide
Linux Survival Guide Introduction: This guide is intended for use with classes at DACC that use a Linux operating system as the platform for students. It provides a quick summary and examples of how to
More informationXcalenets Console Setup Guide. Xcalenets Console Setup Guide (Standalone version)
Xcalenets Console Setup Guide Xcalenets Console Setup Guide (Standalone version) 1 Content CONTENT... 2 Getting Started to Xcalenets Console Setup... 3 Account Level Introduction... 3 Login Console Setup...
More informationLinux Kung Fu. Stephen James UBNetDef, Spring 2017
Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and
More informationTELE 301 Lecture 8: Post
Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the
More informationIntroduction to UNIX/LINUX Security. Hu Weiwei
Introduction to UNIX/LINUX Security Hu Weiwei Operation System Security The Security Problems in Operation Systems become more and more important The Security techniques improved rapidly The number of
More informationBuzztouch Server 2.0 with Amazon EC2
Buzztouch Server 2.0 with Amazon EC2 This is for those that want a step by step instructions on how to prepare an Amazon's EC2 instance for the Buzztouch server. This document only covers the amazon EC2
More informationLab Configure Basic AP security through GUI
Lab 8.3.1.1 Configure Basic AP security through GUI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following objectives:
More informationLab I: Using tcpdump and Wireshark
Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html
More informationSmartCash SmartNode Setup Guide v1.2. Windows 10. Date: 13/01/2018. By (Jazz) yoyomonkey
SmartCash SmartNode Setup Guide v1.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at the casual
More informationSmartCash SmartNode Setup Guide V1.2 Windows 10 13/01/2018 By (Jazz) yoyomonkey Page 1
SmartCash SmartNode Setup Guide v1.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at the casual
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationLAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate
LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. N replace with your group
More informationIn this exercise you will practice working with HDFS, the Hadoop. You will use the HDFS command line tool and the Hue File Browser
Access HDFS with Command Line and Hue Data Files (local): ~/labs/data/kb/* ~/labs/data/base_stations.tsv In this exercise you will practice working with HDFS, the Hadoop Distributed File System. You will
More information10 Defense Mechanisms
SE 4C03 Winter 2006 10 Defense Mechanisms Instructor: W. M. Farmer Revised: 23 March 2006 1 Defensive Services Authentication (subject, source) Access control (network, host, file) Data protection (privacy
More informationInitial setting up of VPN Java version.
VPN Linux 64 bit To access work documents from home you will need to create a VPN connection. This will allow you to securely connect to Exeter University network from other location such as your home.
More informationWA2342 NoSQL Systems Comparison. Lab Server VM Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2342 NoSQL Systems Comparison Lab Server VM Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
More informationAdministration of Cisco WLC
HTTP/HTTPS, SSH/Telnet to Cisco WLC, page 1 HTTP/HTTPS, SSH/Telnet to Cisco WLC Using the Controller GUI A browser-based GUI is built into each controller. It allows up to five users to simultaneously
More informationCommand-Line Interface Command Summary
CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Global Site Selector software. The command summary tables are
More informationConfiguring TACACS+ Finding Feature Information. Prerequisites for TACACS+
Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software
More informationSetting Up the MPLS VPN Environment
CHAPTER 2 Cisco VPN Solutions Center: MPLS Solution is an MPLS VPN provisioning and auditing tool. The software focuses on the provider edge routers (PEs), customer edge routers (CEs), and the link between
More informationThis guide assumes that you are setting up a masternode for the first time. You will need:
KRT MN Guide Setting up a masternode requires a basic understanding of Linux and blockchain technology, as well as the ability to follow instructions closely. It also requires regular maintenance and careful
More informationIntroduction. What is Linux? What is the difference between a client and a server?
Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions
More informationLinux Class 2. Debian file system, superuser, editing text files, executing comands in the shell, configuring, installing and uninstalling packages.
Linux Class 2 Debian file system, superuser, editing text files, executing comands in the shell, configuring, installing and uninstalling packages. Abel Guzman sanchez Systems and networks Engineer Www.abelworld.com
More informationLab 7 Configuring Basic Router Settings with IOS CLI
Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.
More informationAn introduction to Linux Part 4
An introduction to Linux Part 4 Open a terminal window (Ctrl-Alt-T) and follow along with these step-by-step instruction to learn some more about how to navigate in the Linux Environment. Open the terminal
More informationBring-up the Router. Boot the Router
After installing the hardware, boot the router. Connect to the XR LXC console port and power on the router. The router completes the boot process using the pre-installed operating system (OS) image. If
More informationSecurity. Advanced Operating Systems and Virtualization Alessandro Pellegrini A.Y. 2017/2018
Security Advanced Operating Systems and Virtualization Alessandro Pellegrini A.Y. 2017/2018 Basic Security Aspects 1. Systems must be usable by legitimate users only 2. Access is granted on the basis of
More informationPerform Backup and Restore
, page 1 You can schedule periodic backups using the Cisco Prime Collaboration Assurance user interface, or run backup commands manually by logging in to the system as an admin user (CLI user). However,
More informationBitnami MEAN for Huawei Enterprise Cloud
Bitnami MEAN for Huawei Enterprise Cloud Description Bitnami MEAN Stack provides a complete development environment for mongodb and Node.js that can be deployed in one click. It includes the latest stable
More informationCS 716: Introduction to communication networks th class; 11 th Nov Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 24 th class; 11 th Nov 2011 Instructor: Sridhar Iyer IIT Bombay Layering: physical communication data application transport network link physical application
More informationNetwork Monitoring & Management. A few Linux basics
Network Monitoring & Management A few Linux basics Our chosen platform Ubuntu Linux 14.04.3 LTS 64-bit LTS = Long Term Support no GUI, we administer using ssh Ubuntu is Debian underneath There are other
More informationCROWDCOIN MASTERNODE SETUP COLD WALLET ON WINDOWS WITH LINUX VPS
CROWDCOIN MASTERNODE SETUP COLD WALLET ON WINDOWS WITH LINUX VPS This tutorial shows the steps required to setup your Crowdcoin Masternode on a Linux server and run your wallet on a Windows operating system
More informationBitnami MySQL for Huawei Enterprise Cloud
Bitnami MySQL for Huawei Enterprise Cloud Description MySQL is a fast, reliable, scalable, and easy to use open-source relational database system. MySQL Server is intended for mission-critical, heavy-load
More informationDownloading and Managing Firmware in Cisco UCS Central
Downloading and Managing Firmware in Cisco UCS Central This chapter includes the following sections: Downloading Firmware from Cisco.com, page 1 Firmware Library of Images, page 2 Configuring Firmware
More informationConsole Port, Telnet, and SSH Handling
Console Port Overview, on page 1 Connecting Console Cables, on page 1 Installing USB Device Drivers, on page 1 Console Port Handling Overview, on page 2 Telnet and SSH Overview, on page 2 Persistent Telnet,
More informationSQL Server vnext on Linux Ubuntu - Part 1
SQL Server vnext on Linux Ubuntu - Part 1 Built on SQL Server 2016, SQL Server vnext represents a major step towards making SQL Server a cross operating systems and bringing the power of SQL Server to
More informationFreeBSD Security Advisories (1)
Security FreeBSD Security Advisories (1) http://www.freebsd.org/security/advisories.html 2 FreeBSD Security Advisories (2) 3 FreeBSD Security Advisories (3) freebsd-security-notifications Mailing list
More informationHow many of you have never built a NetBSD kernel?
A Smart Port Card Tutorial - The Exercises John DeHart Washington University jdd@arl.wustl.edu http://www.arl.wustl.edu/~jdd 1 Question? How many of you have never built a NetBSD kernel? 2 page 1 Exercises
More informationCommunication protocols and services
This chapter describes various protocols and that may be enabled on Modberry. SSH Connection SSH service is started up on boot and already preinstalled and configured. You may access your device through
More informationAAA and the Local Database
This chapter describes authentication, authorization, and accounting (AAA, pronounced triple A ). AAA is a a set of services for controlling access to computer resources, enforcing policies, assessing
More informationCENG 334 Computer Networks. Laboratory I Linux Tutorial
CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction
More informationInstallation Manual InfraManage.NET Installation Instructions for Ubuntu
Installation Manual InfraManage.NET Installation Instructions for Ubuntu Copyright 1996 2017 Timothy Ste. Marie Version 7.5.72SQL InfraManage.NET Installing InfraManage.NET Page 1 of 78 Table of Contents
More informationLinux Exercise. pwd answer: We call this directory (into which you get when you log in) your home directory.
Linux Exercise The following steps will guide you through the most common Linux commands. If you are using windows (Library and any Windows lab on campus), then start with step 1. If you are using a linux
More informationConfiguring the SMA 500v Virtual Appliance
Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance
More informationLab assignment #2 IPSec and VPN Tunnels
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels Lab GSA: Carlos Caicedo Page I. Lab resources for this assignment...
More informationCommand-Line Interface (CLI) Basics
4 CHAPTER This chapter is intended as a quick reference, not as a step-by-step explanation of the Cisco IOS. The chapter describes basic Cisco IOS software command-line interfaces that you may need to
More informationSOURCEFIRE 3D SYSTEM RELEASE NOTES
SOURCEFIRE 3D SYSTEM RELEASE NOTES Version 5.3.0.2 Original Publication: April 21, 2014 Last Updated: April 25, 2016 These release notes are valid for Version 5.3.0.2 of the Sourcefire 3D System. Even
More informationiptables and ip6tables An introduction to LINUX firewall
7 19-22 November, 2017 Dhaka, Bangladesh iptables and ip6tables An introduction to LINUX firewall Imtiaz Rahman SBAC Bank Ltd AGENDA iptables and ip6tables Structure Policy (DROP/ACCEPT) Syntax Hands on
More informationUser Manual of the Pre-built Ubuntu Virtual Machine
SEED Labs 1 User Manual of the Pre-built Ubuntu 16.04 Virtual Machine Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US
More informationChanging passwords on Windows Customized for D-MTEC Users
Changing passwords on Windows Customized for D-MTEC Users BYOD (Bring Your Own Device)... 1 Wi-Fi 2 Windows Credential Manager... 4 Microsoft Outlook Mail Account... 5 PIA printers... 5 Network drives...
More informationPerform Backup and Restore
, page 1 You can schedule periodic backups using the Cisco Prime Collaboration user interface, or run backup commands manually by logging in to the system as an admin user (CLI user). However, you must
More informationInstalling FreePBX Official Distro
Installing FreePBX 10.13.66 Official Distro Follow these instructions for the easiest, totally automated FreePBX installation! 1. Download the ISO file from http://www.freepbx.org/downloads. 2. Convert
More informationCryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan
Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted
More informationCisco NAC Profiler UI User Administration
CHAPTER 14 Topics in this chapter include: Overview, page 14-1 Managing Cisco NAC Profiler Web User Accounts, page 14-2 Enabling RADIUS Authentication for Cisco NAC Profiler User Accounts, page 14-7 Changing
More informationConfigure a Cisco Router with TACACS+ Authentication
Configure a Cisco Router with TACACS+ Authentication Document ID: 13865 Contents Introduction Prerequisites Requirements Components Used Conventions Authentication Add Authorization Add Accounting Test
More informationLAB 3 Basic Switch Configuration Commands
LAB 3 Basic Switch Configuration Commands This lab explains basic switch configuration commands in detail with examples. Configuration and commands explained in this tutorial are essential commands to
More informationONLINE REGISTRATION SYSTEM (ORS) Administrator s User Guide
ONLINE REGISTRATION SYSTEM (ORS) Administrator s User Guide 2010 Table of Contents 1.0 Logging on As Administrator... 4 2.1 User Maintenance... 6 2.1.1Add New User... 6 2.1.1.1Reset Password...14 2.1.1.2Edit...
More information