Things you should know for the CTF
|
|
- Mae Parrish
- 6 years ago
- Views:
Transcription
1 Things you should know for the CTF Requirements From Wed. Oct. 24 evening MIT meeting: o Web server must run on port 80 o WordPress must allow registration/login via verified OpenID o Registration/login process must bring user back to front page Friday, October 26, 2012 CS342 Computer Security Department of Computer Science Wellesley College o Widgets/plugins must exist on front page to be graded. o Network Time Protocol (NTP) service must be enabled. o Cannot block/filter IP addresses (I think) o Anything else? 14-2 Startup who : list logged in users from Michael Zhivich (Fri. Oct. 26): We're still working out logistics for the contest start-up. There will be a period when VMs are available for players to install tools/harden/etc and graders are not running (so the competition has not officially started). Unfortunately, we don't have any technical means to prevent various teams from attacking each other during this period. Unlike the previous event, all services will be turned off at the beginning, so the only exposed service should be SSH; I believe this is a reasonably secure configuration. We highly recommend that your team comes equipped with either a Windows machine or a VM; this will enable them to get "console access" to their VM via vsphere client, so they'll be able to unplug their machine from the network. There is also a Web-based vsphere client available, but I haven't tested it out. Does anyone know what this means? root@ctf-portal:/# who sysadmin tty :59 sysadmin pts/ :31 ( ) [cs235@puma ~] who sysadmin : :03 sysadmin pts/ :03 (:0.0) cs304 pts/ :27 (sampras.wellesley.edu) zjansen pts/ :24 ( ) cs235 pts/ :07 (pool bstnma.fios.verizon.net) anderson pts/ :22 (sampras.wellesley.edu) tanner11 pts/ :23 (puma.wellesley.edu) anderson pts/ :38 (sampras.wellesley.edu) anderson pts/ :42 (sampras.wellesley.edu) cs304tes pts/ :10 (sampras.wellesley.edu) sysadmin pts/ :31 (:0.0)
2 ps : list processes root@ctf-portal:/# ps -ef UID PID PPID C STIME TTY TIME CMD root Oct19? 00:00:00 /sbin/init root Oct19? 00:00:00 [kthreadd] root Oct19? 00:00:01 [ksoftirqd/0] mysql Oct19? 00:01:05 /usr/sbin/mysqld qmails Oct19? 00:00:00 qmail-send qmaild Oct19? 00:00:00 tcpserver -v -R -l ctf-portal.ctf.csail.mit.edu -x /etc/qmail root Oct19? 00:00:00 /var/lib/qmail/bin/qmail-verify root Oct19? 00:00:00 qmail-lspawn preline procmail qmailr Oct19? 00:00:00 qmail-rspawn qmailq Oct19? 00:00:00 qmail-clean root Oct19 tty1 00:00:00 /bin/login -- sysadmin Oct19 tty1 00:00:00 -bash root Oct21? 00:00:05 /usr/sbin/apache2 -k start www-data :25? 00:00:00 /usr/sbin/apache2 -k start root :51 pts/2 00:00:00 ps -ef kill -9 : kill a process root@ctf-portal:/# ping google.com > /tmp/pingout & [1] 6421 root@ctf-portal:/# ps -ef grep ping root :21 pts/2 00:00:00 ping google.com root :22 pts/2 00:00:00 grep --color=auto ping root@ctf-portal:/# kill root@ctf-portal:/# ps -ef grep ping root :22 pts/2 00:00:00 grep --color=auto ping [1]+ Killed ping google.com > /tmp/pingout Note: if kill parent process, all children are killed top: list process resources htop: fancier top top - 04:35:58 up 3 days, 14:19, 2 users, load average: 0.00, 0.01, 0.05 Tasks: 85 total, 1 running, 83 sleeping, 1 stopped, 0 zombie Cpu(s): 0.0%us, 0.0%sy, 0.0%ni, 92.6%id, 7.4%wa, 0.0%hi, 0.0%si, 0.0%st Mem: k total, k used, k free, 48412k buffers Swap: k total, 0k used, k free, k cached PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 676 root S :05.38 runsvdir 1 root S :00.30 init 2 root S :00.02 kthreadd 3 root S :01.46 ksoftirqd/0 5 root S :00.17 kworker/u:0 6 root RT S :00.00 migration/0 7 root RT S :03.45 watchdog/0 8 root S :00.00 cpuset 9 root S :00.00 khelper 10 root S :00.00 kdevtmpfs 11 root S :00.00 netns 12 root S :01.57 sync_supers 13 root S :00.03 bdi-default 14 root S :00.00 kintegrityd 15 root S :00.00 kblockd 16 root S :00.00 ata_sff 17 root S :00.07 khubd
3 netstat netstat -aln Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State tcp : :* LISTEN tcp : :* LISTEN tcp : :* LISTEN tcp : :* LISTEN tcp : :* LISTEN tcp : :60040 ESTABLISHED tcp6 0 0 :::22 :::* LISTEN tcp6 0 0 ::1:6010 :::* LISTEN udp : :* 14-9 netstat (continued) Active UNIX domain sockets (servers and established) Proto RefCnt Flags Type State I-Node Path unix 2 [ ACC ] SEQPACKET LISTENING 6657 /run/udev/control unix 2 [ ACC ] STREAM LISTENING unix 2 [ ACC ] STREAM LISTENING 8259 /var/run/mysqld/mysqld.sock unix 2 [ ACC ] STREAM LISTENING 7021 /var/run/dbus/system_bus_socket unix 6 [ ] DGRAM 7151 /dev/log unix 2 [ ] DGRAM unix 2 [ ] DGRAM unix 3 [ ] STREAM CONNECTED unix 3 [ ] STREAM CONNECTED unix 2 [ ] DGRAM unix 2 [ ] DGRAM unix 2 [ ] DGRAM unix 2 [ ] DGRAM 8509 unix 3 [ ] STREAM CONNECTED 7119 /var/run/dbus/system_bus_socket unix 3 [ ] STREAM CONNECTED 7118 unix 3 [ ] STREAM CONNECTED 7094 unix 3 [ ] STREAM CONNECTED 7093 unix 3 [ ] STREAM CONNECTED unix 3 [ ] STREAM CONNECTED 6980 unix 3 [ ] DGRAM 6698 unix 3 [ ] DGRAM 6697 unix 3 [ ] STREAM CONNECTED unix 3 [ ] STREAM CONNECTED nmap: find open ports nmap: example 2 root@ctf-portal:~# nmap localhost Starting Nmap 5.21 ( ) at :45 EDT Nmap scan report for localhost ( ) Host is up ( s latency). Not shown: 996 closed ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 3306/tcp open mysql 8888/tcp open sun-answerbook root@ctf-portal:~# nmap -p localhost Starting Nmap 5.21 ( ) at :47 EDT Nmap scan report for localhost ( ) Host is up ( s latency). Not shown: closed ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 3306/tcp open mysql 6010/tcp open unknown 8888/tcp open sun-answerbook Nmap done: 1 IP address (1 host up) scanned in 5.18 seconds Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
4 nmap: example 3 root@ctf-portal:~# nmap -A -T4 localhost Starting Nmap 5.21 ( ) at :45 EDT Nmap scan report for localhost ( ) Host is up ( s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1 (protocol 2.0) ssh-hostkey: :c7:ff:39:0f:96:fb:c4:67:e2:02:25:7a:31:dc:ca (DSA) _ :77:90:d4:d2:e4:10:68:45:25:64:9f:e8:b1:34:26 (RSA) 25/tcp open smtp netqmail smtpd 1.04 smtp-commands: EHLO ctf-portal.ctf.csail.mit.edu, PIPELINING, 8BITMIME _HELP netqmail home page: /tcp open mysql MySQL ubuntu mysql-info: Protocol: 10 Version: ubuntu Thread ID: 241 Some Capabilities: Long Passwords, Connect with DB, Compress, ODBC, Transactions, Secure Connection Status: Autocommit _Salt: 'mrw *X_ 8888/tcp open http Apache httpd ((Ubuntu)) _html-title: 404 Not Found No exact OS matches for host (If you know what OS is running on it, see submit/ ). TCP/IP fingerprint: OS:SCAN(V=5.21%D=10/23%OT=22%CT=1%CU=40364%PV=N%DS=0%DC=L%G=Y%TM= %P lots of details omitted nmap: example 4 Starting Nmap 5.21 ( ) at :08 EDT Nmap scan report for cs.wellesley.edu ( ) Host is up (0.011s latency). rdns record for : puma.wellesley.edu Not shown: 991 filtered ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 80/tcp open http 111/tcp open rpcbind 443/tcp open https 2049/tcp open nfs 3306/tcp open mysql 8009/tcp open ajp /tcp open http-proxy Nmap done: 1 IP address (1 host up) scanned in seconds Linux Firewall A firewall filters network packets into and out of machine according to rules. o o Input rules filter packets addressed to local machine; Forward rules filter packets traversing machine in router mode; Firewall: iptables Can configure rules by hand using iptables command, but has a reputation for having a high learning curve. The default firewall on your CTF machines is too permissive! It doesn t filter anything: root@ctf-portal:/# iptables -L Chain INPUT (policy ACCEPT) o Output rules filter packets originating from local machine and being sent to other machines. Chain FORWARD (policy ACCEPT) Chain OUTPUT (policy ACCEPT)
5 Firewall: ufw (Uncomplicated Firewall) Ubuntu provides ufw as an easier-to-use interface to iptables. Documentation: Use man or see server guide at: sudo ufw enable Command may disrupt existing ssh connections. Proceed with operation (y n)? y Firewall is active and enabled on system startup root@ctf-portal:/# sudo ufw status verbose Status: active Logging: on (low) Default: deny (incoming), allow (outgoing) New profiles: skip Firewall: ufw enable root@ctf-portal:/# sudo ufw enable Command may disrupt existing ssh connections. Proceed with operation (y n)? y Firewall is active and enabled on system startup root@ctf-portal:/# iptables -L Chain INPUT (policy DROP) ufw-before-logging-input all -- ufw-before-input all -- ufw-after-input all -- ufw-after-logging-input all -- ufw-reject-input all -- ufw-track-input all -- Chain FORWARD (policy DROP) ufw-before-logging-forward all -- ufw-before-forward all -- ufw-after-forward all -- ufw-after-logging-forward all -- ufw-reject-forward all -- Chain OUTPUT (policy ACCEPT) ufw-before-logging-output all -- ufw-before-output all -- ufw-after-output all -- ufw-after-logging-output all -- ufw-reject-output all ufw-track-output all Configuration files Basic networking o /etc/apache2/apache2.conf o /etc/apache2/httpd.conf o /etc/apache2/sites-enabled o /etc/mysql/my.cnf o ping o ifconfig o /etc/hosts o telnet o curl o digg
6 Other things o starting/stopping services o apache logs o wordpress logs? o mod_security plugin for apache o apparmor? o chroot o tripwire o snort 14-21
CPSC 457 OPERATING SYSTEMS MIDTERM EXAM
CPSC 457 OPERATING SYSTEMS MIDTERM EXAM Department of Computer Science University of Calgary Professor: Carey Williamson March 9, 2010 This is a CLOSED BOOK exam. Textbooks, notes, laptops, calculators,
More informationManaging Processes Process: A running program
Managing Processes Process: A running program User Process: The process initiated by a User while logged into a terminal (e.g. grep, find, ls) Daemon Process: These processes are usually initiated on system
More informationThe Wonderful World of Services VINCE
The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services
More information07 - Processes and Jobs
07 - Processes and Jobs CS 2043: Unix Tools and Scripting, Spring 2016 [1] Stephen McDowell February 10th, 2016 Cornell University Table of contents 1. Processes Overview 2. Modifying Processes 3. Jobs
More informationSperimentazioni I LINUX commands tutorial - Part II
Sperimentazioni I LINUX commands tutorial - Part II A. Garfagnini, M. Mazzocco Università degli studi di Padova 24 Ottobre 2012 Streams and I/O Redirection Pipelines Create, monitor and kill processes
More informationSecurity principles Host security
Security principles Host security These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host Security:
More informationStateless Firewall Implementation
Stateless Firewall Implementation Network Security Lab, 2016 Group 16 B.Gamaliel K.Noellar O.Vincent H.Tewelde Outline : I. Enviroment Setup II. Today s Task III. Conclusion 2 Lab Objectives : After this
More informationCIT 480: Securing Computer Systems
CIT 480: Securing Computer Systems Scanning CIT 480: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting CIT 480: Securing Computer
More informationProject 4: Penetration Test
Project description Project 4: Penetration Test April 28, 2014 Bing Hao The learning objective of this project is to gain hands on experiences with the usage and functionality of Nmap, Neussus and Metsploit.
More informationTwitch Plays Pokémon: Twitch s Chat Architecture. John Rizzo Sr Software Engineer
Twitch Plays Pokémon: Twitch s Chat Architecture John Rizzo Sr Software Engineer About Me Twitch Introduction Twitch Introduction Twitch Introduction Over 800k concurrent users Tens of BILLIONS of daily
More informationThe Wonderful World of Services. By: Stefanja
The Wonderful World of Services By: Stefanja What Is a Service? Make the computer world go round Without Services we d have nothing A service is an application that runs in the background to enable a computer
More informationMP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm
MP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm Please read all sections of this document before you begin coding. In this assignment, you will implement a simple HTTP client and server. The client
More informationCRUK cluster practical sessions (SLURM) Part I processes & scripts
CRUK cluster practical sessions (SLURM) Part I processes & scripts login Log in to the head node, clust1-headnode, using ssh and your usual user name & password. SSH Secure Shell 3.2.9 (Build 283) Copyright
More informationSection 1: Tools. Contents CS162. January 19, Make More details about Make Git Commands to know... 3
CS162 January 19, 2017 Contents 1 Make 2 1.1 More details about Make.................................... 2 2 Git 3 2.1 Commands to know....................................... 3 3 GDB: The GNU Debugger
More informationLinux Security & Firewall
Linux Security & Firewall Linux is not secure No computer system can ever be "completely secure". make it increasingly difficult for someone to compromise your system. The more secure your system, the
More informationBasic Linux Desktop Security. Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer
Basic Linux Desktop Security Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer Think Security: 5Q 1)What is the problem? 2)What is the proposed solution?
More informationIntroduction to Firewalls using IPTables
Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your
More informationChecking Resource Usage in Fedora (Linux)
Lab 5C Checking Resource Usage in Fedora (Linux) Objective In this exercise, the student will learn how to check the resources on a Fedora system. This lab covers the following commands: df du top Equipment
More informationStaying Out of the Swamp
Staying Out of the Swamp Perforce User Conference 2001 Richard E. Baum Introduction Perforce runs well when given proper resources. CPU requirements are quite small. A server s I/O bandwidth is generally
More informationNAME netstat Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships
NAME netstat Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships SYNOPSIS netstat [address_family_options] [ tcp t] [ udp u] [ raw w] [ listening
More informationProcess Control Commands
To use these commands in System Admin VM, you must be in a user group associated with appropriate command rules and data rules. If the user group assignment is preventing you from using a command, contact
More informationHigh Performance Computing Lecture 11. Matthew Jacob Indian Institute of Science
High Performance Computing Lecture 11 Matthew Jacob Indian Institute of Science Agenda 1. Program execution: Compilation, Object files, Function call and return, Address space, Data & its representation
More informationAvaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0
Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Issue 1.0 August 24, 2015 August 2015 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 1 ALL INFORMATION IS BELIEVED
More informationSecure Architecture Principles
CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from
More informationSQL Server vnext on Linux Ubuntu - Part 1
SQL Server vnext on Linux Ubuntu - Part 1 Built on SQL Server 2016, SQL Server vnext represents a major step towards making SQL Server a cross operating systems and bringing the power of SQL Server to
More informationSecure Architecture Principles
Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Original slides were created by Prof. John Mitchel 1 Secure
More informationHow much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux
How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux Author : admin If you have to administrate a heterogenous network with Linux and FreeBSD
More informationUnix Processes. What is a Process?
Unix Processes Process -- program in execution shell spawns a process for each command and terminates it when the command completes Many processes all multiplexed to a single processor (or a small number
More informationcommands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes
Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with
More informationBuilding an IPS solution for inline usage during Red Teaming
Building an IPS solution for inline usage during Red Teaming Repurposing defensive technologies for offensive Red Team operations K. Mladenov A. Zismer {kmladenov,azismer}@os3.nl Master Students in System
More information9 Notes on selecting processes in proc.mem and proc.num items
208/07/04 3:26 /5 9 Notes on selecting processes in proc.mem and proc.num items 9 Notes on selecting processes in proc.mem and proc.num items Processes modifying their commandline Some programs use modifying
More informationIK2206 Internet Security and Privacy Firewall & IP Tables
IK2206 Internet Security and Privacy Firewall & IP Tables Group Assignment Following persons were members of group C and authors of this report: Name: Christoph Moser Mail: chmo@kth.se P-Nr: 850923-T513
More informationBooting Up & Processes
CS 326: Operating Systems Booting Up & Processes Lecture 3 Today s Schedule Booting the System Process Structure Process Execution The Init System fork() wait() 1/31/18 CS 326: Operating Systems 2 Today
More informationOnce the VM is started, the VirtualBox OS Manager window can be closed. But our Ubuntu VM is still running.
How to use iptables on Ubuntu Revised: 16-August-2016 by David Walling This "How To" document describes using the iptables program to define firewall rules for our Ubuntu server. We will also explore using
More informationAPACHE TROUBLESHOOTING. Or, what to do when your vhost won t behave
APACHE TROUBLESHOOTING Or, what to do when your vhost won t behave ABOUT THE CLASS 24 hours over three days Very Short Lecture and Lots of Labs Hours: 8:30am - 5:00pm Lunch: 11:45am - 1:00pm ABOUT THE
More informationAvaya Port Matrix: Avaya Aura Performance Center 7.1
Avaya Port Matrix: Avaya Aura Performance Center 7.1 Issue 1.0 November 2014 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,
More informationPARALLEL ARCHITECTURES
PARALLEL ARCHITECTURES Course Parallel Computing Wolfgang Schreiner Research Institute for Symbolic Computation (RISC) Wolfgang.Schreiner@risc.jku.at http://www.risc.jku.at Parallel Random Access Machine
More informationMYSQL TROUBLESHOOTING. Or, what to do when MySQL starts throwing a fit
MYSQL TROUBLESHOOTING Or, what to do when MySQL starts throwing a fit ABOUT THE CLASS 24 hours over three days Very Short Lecture and Lots of Labs Hours: 8:30am - 5:00pm Lunch: 11:45am - 1:00pm ABOUT THE
More informationBasic Linux Security. Roman Bohuk University of Virginia
Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls
More informationThere are separate firewall daemons for for IPv4 and IPv6 and hence there are separate commands which are provided below.
SNMP Trap - Firewall Rules Article Number: 87 Rating: 1/5 from 1 votes Last Updated: Tue, Dec 18, 2018 at 5:25 PM Fir e wa ll Rule s These steps explain how to check if the Operating System (OS) of the
More informationLinux System Administration
System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for
More informationHPE ComputeSensor. User Guide. Software Version: 3.02 Windows and Linux operating systems. Document Release Date: August 2017
HPE ComputeSensor Software Version: 3.02 Windows and Linux operating systems User Guide Document Release Date: August 2017 Software Release Date: August 2017 Legal Notices Warranty The only warranties
More informationThis material is based on work supported by the National Science Foundation under Grant No
Source: http://en.wikipedia.org/wiki/file:firewall.png This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations
More informationPROCESSES. Jo, Heeseung
PROCESSES Jo, Heeseung TODAY'S TOPICS What is the process? How to implement processes? Inter-Process Communication (IPC) 2 WHAT IS THE PROCESS? Program? vs. Process? vs. Processor? 3 PROCESS CONCEPT (1)
More informationProcesses. Jo, Heeseung
Processes Jo, Heeseung Today's Topics What is the process? How to implement processes? Inter-Process Communication (IPC) 2 What Is The Process? Program? vs. Process? vs. Processor? 3 Process Concept (1)
More informationSecure Architecture Principles
CS 155 Spring 2017 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Secure Architecture Principles Isolation
More informationSecure Architecture Principles
CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from
More informationScanning. Scanning. Goals Useful Tools. The Basics NMAP. Scanning 1 / 34
Goals Useful s 1 / 34 Goals Useful s Suppose you re an attacker You want to attack a site How do you proceed? 2 / 34 Goals Goals Useful s Find an interesting (or vulnerable) machine Find a vulnerable service
More informationFirewall Evasion Lab: Bypassing Firewalls using VPN
SEED Labs Firewall Evasion Lab 1 Firewall Evasion Lab: Bypassing Firewalls using Copyright 2018 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science
More informationLinux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016
Linux Systems Security Logging and Network Monitoring NETS1028 Fall 2016 Monitoring Monitoring can take many forms, from passive periodic inspection to realtime intrusion detection For this unit, we will
More informationFirewall Simulation COMP620
Firewall Simulation COMP620 Firewall Simulation The simulation allows participants to configure their own simulated firewalls using Cisco-like syntax. Participants can take benign or malicious actions
More informationAssignment 2 TCP/IP Vulnerabilities
LEIC/MEIC - IST Alameda LEIC/MEIC/MERC IST Taguspark DEASegInf Network and Computer Security 2012/2013 Assignment 2 TCP/IP Vulnerabilities Goals Gather information about the machines in the network. Explore
More informationNessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT
Nessus Scan Report Mon, 15 May 2017 15:27:44 EDT Table Of Contents Hosts Summary (Executive) 192.168.168.134 Hosts Summary (Executive) [-] Collapse All [+] Expand All 192.168.168.134 Summary Critical High
More informationiptables and ip6tables An introduction to LINUX firewall
7 19-22 November, 2017 Dhaka, Bangladesh iptables and ip6tables An introduction to LINUX firewall Imtiaz Rahman SBAC Bank Ltd AGENDA iptables and ip6tables Structure Policy (DROP/ACCEPT) Syntax Hands on
More informationDefinition of firewall
Internet Firewalls Definitions: firewall, policy, router, gateway, proxy NAT: Network Address Translation Source NAT, Destination NAT, Port forwarding NAT firewall compromise via UPnP/IGD Packet filtering
More informationProcess. Heechul Yun. Disclaimer: some slides are adopted from the book authors slides with permission 1
Process Heechul Yun Disclaimer: some slides are adopted from the book authors slides with permission 1 Recap OS services Resource (CPU, memory) allocation, filesystem, communication, protection, security,
More informationPVS Deployment in the Cloud. Last Updated: June 17, 2016
PVS Deployment in the Cloud Last Updated: June 17, 2016 Contents Amazon Web Services Introduction 3 Software Requirements 4 Set up a NAT Gateway 5 Install PVS on the NAT Gateway 11 Example Deployment 12
More informationConfiguring the Router ASCII Interface
Configuring the Router ASCII Interface The router is controlled via an ASCII interface. This interface is accessible via a serial RS-232 port or over the network via a TCP port. Both ports use the same
More informationConfiguring the ASCII Interface
Configuring the ASCII Interface Thinklogical, LLC 100 Washington Street Milford, Connecticut 06460 U.S.A. Telephone : 1-203-647-8700 Fax : 1-203-783-0049 www.thinklogical.com Revision: D Preface The router
More informationApplied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.
Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System
More informationBuild your own Lightweight Webserver - Hands-on I - Information Network I. Marius Georgescu. Internet Engineering Laboratory. 17 Apr
Build your own Lightweight Webserver - Hands-on I - Information Network I Marius Georgescu Internet Engineering Laboratory 17 Apr. 2015 iplab Prerequisites Prerequisites Download and Install VirtualBox
More informationInstalling Cisco APIC-EM on a Virtual Machine
About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing
More informationThe Basics of Linux Security
The Basics of Linux Security What every Linux user should know about security Presented at the 2007 Nebraska CERT Conference Adam Haeder Vice President of Information Technology AIM Institute Basic Linux
More informationAvaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Matrix: Release 3.0 Issue 2 April 2016 April 2016 Avaya Matrix: 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,
More informationProcess Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal
Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal 2012-10-01 what is a process? an abstraction! you can think of it as a program in the midst of
More informationAvaya Port Matrix: Avaya Diagnostic Server 3.0
Avaya Matrix: Avaya Diagnostic Server 3.0 Issue 2.0 February 208 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER
More informationOS security mechanisms:
OS security mechanisms: Memory Protection: One of the important aspects of Operating system security is Memory Protection. Memory provides powerful indirect way for an attacker to circumvent security mechanism,
More informationLab #9: Basic Linux Networking
CTEC1767 Data Communications & Networking 2017 Lab #9: Basic Linux Networking Understanding Linux networks starts with understanding Linux network commands and the information they provide. We will use
More informationChange Management: DYNAMIC NETWORK MAPPING. LinuxWorld San Francisco Security Track. Presented by Joshua D. Abraham.
Change Management: DYNAMIC NETWORK MAPPING LinuxWorld San Francisco Security Track Presented by Joshua D. Abraham August 16th 2006 jabra@ccs.neu.edu Northeastern University Agenda How do we scan? What
More informationLab 1: Creating Secure Architectures (Revision)
Lab 1: Creating Secure Architectures (Revision) A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For
More informationInstituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities
Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security Lab guide: Traffic analysis and TCP/IP Vulnerabilities Revised on 2016-10-18 Alpha version: This is an early version and
More informationTELE 301 Lecture 8: Post
Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the
More informationHHC 2017 writeup, by RedTeam611
HHC 2017 writeup, by RedTeam611 After you complete the terminal challenges in the snowball games you will then move onto the web server challenges. Our first task to is to investigate the Letters to Santa
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationLayered Networking and Port Scanning
Layered Networking and Port Scanning David Malone 22nd June 2004 1 IP Header IP a way to phrase information so it gets from one computer to another. IPv4 Header: Version Head Len ToS Total Length 4 bit
More informationWeb Server ( ): FTP, SSH, HTTP, HTTPS, SMTP, POP3, IMAP, POP3S, IMAPS, MySQL (for some local services[qmail/vpopmail])
The following firewall scripts will help you secure your web and db servers placed on the internet. The scenario is such that the MySQL db server is desired to receive db connections / traffic only from
More informationSE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer
SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?
More informationRemoving files and directories, finding files and directories, controlling programs
Removing files and directories, finding files and directories, controlling programs Laboratory of Genomics & Bioinformatics in Parasitology Department of Parasitology, ICB, USP Removing files Files can
More informationI/O and Shell Scripting
I/O and Shell Scripting File Descriptors Redirecting Standard Error Shell Scripts Making a Shell Script Executable Specifying Which Shell Will Run a Script Comments in Shell Scripts File Descriptors Resources
More informationCS Computer and Network Security: Firewalls
CS 5410 - Computer and Network Security: Firewalls Professor Patrick Traynor Fall 2017 Reminders Monday: Change of Plans Recording lecture - turn in your rules. Friday: Project Abstract The hardest paragraph
More informationn Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic
Chapter Objectives n Understand how to use appropriate software tools to assess the security posture of an organization Chapter #7: Technologies and Tools n Given a scenario, analyze and interpret output
More informationAdvanced Web Programming
Advanced Web Programming 1 Advanced Web Programming what we have covered so far 2 The SocketServer Module simplified development of network servers a server tells clients the time 3 A Forking Server instead
More informationServices: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1
Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018
More informationProcess States. Controlling processes. Process states. PID and PPID UID and EUID GID and EGID Niceness Control terminal. Runnable. Sleeping.
Controlling processes PID and PPID UID and EUID GID and EGID Niceness Control terminal 1 Process States Process states Runnable The process can be executed Waiting for CPU Sleeping The process is waiting
More informationMetbox Training Outline LDM Training Metbox overview Break Metbox hands on training
Metbox Training Outline 1300-1430 LDM Training 1430-1500 Metbox overview 1500-1515 Break 1515-1700 Metbox hands on training Metbox Terms Metbox Hardware and software LDM Data management system GEneral
More informationServices and Security
Services and Security Find out what's listening to the net Find out what services are running Find out what they do Disable or remove any that you don't need References http://techrepublic.com.com/5100-6270-1053043.html
More informationHOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS
HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS How To Securely Configure a Linux Host to Run Containers To run containers securely, one must go through a multitude of steps to ensure that a)
More informationThe Linux IPL Procedure
The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe
More informationMySQL Performance Troubleshooting
MySQL Performance Troubleshooting Best Practices Francisco Bordenave - Architect, Percona Agenda Who am I? Introduction Identifying the source of problem We know where the problem is, now what? Best practices
More informationHow To Start Mysql Use Linux Command Line Client In Ubuntu
How To Start Mysql Use Linux Command Line Client In Ubuntu Getting started with MySQL for web and server applications on Ubuntu 14.04 LTS (Trusty Tahr). get started with MySQL on an Ubuntu 14.04 LTS (Trusty
More informationSECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System
SECURITY+ LAB SERIES Lab 3: Protocols and Default Network Ports Connecting to a Remote System Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported
More informationNetfilter. Fedora Core 5 setting up firewall for NIS and NFS labs. June 2006
Netfilter Fedora Core 5 setting up firewall for NIS and NFS labs June 2006 Netfilter Features Address Translation S NAT, D NAT IP Accounting and Mangling IP Packet filtering (Firewall) Stateful packet
More informationIntroduction to Linux
Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,
More informationRedHat Certified Engineer
RedHat Certified Engineer Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an
More informationSecurity. https://outflux.net/slides/2015/osu-devops.pdf. DevOps Bootcamp, OSU, Feb 2015 Kees Cook (pronounced Case )
https://outflux.net/slides/2015/osu-devops.pdf, Feb 2015 Kees Cook (pronounced Case ) Who is this guy? Fun: DefCon CTF team won in 2006 & 2007 Debian Ubuntu Jobs: OSDL (proto Linux Foundation)
More informationFundamentals of Linux Platform Security
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally
More informationFundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally
More informationGT Apiary: Remote Honeypots
GT Apiary: Remote Honeypots Undergraduate Special Problem, Summer 2010 George Macon August 4, 2010 a-pi-ar-y n. a place where bees are kept; a collection of beehives. 1 Introduction Honeypots are an important
More informationDistributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 29. Firewalls Paul Krzyzanowski Rutgers University Fall 2015 2013-2015 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive data & systems not accessible Integrity:
More informationJSA Common Ports Lists
Juniper Secure Analytics Release 2014.6 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2016-04-21 Copyright Notice Copyright 2016 Juniper
More information