Things you should know for the CTF

Size: px
Start display at page:

Download "Things you should know for the CTF"

Transcription

1 Things you should know for the CTF Requirements From Wed. Oct. 24 evening MIT meeting: o Web server must run on port 80 o WordPress must allow registration/login via verified OpenID o Registration/login process must bring user back to front page Friday, October 26, 2012 CS342 Computer Security Department of Computer Science Wellesley College o Widgets/plugins must exist on front page to be graded. o Network Time Protocol (NTP) service must be enabled. o Cannot block/filter IP addresses (I think) o Anything else? 14-2 Startup who : list logged in users from Michael Zhivich (Fri. Oct. 26): We're still working out logistics for the contest start-up. There will be a period when VMs are available for players to install tools/harden/etc and graders are not running (so the competition has not officially started). Unfortunately, we don't have any technical means to prevent various teams from attacking each other during this period. Unlike the previous event, all services will be turned off at the beginning, so the only exposed service should be SSH; I believe this is a reasonably secure configuration. We highly recommend that your team comes equipped with either a Windows machine or a VM; this will enable them to get "console access" to their VM via vsphere client, so they'll be able to unplug their machine from the network. There is also a Web-based vsphere client available, but I haven't tested it out. Does anyone know what this means? root@ctf-portal:/# who sysadmin tty :59 sysadmin pts/ :31 ( ) [cs235@puma ~] who sysadmin : :03 sysadmin pts/ :03 (:0.0) cs304 pts/ :27 (sampras.wellesley.edu) zjansen pts/ :24 ( ) cs235 pts/ :07 (pool bstnma.fios.verizon.net) anderson pts/ :22 (sampras.wellesley.edu) tanner11 pts/ :23 (puma.wellesley.edu) anderson pts/ :38 (sampras.wellesley.edu) anderson pts/ :42 (sampras.wellesley.edu) cs304tes pts/ :10 (sampras.wellesley.edu) sysadmin pts/ :31 (:0.0)

2 ps : list processes root@ctf-portal:/# ps -ef UID PID PPID C STIME TTY TIME CMD root Oct19? 00:00:00 /sbin/init root Oct19? 00:00:00 [kthreadd] root Oct19? 00:00:01 [ksoftirqd/0] mysql Oct19? 00:01:05 /usr/sbin/mysqld qmails Oct19? 00:00:00 qmail-send qmaild Oct19? 00:00:00 tcpserver -v -R -l ctf-portal.ctf.csail.mit.edu -x /etc/qmail root Oct19? 00:00:00 /var/lib/qmail/bin/qmail-verify root Oct19? 00:00:00 qmail-lspawn preline procmail qmailr Oct19? 00:00:00 qmail-rspawn qmailq Oct19? 00:00:00 qmail-clean root Oct19 tty1 00:00:00 /bin/login -- sysadmin Oct19 tty1 00:00:00 -bash root Oct21? 00:00:05 /usr/sbin/apache2 -k start www-data :25? 00:00:00 /usr/sbin/apache2 -k start root :51 pts/2 00:00:00 ps -ef kill -9 : kill a process root@ctf-portal:/# ping google.com > /tmp/pingout & [1] 6421 root@ctf-portal:/# ps -ef grep ping root :21 pts/2 00:00:00 ping google.com root :22 pts/2 00:00:00 grep --color=auto ping root@ctf-portal:/# kill root@ctf-portal:/# ps -ef grep ping root :22 pts/2 00:00:00 grep --color=auto ping [1]+ Killed ping google.com > /tmp/pingout Note: if kill parent process, all children are killed top: list process resources htop: fancier top top - 04:35:58 up 3 days, 14:19, 2 users, load average: 0.00, 0.01, 0.05 Tasks: 85 total, 1 running, 83 sleeping, 1 stopped, 0 zombie Cpu(s): 0.0%us, 0.0%sy, 0.0%ni, 92.6%id, 7.4%wa, 0.0%hi, 0.0%si, 0.0%st Mem: k total, k used, k free, 48412k buffers Swap: k total, 0k used, k free, k cached PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 676 root S :05.38 runsvdir 1 root S :00.30 init 2 root S :00.02 kthreadd 3 root S :01.46 ksoftirqd/0 5 root S :00.17 kworker/u:0 6 root RT S :00.00 migration/0 7 root RT S :03.45 watchdog/0 8 root S :00.00 cpuset 9 root S :00.00 khelper 10 root S :00.00 kdevtmpfs 11 root S :00.00 netns 12 root S :01.57 sync_supers 13 root S :00.03 bdi-default 14 root S :00.00 kintegrityd 15 root S :00.00 kblockd 16 root S :00.00 ata_sff 17 root S :00.07 khubd

3 netstat netstat -aln Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State tcp : :* LISTEN tcp : :* LISTEN tcp : :* LISTEN tcp : :* LISTEN tcp : :* LISTEN tcp : :60040 ESTABLISHED tcp6 0 0 :::22 :::* LISTEN tcp6 0 0 ::1:6010 :::* LISTEN udp : :* 14-9 netstat (continued) Active UNIX domain sockets (servers and established) Proto RefCnt Flags Type State I-Node Path unix 2 [ ACC ] SEQPACKET LISTENING 6657 /run/udev/control unix 2 [ ACC ] STREAM LISTENING unix 2 [ ACC ] STREAM LISTENING 8259 /var/run/mysqld/mysqld.sock unix 2 [ ACC ] STREAM LISTENING 7021 /var/run/dbus/system_bus_socket unix 6 [ ] DGRAM 7151 /dev/log unix 2 [ ] DGRAM unix 2 [ ] DGRAM unix 3 [ ] STREAM CONNECTED unix 3 [ ] STREAM CONNECTED unix 2 [ ] DGRAM unix 2 [ ] DGRAM unix 2 [ ] DGRAM unix 2 [ ] DGRAM 8509 unix 3 [ ] STREAM CONNECTED 7119 /var/run/dbus/system_bus_socket unix 3 [ ] STREAM CONNECTED 7118 unix 3 [ ] STREAM CONNECTED 7094 unix 3 [ ] STREAM CONNECTED 7093 unix 3 [ ] STREAM CONNECTED unix 3 [ ] STREAM CONNECTED 6980 unix 3 [ ] DGRAM 6698 unix 3 [ ] DGRAM 6697 unix 3 [ ] STREAM CONNECTED unix 3 [ ] STREAM CONNECTED nmap: find open ports nmap: example 2 root@ctf-portal:~# nmap localhost Starting Nmap 5.21 ( ) at :45 EDT Nmap scan report for localhost ( ) Host is up ( s latency). Not shown: 996 closed ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 3306/tcp open mysql 8888/tcp open sun-answerbook root@ctf-portal:~# nmap -p localhost Starting Nmap 5.21 ( ) at :47 EDT Nmap scan report for localhost ( ) Host is up ( s latency). Not shown: closed ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 3306/tcp open mysql 6010/tcp open unknown 8888/tcp open sun-answerbook Nmap done: 1 IP address (1 host up) scanned in 5.18 seconds Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds

4 nmap: example 3 root@ctf-portal:~# nmap -A -T4 localhost Starting Nmap 5.21 ( ) at :45 EDT Nmap scan report for localhost ( ) Host is up ( s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1 (protocol 2.0) ssh-hostkey: :c7:ff:39:0f:96:fb:c4:67:e2:02:25:7a:31:dc:ca (DSA) _ :77:90:d4:d2:e4:10:68:45:25:64:9f:e8:b1:34:26 (RSA) 25/tcp open smtp netqmail smtpd 1.04 smtp-commands: EHLO ctf-portal.ctf.csail.mit.edu, PIPELINING, 8BITMIME _HELP netqmail home page: /tcp open mysql MySQL ubuntu mysql-info: Protocol: 10 Version: ubuntu Thread ID: 241 Some Capabilities: Long Passwords, Connect with DB, Compress, ODBC, Transactions, Secure Connection Status: Autocommit _Salt: 'mrw *X_ 8888/tcp open http Apache httpd ((Ubuntu)) _html-title: 404 Not Found No exact OS matches for host (If you know what OS is running on it, see submit/ ). TCP/IP fingerprint: OS:SCAN(V=5.21%D=10/23%OT=22%CT=1%CU=40364%PV=N%DS=0%DC=L%G=Y%TM= %P lots of details omitted nmap: example 4 Starting Nmap 5.21 ( ) at :08 EDT Nmap scan report for cs.wellesley.edu ( ) Host is up (0.011s latency). rdns record for : puma.wellesley.edu Not shown: 991 filtered ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 80/tcp open http 111/tcp open rpcbind 443/tcp open https 2049/tcp open nfs 3306/tcp open mysql 8009/tcp open ajp /tcp open http-proxy Nmap done: 1 IP address (1 host up) scanned in seconds Linux Firewall A firewall filters network packets into and out of machine according to rules. o o Input rules filter packets addressed to local machine; Forward rules filter packets traversing machine in router mode; Firewall: iptables Can configure rules by hand using iptables command, but has a reputation for having a high learning curve. The default firewall on your CTF machines is too permissive! It doesn t filter anything: root@ctf-portal:/# iptables -L Chain INPUT (policy ACCEPT) o Output rules filter packets originating from local machine and being sent to other machines. Chain FORWARD (policy ACCEPT) Chain OUTPUT (policy ACCEPT)

5 Firewall: ufw (Uncomplicated Firewall) Ubuntu provides ufw as an easier-to-use interface to iptables. Documentation: Use man or see server guide at: sudo ufw enable Command may disrupt existing ssh connections. Proceed with operation (y n)? y Firewall is active and enabled on system startup root@ctf-portal:/# sudo ufw status verbose Status: active Logging: on (low) Default: deny (incoming), allow (outgoing) New profiles: skip Firewall: ufw enable root@ctf-portal:/# sudo ufw enable Command may disrupt existing ssh connections. Proceed with operation (y n)? y Firewall is active and enabled on system startup root@ctf-portal:/# iptables -L Chain INPUT (policy DROP) ufw-before-logging-input all -- ufw-before-input all -- ufw-after-input all -- ufw-after-logging-input all -- ufw-reject-input all -- ufw-track-input all -- Chain FORWARD (policy DROP) ufw-before-logging-forward all -- ufw-before-forward all -- ufw-after-forward all -- ufw-after-logging-forward all -- ufw-reject-forward all -- Chain OUTPUT (policy ACCEPT) ufw-before-logging-output all -- ufw-before-output all -- ufw-after-output all -- ufw-after-logging-output all -- ufw-reject-output all ufw-track-output all Configuration files Basic networking o /etc/apache2/apache2.conf o /etc/apache2/httpd.conf o /etc/apache2/sites-enabled o /etc/mysql/my.cnf o ping o ifconfig o /etc/hosts o telnet o curl o digg

6 Other things o starting/stopping services o apache logs o wordpress logs? o mod_security plugin for apache o apparmor? o chroot o tripwire o snort 14-21

CPSC 457 OPERATING SYSTEMS MIDTERM EXAM

CPSC 457 OPERATING SYSTEMS MIDTERM EXAM CPSC 457 OPERATING SYSTEMS MIDTERM EXAM Department of Computer Science University of Calgary Professor: Carey Williamson March 9, 2010 This is a CLOSED BOOK exam. Textbooks, notes, laptops, calculators,

More information

Managing Processes Process: A running program

Managing Processes Process: A running program Managing Processes Process: A running program User Process: The process initiated by a User while logged into a terminal (e.g. grep, find, ls) Daemon Process: These processes are usually initiated on system

More information

The Wonderful World of Services VINCE

The Wonderful World of Services VINCE The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services

More information

07 - Processes and Jobs

07 - Processes and Jobs 07 - Processes and Jobs CS 2043: Unix Tools and Scripting, Spring 2016 [1] Stephen McDowell February 10th, 2016 Cornell University Table of contents 1. Processes Overview 2. Modifying Processes 3. Jobs

More information

Sperimentazioni I LINUX commands tutorial - Part II

Sperimentazioni I LINUX commands tutorial - Part II Sperimentazioni I LINUX commands tutorial - Part II A. Garfagnini, M. Mazzocco Università degli studi di Padova 24 Ottobre 2012 Streams and I/O Redirection Pipelines Create, monitor and kill processes

More information

Security principles Host security

Security principles Host security Security principles Host security These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host Security:

More information

Stateless Firewall Implementation

Stateless Firewall Implementation Stateless Firewall Implementation Network Security Lab, 2016 Group 16 B.Gamaliel K.Noellar O.Vincent H.Tewelde Outline : I. Enviroment Setup II. Today s Task III. Conclusion 2 Lab Objectives : After this

More information

CIT 480: Securing Computer Systems

CIT 480: Securing Computer Systems CIT 480: Securing Computer Systems Scanning CIT 480: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting CIT 480: Securing Computer

More information

Project 4: Penetration Test

Project 4: Penetration Test Project description Project 4: Penetration Test April 28, 2014 Bing Hao The learning objective of this project is to gain hands on experiences with the usage and functionality of Nmap, Neussus and Metsploit.

More information

Twitch Plays Pokémon: Twitch s Chat Architecture. John Rizzo Sr Software Engineer

Twitch Plays Pokémon: Twitch s Chat Architecture. John Rizzo Sr Software Engineer Twitch Plays Pokémon: Twitch s Chat Architecture John Rizzo Sr Software Engineer About Me Twitch Introduction Twitch Introduction Twitch Introduction Over 800k concurrent users Tens of BILLIONS of daily

More information

The Wonderful World of Services. By: Stefanja

The Wonderful World of Services. By: Stefanja The Wonderful World of Services By: Stefanja What Is a Service? Make the computer world go round Without Services we d have nothing A service is an application that runs in the background to enable a computer

More information

MP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm

MP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm MP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm Please read all sections of this document before you begin coding. In this assignment, you will implement a simple HTTP client and server. The client

More information

CRUK cluster practical sessions (SLURM) Part I processes & scripts

CRUK cluster practical sessions (SLURM) Part I processes & scripts CRUK cluster practical sessions (SLURM) Part I processes & scripts login Log in to the head node, clust1-headnode, using ssh and your usual user name & password. SSH Secure Shell 3.2.9 (Build 283) Copyright

More information

Section 1: Tools. Contents CS162. January 19, Make More details about Make Git Commands to know... 3

Section 1: Tools. Contents CS162. January 19, Make More details about Make Git Commands to know... 3 CS162 January 19, 2017 Contents 1 Make 2 1.1 More details about Make.................................... 2 2 Git 3 2.1 Commands to know....................................... 3 3 GDB: The GNU Debugger

More information

Linux Security & Firewall

Linux Security & Firewall Linux Security & Firewall Linux is not secure No computer system can ever be "completely secure". make it increasingly difficult for someone to compromise your system. The more secure your system, the

More information

Basic Linux Desktop Security. Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer

Basic Linux Desktop Security. Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer Basic Linux Desktop Security Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer Think Security: 5Q 1)What is the problem? 2)What is the proposed solution?

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

Checking Resource Usage in Fedora (Linux)

Checking Resource Usage in Fedora (Linux) Lab 5C Checking Resource Usage in Fedora (Linux) Objective In this exercise, the student will learn how to check the resources on a Fedora system. This lab covers the following commands: df du top Equipment

More information

Staying Out of the Swamp

Staying Out of the Swamp Staying Out of the Swamp Perforce User Conference 2001 Richard E. Baum Introduction Perforce runs well when given proper resources. CPU requirements are quite small. A server s I/O bandwidth is generally

More information

NAME netstat Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships

NAME netstat Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships NAME netstat Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships SYNOPSIS netstat [address_family_options] [ tcp t] [ udp u] [ raw w] [ listening

More information

Process Control Commands

Process Control Commands To use these commands in System Admin VM, you must be in a user group associated with appropriate command rules and data rules. If the user group assignment is preventing you from using a command, contact

More information

High Performance Computing Lecture 11. Matthew Jacob Indian Institute of Science

High Performance Computing Lecture 11. Matthew Jacob Indian Institute of Science High Performance Computing Lecture 11 Matthew Jacob Indian Institute of Science Agenda 1. Program execution: Compilation, Object files, Function call and return, Address space, Data & its representation

More information

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Issue 1.0 August 24, 2015 August 2015 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 1 ALL INFORMATION IS BELIEVED

More information

Secure Architecture Principles

Secure Architecture Principles CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from

More information

SQL Server vnext on Linux Ubuntu - Part 1

SQL Server vnext on Linux Ubuntu - Part 1 SQL Server vnext on Linux Ubuntu - Part 1 Built on SQL Server 2016, SQL Server vnext represents a major step towards making SQL Server a cross operating systems and bringing the power of SQL Server to

More information

Secure Architecture Principles

Secure Architecture Principles Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Original slides were created by Prof. John Mitchel 1 Secure

More information

How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux

How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux Author : admin If you have to administrate a heterogenous network with Linux and FreeBSD

More information

Unix Processes. What is a Process?

Unix Processes. What is a Process? Unix Processes Process -- program in execution shell spawns a process for each command and terminates it when the command completes Many processes all multiplexed to a single processor (or a small number

More information

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with

More information

Building an IPS solution for inline usage during Red Teaming

Building an IPS solution for inline usage during Red Teaming Building an IPS solution for inline usage during Red Teaming Repurposing defensive technologies for offensive Red Team operations K. Mladenov A. Zismer {kmladenov,azismer}@os3.nl Master Students in System

More information

9 Notes on selecting processes in proc.mem and proc.num items

9 Notes on selecting processes in proc.mem and proc.num items 208/07/04 3:26 /5 9 Notes on selecting processes in proc.mem and proc.num items 9 Notes on selecting processes in proc.mem and proc.num items Processes modifying their commandline Some programs use modifying

More information

IK2206 Internet Security and Privacy Firewall & IP Tables

IK2206 Internet Security and Privacy Firewall & IP Tables IK2206 Internet Security and Privacy Firewall & IP Tables Group Assignment Following persons were members of group C and authors of this report: Name: Christoph Moser Mail: chmo@kth.se P-Nr: 850923-T513

More information

Booting Up & Processes

Booting Up & Processes CS 326: Operating Systems Booting Up & Processes Lecture 3 Today s Schedule Booting the System Process Structure Process Execution The Init System fork() wait() 1/31/18 CS 326: Operating Systems 2 Today

More information

Once the VM is started, the VirtualBox OS Manager window can be closed. But our Ubuntu VM is still running.

Once the VM is started, the VirtualBox OS Manager window can be closed. But our Ubuntu VM is still running. How to use iptables on Ubuntu Revised: 16-August-2016 by David Walling This "How To" document describes using the iptables program to define firewall rules for our Ubuntu server. We will also explore using

More information

APACHE TROUBLESHOOTING. Or, what to do when your vhost won t behave

APACHE TROUBLESHOOTING. Or, what to do when your vhost won t behave APACHE TROUBLESHOOTING Or, what to do when your vhost won t behave ABOUT THE CLASS 24 hours over three days Very Short Lecture and Lots of Labs Hours: 8:30am - 5:00pm Lunch: 11:45am - 1:00pm ABOUT THE

More information

Avaya Port Matrix: Avaya Aura Performance Center 7.1

Avaya Port Matrix: Avaya Aura Performance Center 7.1 Avaya Port Matrix: Avaya Aura Performance Center 7.1 Issue 1.0 November 2014 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,

More information

PARALLEL ARCHITECTURES

PARALLEL ARCHITECTURES PARALLEL ARCHITECTURES Course Parallel Computing Wolfgang Schreiner Research Institute for Symbolic Computation (RISC) Wolfgang.Schreiner@risc.jku.at http://www.risc.jku.at Parallel Random Access Machine

More information

MYSQL TROUBLESHOOTING. Or, what to do when MySQL starts throwing a fit

MYSQL TROUBLESHOOTING. Or, what to do when MySQL starts throwing a fit MYSQL TROUBLESHOOTING Or, what to do when MySQL starts throwing a fit ABOUT THE CLASS 24 hours over three days Very Short Lecture and Lots of Labs Hours: 8:30am - 5:00pm Lunch: 11:45am - 1:00pm ABOUT THE

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

There are separate firewall daemons for for IPv4 and IPv6 and hence there are separate commands which are provided below.

There are separate firewall daemons for for IPv4 and IPv6 and hence there are separate commands which are provided below. SNMP Trap - Firewall Rules Article Number: 87 Rating: 1/5 from 1 votes Last Updated: Tue, Dec 18, 2018 at 5:25 PM Fir e wa ll Rule s These steps explain how to check if the Operating System (OS) of the

More information

Linux System Administration

Linux System Administration System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for

More information

HPE ComputeSensor. User Guide. Software Version: 3.02 Windows and Linux operating systems. Document Release Date: August 2017

HPE ComputeSensor. User Guide. Software Version: 3.02 Windows and Linux operating systems. Document Release Date: August 2017 HPE ComputeSensor Software Version: 3.02 Windows and Linux operating systems User Guide Document Release Date: August 2017 Software Release Date: August 2017 Legal Notices Warranty The only warranties

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No Source: http://en.wikipedia.org/wiki/file:firewall.png This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations

More information

PROCESSES. Jo, Heeseung

PROCESSES. Jo, Heeseung PROCESSES Jo, Heeseung TODAY'S TOPICS What is the process? How to implement processes? Inter-Process Communication (IPC) 2 WHAT IS THE PROCESS? Program? vs. Process? vs. Processor? 3 PROCESS CONCEPT (1)

More information

Processes. Jo, Heeseung

Processes. Jo, Heeseung Processes Jo, Heeseung Today's Topics What is the process? How to implement processes? Inter-Process Communication (IPC) 2 What Is The Process? Program? vs. Process? vs. Processor? 3 Process Concept (1)

More information

Secure Architecture Principles

Secure Architecture Principles CS 155 Spring 2017 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Secure Architecture Principles Isolation

More information

Secure Architecture Principles

Secure Architecture Principles CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from

More information

Scanning. Scanning. Goals Useful Tools. The Basics NMAP. Scanning 1 / 34

Scanning. Scanning. Goals Useful Tools. The Basics NMAP. Scanning 1 / 34 Goals Useful s 1 / 34 Goals Useful s Suppose you re an attacker You want to attack a site How do you proceed? 2 / 34 Goals Goals Useful s Find an interesting (or vulnerable) machine Find a vulnerable service

More information

Firewall Evasion Lab: Bypassing Firewalls using VPN

Firewall Evasion Lab: Bypassing Firewalls using VPN SEED Labs Firewall Evasion Lab 1 Firewall Evasion Lab: Bypassing Firewalls using Copyright 2018 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science

More information

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016 Linux Systems Security Logging and Network Monitoring NETS1028 Fall 2016 Monitoring Monitoring can take many forms, from passive periodic inspection to realtime intrusion detection For this unit, we will

More information

Firewall Simulation COMP620

Firewall Simulation COMP620 Firewall Simulation COMP620 Firewall Simulation The simulation allows participants to configure their own simulated firewalls using Cisco-like syntax. Participants can take benign or malicious actions

More information

Assignment 2 TCP/IP Vulnerabilities

Assignment 2 TCP/IP Vulnerabilities LEIC/MEIC - IST Alameda LEIC/MEIC/MERC IST Taguspark DEASegInf Network and Computer Security 2012/2013 Assignment 2 TCP/IP Vulnerabilities Goals Gather information about the machines in the network. Explore

More information

Nessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT

Nessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT Nessus Scan Report Mon, 15 May 2017 15:27:44 EDT Table Of Contents Hosts Summary (Executive) 192.168.168.134 Hosts Summary (Executive) [-] Collapse All [+] Expand All 192.168.168.134 Summary Critical High

More information

iptables and ip6tables An introduction to LINUX firewall

iptables and ip6tables An introduction to LINUX firewall 7 19-22 November, 2017 Dhaka, Bangladesh iptables and ip6tables An introduction to LINUX firewall Imtiaz Rahman SBAC Bank Ltd AGENDA iptables and ip6tables Structure Policy (DROP/ACCEPT) Syntax Hands on

More information

Definition of firewall

Definition of firewall Internet Firewalls Definitions: firewall, policy, router, gateway, proxy NAT: Network Address Translation Source NAT, Destination NAT, Port forwarding NAT firewall compromise via UPnP/IGD Packet filtering

More information

Process. Heechul Yun. Disclaimer: some slides are adopted from the book authors slides with permission 1

Process. Heechul Yun. Disclaimer: some slides are adopted from the book authors slides with permission 1 Process Heechul Yun Disclaimer: some slides are adopted from the book authors slides with permission 1 Recap OS services Resource (CPU, memory) allocation, filesystem, communication, protection, security,

More information

PVS Deployment in the Cloud. Last Updated: June 17, 2016

PVS Deployment in the Cloud. Last Updated: June 17, 2016 PVS Deployment in the Cloud Last Updated: June 17, 2016 Contents Amazon Web Services Introduction 3 Software Requirements 4 Set up a NAT Gateway 5 Install PVS on the NAT Gateway 11 Example Deployment 12

More information

Configuring the Router ASCII Interface

Configuring the Router ASCII Interface Configuring the Router ASCII Interface The router is controlled via an ASCII interface. This interface is accessible via a serial RS-232 port or over the network via a TCP port. Both ports use the same

More information

Configuring the ASCII Interface

Configuring the ASCII Interface Configuring the ASCII Interface Thinklogical, LLC 100 Washington Street Milford, Connecticut 06460 U.S.A. Telephone : 1-203-647-8700 Fax : 1-203-783-0049 www.thinklogical.com Revision: D Preface The router

More information

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr. Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System

More information

Build your own Lightweight Webserver - Hands-on I - Information Network I. Marius Georgescu. Internet Engineering Laboratory. 17 Apr

Build your own Lightweight Webserver - Hands-on I - Information Network I. Marius Georgescu. Internet Engineering Laboratory. 17 Apr Build your own Lightweight Webserver - Hands-on I - Information Network I Marius Georgescu Internet Engineering Laboratory 17 Apr. 2015 iplab Prerequisites Prerequisites Download and Install VirtualBox

More information

Installing Cisco APIC-EM on a Virtual Machine

Installing Cisco APIC-EM on a Virtual Machine About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing

More information

The Basics of Linux Security

The Basics of Linux Security The Basics of Linux Security What every Linux user should know about security Presented at the 2007 Nebraska CERT Conference Adam Haeder Vice President of Information Technology AIM Institute Basic Linux

More information

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Avaya Matrix: Release 3.0 Issue 2 April 2016 April 2016 Avaya Matrix: 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,

More information

Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal

Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal 2012-10-01 what is a process? an abstraction! you can think of it as a program in the midst of

More information

Avaya Port Matrix: Avaya Diagnostic Server 3.0

Avaya Port Matrix: Avaya Diagnostic Server 3.0 Avaya Matrix: Avaya Diagnostic Server 3.0 Issue 2.0 February 208 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER

More information

OS security mechanisms:

OS security mechanisms: OS security mechanisms: Memory Protection: One of the important aspects of Operating system security is Memory Protection. Memory provides powerful indirect way for an attacker to circumvent security mechanism,

More information

Lab #9: Basic Linux Networking

Lab #9: Basic Linux Networking CTEC1767 Data Communications & Networking 2017 Lab #9: Basic Linux Networking Understanding Linux networks starts with understanding Linux network commands and the information they provide. We will use

More information

Change Management: DYNAMIC NETWORK MAPPING. LinuxWorld San Francisco Security Track. Presented by Joshua D. Abraham.

Change Management: DYNAMIC NETWORK MAPPING. LinuxWorld San Francisco Security Track. Presented by Joshua D. Abraham. Change Management: DYNAMIC NETWORK MAPPING LinuxWorld San Francisco Security Track Presented by Joshua D. Abraham August 16th 2006 jabra@ccs.neu.edu Northeastern University Agenda How do we scan? What

More information

Lab 1: Creating Secure Architectures (Revision)

Lab 1: Creating Secure Architectures (Revision) Lab 1: Creating Secure Architectures (Revision) A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For

More information

Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities

Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security Lab guide: Traffic analysis and TCP/IP Vulnerabilities Revised on 2016-10-18 Alpha version: This is an early version and

More information

TELE 301 Lecture 8: Post

TELE 301 Lecture 8: Post Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the

More information

HHC 2017 writeup, by RedTeam611

HHC 2017 writeup, by RedTeam611 HHC 2017 writeup, by RedTeam611 After you complete the terminal challenges in the snowball games you will then move onto the web server challenges. Our first task to is to investigate the Letters to Santa

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Layered Networking and Port Scanning

Layered Networking and Port Scanning Layered Networking and Port Scanning David Malone 22nd June 2004 1 IP Header IP a way to phrase information so it gets from one computer to another. IPv4 Header: Version Head Len ToS Total Length 4 bit

More information

Web Server ( ): FTP, SSH, HTTP, HTTPS, SMTP, POP3, IMAP, POP3S, IMAPS, MySQL (for some local services[qmail/vpopmail])

Web Server ( ): FTP, SSH, HTTP, HTTPS, SMTP, POP3, IMAP, POP3S, IMAPS, MySQL (for some local services[qmail/vpopmail]) The following firewall scripts will help you secure your web and db servers placed on the internet. The scenario is such that the MySQL db server is desired to receive db connections / traffic only from

More information

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?

More information

Removing files and directories, finding files and directories, controlling programs

Removing files and directories, finding files and directories, controlling programs Removing files and directories, finding files and directories, controlling programs Laboratory of Genomics & Bioinformatics in Parasitology Department of Parasitology, ICB, USP Removing files Files can

More information

I/O and Shell Scripting

I/O and Shell Scripting I/O and Shell Scripting File Descriptors Redirecting Standard Error Shell Scripts Making a Shell Script Executable Specifying Which Shell Will Run a Script Comments in Shell Scripts File Descriptors Resources

More information

CS Computer and Network Security: Firewalls

CS Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Patrick Traynor Fall 2017 Reminders Monday: Change of Plans Recording lecture - turn in your rules. Friday: Project Abstract The hardest paragraph

More information

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic Chapter Objectives n Understand how to use appropriate software tools to assess the security posture of an organization Chapter #7: Technologies and Tools n Given a scenario, analyze and interpret output

More information

Advanced Web Programming

Advanced Web Programming Advanced Web Programming 1 Advanced Web Programming what we have covered so far 2 The SocketServer Module simplified development of network servers a server tells clients the time 3 A Forking Server instead

More information

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1 Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018

More information

Process States. Controlling processes. Process states. PID and PPID UID and EUID GID and EGID Niceness Control terminal. Runnable. Sleeping.

Process States. Controlling processes. Process states. PID and PPID UID and EUID GID and EGID Niceness Control terminal. Runnable. Sleeping. Controlling processes PID and PPID UID and EUID GID and EGID Niceness Control terminal 1 Process States Process states Runnable The process can be executed Waiting for CPU Sleeping The process is waiting

More information

Metbox Training Outline LDM Training Metbox overview Break Metbox hands on training

Metbox Training Outline LDM Training Metbox overview Break Metbox hands on training Metbox Training Outline 1300-1430 LDM Training 1430-1500 Metbox overview 1500-1515 Break 1515-1700 Metbox hands on training Metbox Terms Metbox Hardware and software LDM Data management system GEneral

More information

Services and Security

Services and Security Services and Security Find out what's listening to the net Find out what services are running Find out what they do Disable or remove any that you don't need References http://techrepublic.com.com/5100-6270-1053043.html

More information

HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS

HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS How To Securely Configure a Linux Host to Run Containers To run containers securely, one must go through a multitude of steps to ensure that a)

More information

The Linux IPL Procedure

The Linux IPL Procedure The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe

More information

MySQL Performance Troubleshooting

MySQL Performance Troubleshooting MySQL Performance Troubleshooting Best Practices Francisco Bordenave - Architect, Percona Agenda Who am I? Introduction Identifying the source of problem We know where the problem is, now what? Best practices

More information

How To Start Mysql Use Linux Command Line Client In Ubuntu

How To Start Mysql Use Linux Command Line Client In Ubuntu How To Start Mysql Use Linux Command Line Client In Ubuntu Getting started with MySQL for web and server applications on Ubuntu 14.04 LTS (Trusty Tahr). get started with MySQL on an Ubuntu 14.04 LTS (Trusty

More information

SECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System

SECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System SECURITY+ LAB SERIES Lab 3: Protocols and Default Network Ports Connecting to a Remote System Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported

More information

Netfilter. Fedora Core 5 setting up firewall for NIS and NFS labs. June 2006

Netfilter. Fedora Core 5 setting up firewall for NIS and NFS labs. June 2006 Netfilter Fedora Core 5 setting up firewall for NIS and NFS labs June 2006 Netfilter Features Address Translation S NAT, D NAT IP Accounting and Mangling IP Packet filtering (Firewall) Stateful packet

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

RedHat Certified Engineer

RedHat Certified Engineer RedHat Certified Engineer Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an

More information

Security. https://outflux.net/slides/2015/osu-devops.pdf. DevOps Bootcamp, OSU, Feb 2015 Kees Cook (pronounced Case )

Security. https://outflux.net/slides/2015/osu-devops.pdf. DevOps Bootcamp, OSU, Feb 2015 Kees Cook (pronounced Case ) https://outflux.net/slides/2015/osu-devops.pdf, Feb 2015 Kees Cook (pronounced Case ) Who is this guy? Fun: DefCon CTF team won in 2006 & 2007 Debian Ubuntu Jobs: OSDL (proto Linux Foundation)

More information

Fundamentals of Linux Platform Security

Fundamentals of Linux Platform Security Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally

More information

Fundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools

Fundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally

More information

GT Apiary: Remote Honeypots

GT Apiary: Remote Honeypots GT Apiary: Remote Honeypots Undergraduate Special Problem, Summer 2010 George Macon August 4, 2010 a-pi-ar-y n. a place where bees are kept; a collection of beehives. 1 Introduction Honeypots are an important

More information

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 29. Firewalls Paul Krzyzanowski Rutgers University Fall 2015 2013-2015 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive data & systems not accessible Integrity:

More information

JSA Common Ports Lists

JSA Common Ports Lists Juniper Secure Analytics Release 2014.6 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2016-04-21 Copyright Notice Copyright 2016 Juniper

More information