CCDC Linux Handbook William Houde - Mercer University - 3/30/2017

Size: px
Start display at page:

Download "CCDC Linux Handbook William Houde - Mercer University - 3/30/2017"

Transcription

1 CCDC Linux Handbook William Houde - Mercer University - 3/30/ Hardening Checklist 1 2. Reference Log Files Old Repository Archives 7 Ubuntu 7 Debian 7 CentOS Package Management System Information 9 Checking OS Version 9 Hardware Information Useful Repositories 9 CentOS/Red Hat 9 Ubuntu User Accounts and Groups 10 Users 10 Groups 10 Account Creation 13

2 CCDC Linux Handbook!1 1. Hardening Checklist 1. Take a snapshot of the machine. 2. Change the passwords of root and any other administrator account. This can be done using passwd or using a graphical equivalent. No arguments are needed if changing the password for the current user. Don t forget to change passwords for MySQL and other programs! 3. Check /tmp for suspicious files. # ls -la /tmp If the folder is not empty, create an IR report listing what was found and delete everything in /tmp: # rm -rf /tmp/* 4. Check cron jobs for default accounts. # crontab -l USERNAME If there is anything in the crontab, remove it: # crontab -r USERNAME 5. Check for suspicious programs. Run this to see a list of processes: $ ps -eo pid,tty,user,args less Look for programs that are running from a location they should not be in, such as /tmp, / root, or /home. In general, programs should only be in /bin, /opt, /sbin, and /usr. 6. Check for suspicious user accounts. This can be done while ClamAV is running. First, check user groups: $ cat /etc/group sort less Pay special attention to the adm, admin, sudo, root, and wheel groups. Any user that is in a large number of groups should be investigated. Next, check users: $ less /etc/passwd The users in the file are in order of creation. Look for accounts that have names of

3 CCDC Linux Handbook!2 services, such as avahi, that have home directories and login shells they should not have. For example: avahi:x:107:114:avahi mdns daemon,,,:/home/bob:/bin/bash In this example, this account appears to be Avahi, but is really a normal user because it has a standard home directory and a valid login shell. Daemons like Avahi should have their shells set to /bin/false, /sbin/nologin, or /usr/sbin/nologin. Next, check the sudoers file: # less /etc/sudoers The only user specified here should be root and the only groups should be admin and sudo. In addition, make sure that no one is able to use sudo without entering a password. If suspicious users are found, check with management and, if approved, disable the accounts. 7. Create a new user for administrative tasks and give new user admin privileges. This username should probably not be easy to guess as this will be the only account with admin permissions allowed on the system. The new user can be added using adduser or a graphical equivalent. Next, add the new user to the sudoers file: # usermod -a -G sudo USERNAME Use a command with sudo as the new user to verify that sudo works: # su newuser $ sudo whoami 8. Disable root and other default administrators. Run the following command for each user to be disabled and replace USERNAME with the username. # usermod --lock --shell /usr/sbin/nologin --expiredate USERNAME 9. Reboot the system to make sure the disabled accounts are no longer in use. 10. Take a snapshot. 11. Enable additional logging. Enable command logging in auditd: # echo -a exit,always -F arch=b64 -S execve >> /etc/audit/

4 CCDC Linux Handbook!3 audit.rules # echo -a exit,always -F arch=b32 -S execve >> /etc/audit/ audit.rules Auditd will log commands to /var/log/audit/audit.log. Install Snoopy in Debian, Ubuntu, or similar: # apt-get install snoopy Install Snoopy in CentOS, RHEL, or similar (Requires EPEL on CentOS and RHEL): # yum install snoopy Enable snoopy: # Snoopy will log commands to /var/log/secure, /var/log/auth.log, or /var/log/messages. Sudo additional logging? 12. Check running/startup services and disable unnecessary services. Check running services. List services for systemd servers. Running services are indicated under the SUB column: $ systemctl --type=service List services for non-systemd servers. If a service is running, it will have [ + ] label and if it is not running it will be [ - ]: $ service --status-all To stop a running service (works with or without systemd). Note that this only applies until next reboot: # service SERVICE stop Check startup services when systemd is used: # systemctl list-unit-files --type=service Check startup services on non-systemd servers: # chkconfig --list To keep a service from running at boot (both with and without systemd): # chkconfig SERVICE off 13. Configure local firewall. First, set iptables to deny all incoming and allow all outgoing: # iptables -P INPUT DROP

5 CCDC Linux Handbook!4 # iptables -P FORWARD DROP # iptables -P OUTPUT ACCEPT # iptables -A INPUT -i lo -j ACCEPT # iptables -A OUTPUT -o lo -j ACCEPT # iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT Next, add exceptions for necessary ports. Replace PORT with the port number: # iptables -I INPUT -p tcp --dport PORT -j ACCEPT Fedora: 52 (DNS) CentOS: 80 (HTTP), 443 (HTTPS) Ubuntu: 22 (SSH), 25 (SMTP), 110 (POP3), 465 (SMTPS), 995 (POP3S) 14. Check cron jobs for whole system. Create and run the script from here: Look for anything malicious, especially by root. This may include something like rm -rf /. 15. Install and configure fail2ban. # apt-get install fail2ban Or: # yum install fail2ban By default, only SSH is protected. Enable any other necessary filters by adding them in / etc/fail2ban/jail.d/customization.conf. Names of available jails are in /etc/fail2ban/ jail.conf. Example: [sshd] enabled = true Restart fail2ban: # service fail2ban restart If fail2ban fails to start, check the syslog and resolve any issues with the configuration file. 16. Install and run rkhunter. This will check for rootkits, suspicious files, and other vulnerabilities.

6 CCDC Linux Handbook!5 To install on Debian, Ubuntu, or similar: # apt-get install rkhunter To install on Red Hat, CentOS, or similar (Requires EPEL on CentOS and RHEL): # yum install rkhunter Update and run: # rkhunter --update # rkhunter --check 17. Install and run ClamAV. This should hopefully catch any keyloggers or other malware. This will take some time, up to 20 minutes. To install on Debian, Ubuntu, or similar: # apt-get install clamav To install on Red Hat, CentOS, or similar (Requires EPEL on CentOS and RHEL): # yum install clamav Refresh ClamAV database: # freshclam Run ClamAV for whole system: # clamscan -irl clam.log / This command will scan the whole system and put a scan log in clam.log. If any files are detected as infected, fill out an IR form and take appropriate steps to remove infection. 18. Install security updates. Installing only security-related updates will save time over installing all available updates. Debian/Ubuntu: # unattended-upgrades CentOS/Red Hat: # yum update --security 19. Take a snapshot. 20. Apache hardening. Hide Apache version:

7 CCDC Linux Handbook!6 # echo ServerTokens Prod >> /etc/httpd/conf/httpd.conf # echo ServerSignature Off >> /etc/httpd/conf/httpd.conf Hide etags: # echo FileETag None >> /etc/httpd/conf/httpd.conf Disable directory list and prevent settings from being overridden: # vim /etc/httpd/conf/httpd.conf Find the <Directory> headings and do the following: a. Make sure AllowOverride is None. b. Make sure Options contains -Indexes. c. In /, make sure there is a line Deny from all and make sure there is a line Allow from all in /var/www/html. d. Add the following in the / directory section: <LimitExcept GET POST HEAD> Deny from all </LimitExcept> 21. Take a snapshot. 2. Reference 2.1. Log Files Most, but not all, log files are stored in /var/log. Older log files will have a number appended to them (lower is newer) and may be zipped. Zipped files can be opened using several special commands, which act the same as their regular counterparts: zcat, zdiff, zgrep, zless, zmore, znew. Here are some important log files: ~/.bash_history /var/log/apache2/ /var/log/audit/audit.log /var/log/auth.log /var/log/dmesg This file exists in the home directory of each user. Command history is listed chronologically, but without timestamps by default. By default, commands are written at the end of each bash session. Contains authentication (access.log) and error logs (error.log) for the apache web server. Auditd log files. Will include command logs if configured. Lists authentication history for all users, as well as sudo attempts. Startup log. Can also be accessed with the dmesg command. This is what usually appears on the screen during boot.

8 CCDC Linux Handbook!7 /var/log/fail2ban.log /var/log/kern.log /var/log/mail.log /var/log/secure /var/log/syslog General log for fail2ban. Errors when starting fail2ban will appear in syslog instead. Kernal messages, including driver messages. Mail server log. Contains some security messages. Overarching system log. May include messages from auth.log, kern.log, and other programs and services. While this log is the most complete, it may be large enough to make it hard to find specific messages Old Repository Archives Ubuntu Add these three lines to /etc/apt/sources.list: deb CODENAME main restricted universe multiverse deb CODENAME-updates main restricted universe multiverse deb CODENAME-security main restricted universe multiverse Replace CODENAME with the release codename. Codename can be found with: $ lsb_release -a Debian Add these two lines to /etc/apt/sources.list: deb CODENAME main non-free contrib deb CODENAME/updates main non-free contrib Replace CODENAME with the release codename. Codename can be found with: $ lsb_release -a If the above command does not work, use: $ cat /etc/debian_version And use the corresponding codename (in all lowercase): 4.x Etch 6.x Squeeze 8.x Jessie 5.x Lenny 7.x Wheezy

9 CCDC Linux Handbook!8 CentOS Edit /etc/yum.repos.d/centos-base.repo so that the lines that start with mirrorlist are commented out. In the section labeled base, add: baseurl= In the section labeled updates, add: baseurl= Replace VERSION with the version number specified by: $ cat /etc/redhat-release 2.3. Package Management In general, Linux package managers download software from repositories and keeps track of what versions of software are installed and are in the repositories by maintaining a local database. In Debain-based systems apt is generally used with the deb format, while in Red Hat-based systems yum is generally used with the rpm format. While using different package formats is possible, it requires some special conversion. Most, if not all, package management commands require root or sudo. Here s a comparison of basic apt and yum commands: Apt command Yum command Description apt-get update yum check-update Refreshes local database (do this before installing updates) apt-get upgrade yum update Updates installed packages apt-get distupgrade apt-get install PACKAGE apt-get remove PACKAGE apt-get purge PACKAGE apt-cache search PACKAGE dpkg --install PACKAGE.deb yum upgrade yum install PACKAGE rpm -e PACKAGE yum remove PACKAGE yum search PACKAGE rpm -i PACKAGE.rpm Updates installed packages (more thorough; can result in packages being removed) Installs specified package and dependencies Removes specified package Removes specified package and configuration files Searches database for packages with specified name (or part of name) Installs a local package file. Note that the file extension is required.

10 2.4. System Information CCDC Linux Handbook!9 Checking OS Version A general command that should work on most systems: $ lsb_release -a Specific commands for different distributions: $ cat /etc/debian_version $ cat /etc/redhat-release Note that the version number listed next to the distribution name in /proc/version is not the OS version number. Hardware Information # lshw less This program might not be installed by default on all systems, but should be available in the repositories Useful Repositories CentOS/Red Hat Extra Packages for Enterprise Linux (EPEL): EPEL contains useful packages included in Fedora s repositories, but not RHEL and CentOS repositories. Use the following to enable: # yum install epel-release Ubuntu Personal Package Archives (PPAs): PPAs are easy-to-add repositories for Ubuntu that can contain useful software or updates. However, since anyone can create PPAs, be careful when using them; they are quite capable of breaking system packages and can in theory be malicious. All PPAs are hosted at launchpad.net. Installing a PPA is done with a command like this: # add-apt-repository ppa:ppacreator/ppaname

11 2.6. User Accounts and Groups CCDC Linux Handbook!10 User accounts are listed in /etc/passwd, hashed passwords in /etc/shadow, and groups in /etc/ group. Users Creating a user: # adduser USERNAME Disabling a user: # usermod --lock --shell /usr/sbin/nologin --expiredate USERNAME Re-enable a user: # usermod --unlock --shell /bin/bash --expiredate USERNAME Delete a user (Disable instead!): # userdel USERNAME Groups Creating a group: # groupadd GROUPNAME Adding a user to a group: # usermod -a -G GROUPNAME USERNAME Removing a user from a group: # gpasswd -d USERNAME GROUPNAME Set group as primary for user: # usermod -g GROUPNAME USERNAME Show groups a user is in: # groups USERNAME Delete a group: # groupdel GROUPNAME

12 CCDC Linux Handbook!11 #!/bin/bash # System-wide crontab file and cron job directory. Change these for your system. CRONTAB='/etc/crontab' CRONDIR='/etc/cron.d' tab=$(echo -en "\t") function clean_cron_lines() { while read line ; do echo "${line}" egrep --invert-match '^($ \s*# \s*[[:alnum:]_]+=)' sed --regexp-extended "s/\s+/ /g" sed --regexp-extended "s/^ //" done; } function lookup_run_parts() { while read line ; do match=$(echo "${line}" egrep -o 'run-parts (-{1,2}\S+ )*\S+') if [[ -z "${match}" ]] ; then echo "${line}" else cron_fields=$(echo "${line}" cut -f1-6 -d' ') cron_job_dir=$(echo "${match}" awk '{print $NF}') } if [[ -d "${cron_job_dir}" ]] ; then for cron_job_file in "${cron_job_dir}"/* ; do # */ <not a comment> [[ -f "${cron_job_file}" ]] && echo "${cron_fields} ${cron_job_file}" done fi fi done; temp=$(mktemp) exit 1 # Add all of the jobs from the system-wide crontab file. cat "${CRONTAB}" clean_cron_lines lookup_run_parts >"${temp}" # Add all of the jobs from the system-wide cron directory. cat "${CRONDIR}"/* clean_cron_lines >>"${temp}" # */ <not a comment> # Add each user's crontab (if it exists). Insert the user's name between the # five time fields and the command.

13 while read user ; do crontab -l -u "${user}" 2>/dev/null clean_cron_lines sed --regexp-extended "s/^((\s+ +){5})(.+)$/\1${user} \3/" >>"${temp}" done < <(cut --fields=1 --delimiter=: /etc/passwd) # Output the collected crontab lines. Replace the single spaces between the # fields with tab characters, sort the lines by hour and minute, insert the # header line, and format the results as a table. cat "${temp}" sed --regexp-extended "s/^(\s+) +(\S+) +(\S+) +(\S+) +(\S+) +(\S+) +(.*)$/ \1\t\2\t\3\t\4\t\5\t\6\t\7/" sort --numeric-sort --field-separator="${tab}" --key=2,1 sed "1i\mi\th\td\tm\tw\tuser\tcommand" column -s"${tab}" -t rm --force "${temp}" CCDC Linux Handbook!12

14 CCDC Linux Handbook!13 Account Creation First, open a root shell. This script can t be run using sudo. $ sudo su Create the following as a new text file (with a.sh extension) and mark it executable. There should be 5 lines total (excluding any comments). Alternatively, these can be run as commands, but will be harder to edit when they are mistyped. curl -s Phone-Roster.docx > halphone.docx; unzip -p halphone.docx word/document.xml > halphone.xml; cat halphone.xml perl -pe 's/<.*?<w:t>alphabetical.*?>//; s/<.*? Extension//; s/.*?<w:tbl>//; s/<\/w:tbl>.*?<\/w:document>//; s/<\/ w:p>/\n/g; s/<.*?>//g; s/\r$ \n$//g; s/^\n//; s/\n/:/g; s/(?<=[0-9]):/ \n/g;' > halphone; # Remove whoever is not present printf "\nviera:bruno:::\nhoude:william:::\njackson:jerome::: \nmamey:fabunde:::\noakes:jonathan:::\nowen:zachary::: \nrasmuson:nicholas:::\nrogers:charles:::\nrogers:steve:::" >> halphone; awk 'BEGIN{FS=":";IGNORECASE=1};{gsub(/[,.]/,"")};{print substr(tolower(substr($2,1,1))tolower($1 "000000"),1,8)}' halphone > halusers Next, check the halphone file to make sure everything is correct. Be sure to make sure that names with Jr and Sr are properly formatted. Finally, add the users: # while read line; do useradd -s /bin/bash "$line"; echo "$line:mc8hme3#vx" chpasswd; passwd -e "$line"; done < halusers

Linux Kung Fu. Stephen James UBNetDef, Spring 2017

Linux Kung Fu. Stephen James UBNetDef, Spring 2017 Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and

More information

Introduction. What is Linux? What is the difference between a client and a server?

Introduction. What is Linux? What is the difference between a client and a server? Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions

More information

The Wonderful World of Services VINCE

The Wonderful World of Services VINCE The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services

More information

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017 Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Linux Kung-Fu. James Droste UBNetDef Fall 2016

Linux Kung-Fu. James Droste UBNetDef Fall 2016 Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

Some Ubuntu Practice...

Some Ubuntu Practice... Some Ubuntu Practice... SANOG 10 August 29 New Delhi, India 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control services

More information

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03.

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03. Laboratory Exercises: ===================== Complete the following laboratory exercises. All steps are numbered but not every step includes a question. You only need to record answers for those steps that

More information

HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS

HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS How To Securely Configure a Linux Host to Run Containers To run containers securely, one must go through a multitude of steps to ensure that a)

More information

Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018

Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 This guide will help you download and install IBM Db2 software, Data

More information

Applies to: SECURE WEB Version 1.3 and above

Applies to: SECURE WEB Version 1.3 and above Apr. 4, 2008 Applies to: SECURE WEB Version 1.3 and above This document provides step by step instructions on how to install, activate and configure anti virus scanning in CYAN SECURE WEB using the ClamAV

More information

Post Ubuntu Install Exercises

Post Ubuntu Install Exercises Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control

More information

iptables and ip6tables An introduction to LINUX firewall

iptables and ip6tables An introduction to LINUX firewall 7 19-22 November, 2017 Dhaka, Bangladesh iptables and ip6tables An introduction to LINUX firewall Imtiaz Rahman SBAC Bank Ltd AGENDA iptables and ip6tables Structure Policy (DROP/ACCEPT) Syntax Hands on

More information

CounterACT Macintosh/Linux Property Scanner Plugin

CounterACT Macintosh/Linux Property Scanner Plugin CounterACT Macintosh/Linux Property Scanner Plugin Version 7.0.1 and Above Table of Contents About the Macintosh/Linux Property Scanner Plugin... 4 Requirements... 4 Supported Operating Systems... 4 Accessing

More information

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking

More information

Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand

Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Update /etc/apt/sources.list

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Dell EMC ME4 Series vsphere Client Plug-in

Dell EMC ME4 Series vsphere Client Plug-in Dell EMC ME4 Series vsphere Client Plug-in User's Guide Regulatory Model: E09J, E10J, E11J Regulatory Type: E09J001, E10J001, E11J001 Notes, cautions, and warnings NOTE: A NOTE indicates important information

More information

Check List: Linux Machines

Check List: Linux Machines Check List: Linux Machines High Level Install and maintain malware protection software o Install MalWare (Defender) o Install AntiVirus (Microsoft Security Essentials) Account Management o Remove guest

More information

Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018

Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 This guide will help you download and install IBM Db2 software,

More information

More Raspian. An editor Configuration files Shell scripts Shell variables System admin

More Raspian. An editor Configuration files Shell scripts Shell variables System admin More Raspian An editor Configuration files Shell scripts Shell variables System admin Nano, a simple editor Nano does not require the mouse. You must use your keyboard to move around the file and make

More information

Working with Ubuntu Linux. Track 2 Workshop June 2010 Pago Pago, American Samoa

Working with Ubuntu Linux. Track 2 Workshop June 2010 Pago Pago, American Samoa Working with Ubuntu Linux Track 2 Workshop June 2010 Pago Pago, American Samoa Assumptions You are comfortable with the following: Core Linux concepts - Shells - Permissions - Graphical user interface

More information

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically

More information

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with

More information

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time.

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. Running your own server lets you play together with your friends and family with your own set

More information

CENG 334 Computer Networks. Laboratory I Linux Tutorial

CENG 334 Computer Networks. Laboratory I Linux Tutorial CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction

More information

HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke

HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS Or something broke Securing your VM 101 Getting Comfy in Linux -> Comfort ++ You After This Talk Quick recap from last week. Setup

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions 1Z0-100 Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-100 Exam on Oracle Linux 5 and 6 System Administration2 Oracle 1Z0-100 Certification

More information

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version Redhat Basic Operation G U I D E What Need Your www.next-asia.com Readhat Basic Operation Guide, Prepared by Nazmul Khan Page 1 of 43 Redhat Basic Operation Guide RedHat Installation Guide... 2 Installation...

More information

UNIT 10 Ubuntu Security

UNIT 10 Ubuntu Security AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon

More information

Unix / Linux Overview

Unix / Linux Overview Unix / Linux Overview Jonathan Brewer Network Startup Resource Center jon@nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

User & Group Administration

User & Group Administration User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process

More information

How to Restrict a Login Shell Using Linux Namespaces

How to Restrict a Login Shell Using Linux Namespaces How to Restrict a Login Shell Using Linux Namespaces Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using

More information

Purpose. Target Audience. Install SNMP On The Remote Linux Machine. Nagios XI. Monitoring Linux Using SNMP

Purpose. Target Audience. Install SNMP On The Remote Linux Machine. Nagios XI. Monitoring Linux Using SNMP Purpose This document describes how to monitor Linux machines with using SNMP. SNMP is an agentless method of monitoring network devices and servers, and is often preferable to installing dedicated agents

More information

OPERATING SYSTEMS LINUX

OPERATING SYSTEMS LINUX OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code

More information

MIS Week 10. Operating System Security. Unix/Linux basics

MIS Week 10. Operating System Security. Unix/Linux basics MIS 5170 Operating System Security Week 10 Unix/Linux basics Tonight s Plan 2 Questions from Last Week Review on-line posts In The News Download Kali Install Kali Unix/Linux Basics Scripting Appropriate

More information

Everything about Linux User- and Filemanagement

Everything about Linux User- and Filemanagement Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No Source: http://en.wikipedia.org/wiki/file:firewall.png This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations

More information

The kernel is the low-level software that manages hardware, multitasks programs, etc.

The kernel is the low-level software that manages hardware, multitasks programs, etc. November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains

More information

Quick Start Guide for Integrating Ziften Zenith and Microsoft Windows Defender ATP

Quick Start Guide for Integrating Ziften Zenith and Microsoft Windows Defender ATP Quick Start Guide for Integrating Ziften Zenith and Microsoft Windows Defender ATP Ziften and Microsoft have agreed to a technical partnership in which Ziften s Zenith platform is able to integrate in

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System

More information

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016 Linux Systems Security Logging and Network Monitoring NETS1028 Fall 2016 Monitoring Monitoring can take many forms, from passive periodic inspection to realtime intrusion detection For this unit, we will

More information

Introduction to Linux. Roman Cheplyaka

Introduction to Linux. Roman Cheplyaka Introduction to Linux Roman Cheplyaka Generic commands, files, directories What am I running? ngsuser@ubuntu:~$ cat /etc/lsb-release DISTRIB_ID=Ubuntu DISTRIB_RELEASE=16.04 DISTRIB_CODENAME=xenial DISTRIB_DESCRIPTION="Ubuntu

More information

Setting up a Chaincoin Masternode

Setting up a Chaincoin Masternode Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version

More information

OBSERVEIT CLOUDTHREAT GUIDE

OBSERVEIT CLOUDTHREAT GUIDE OBSERVEIT CLOUDTHREAT GUIDE Contents 1 About This Document... 2 1.1 Intended Audience... 2 1.2 Related ObserveIT Software and Documentation... 2 1.3 Support... 2 2 Product Overview... 3 3 Installing the

More information

Server virtualiza,on and security. CSCI 470: Web Science Keith Vertanen

Server virtualiza,on and security. CSCI 470: Web Science Keith Vertanen Server virtualiza,on and security CSCI 470: Web Science Keith Vertanen Mo*va*on Virtualiza*on Overview Setup process (DigitalOcean) Securing a new Ubuntu VM So

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following

More information

Check the FQDN of your server by executing following two commands in the terminal.

Check the FQDN of your server by executing following two commands in the terminal. LDAP or Lightweight Directory Access Protocol, is a protocol designed to manage and access related information in a centralized, hierarchical file and directory structure. An LDAP server is a non-relational

More information

System Requirements ENTERPRISE

System Requirements ENTERPRISE System Requirements ENTERPRISE Hardware Prerequisites You must have a single bootstrap node, Mesos master nodes, and Mesos agent nodes. Bootstrap node 1 node with 2 cores, 16 GB RAM, 60 GB HDD. This is

More information

UNIT 9 Introduction to Linux and Ubuntu

UNIT 9 Introduction to Linux and Ubuntu AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 9 Introduction to Linux and Ubuntu Learning Objectives Participants will understand the basics of Linux, including the nature,

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Endpoint Module: Linux Plugin Version 1.2 Table of Contents About This Plugin... 4 Accessing and Managing Endpoints... 4 Remote Inspection... 4 SecureConnector... 5 What to Do... 5

More information

"Charting the Course... MOC B: Linux System Administration. Course Summary

Charting the Course... MOC B: Linux System Administration. Course Summary Description Course Summary This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. The course covers

More information

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014 SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014 Introduction The expectation is that you will either have a virtual machine to use, or that you will revert any changes made to your machine

More information

Installation Guide. Connection Broker. Advanced Capacity and Connection Management for Hybrid Clouds

Installation Guide. Connection Broker. Advanced Capacity and Connection Management for Hybrid Clouds Installation Guide Connection Broker Advanced Capacity and Connection Management for Hybrid Clouds Version 9.0 October 2018 Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley

More information

To find all files on your file system that have the SUID or SGID bit set, execute:

To find all files on your file system that have the SUID or SGID bit set, execute: File System Security Checks There are certain files whose presence in the Linux file system can present a security risk and should be remedied as soon as possible. When the SUID (set user ID) or SGID (set

More information

Dockerfile Best Practices

Dockerfile Best Practices Dockerfile Best Practices OpenRheinRuhr 2015 November 07th, 2015 1 Dockerfile Best Practices Outline About Dockerfile Best Practices Building Images This work is licensed under the Creative Commons Attribution-ShareAlike

More information

INTRODUCTION TO LINUX

INTRODUCTION TO LINUX INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free

More information

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:

More information

ForeScout CounterACT Linux Plugin

ForeScout CounterACT Linux Plugin ForeScout CounterACT Linux Plugin Version 1.1.0 Table of Contents About This Plugin... 4 Accessing and Managing Endpoints... 4 Remote Inspection... 4 SecureConnector... 5 What to Do... 5 Requirements...

More information

Using RANCID. Contents. 1 Introduction Goals Notes Install rancid Add alias Configure rancid...

Using RANCID. Contents. 1 Introduction Goals Notes Install rancid Add alias Configure rancid... Using RANCID Contents 1 Introduction 2 1.1 Goals................................. 2 1.2 Notes................................. 2 2 Install rancid 2 2.1 Add alias............................... 3 2.2 Configure

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online

More information

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer

More information

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3] 1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik

More information

RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux

RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux Version 1.1 October 2017 1 Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 5 Configuration... 5 General...

More information

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users

More information

User accounts and authorization

User accounts and authorization User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents

More information

Step 1 - Install Apache and PostgreSQL

Step 1 - Install Apache and PostgreSQL How to install OTRS (Open Source Trouble Ticket System) on Ubuntu 16.04 Prerequisites Ubuntu 16.04. Min 2GB of Memory. Root privileges. Step 1 - Install Apache and PostgreSQL In this first step, we will

More information

Linux. An introduction. Aurélien Villani 01/2018

Linux. An introduction. Aurélien Villani 01/2018 Linux An introduction Aurélien Villani 01/2018 Linux? 2 References Somewhere on the baie-lgf, are some Linux books. 3 Linux? A kernel... 1991: released by Linus Torvalds, for fun 1993: 100 developers working

More information

Exam LFCS/Course 55187B Linux System Administration

Exam LFCS/Course 55187B Linux System Administration Exam LFCS/Course 55187B Linux System Administration About this course This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux

How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux How much memory users uses in GNU / Linux and FreeBSD - Commands and Scripts to find user memory usage on Linux Author : admin If you have to administrate a heterogenous network with Linux and FreeBSD

More information

User Accounts. The Passwd, Group, and Shadow Files

User Accounts. The Passwd, Group, and Shadow Files User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.

More information

Introduction to Linux (Part I) BUPT/QMUL 2018/03/14

Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Contents 1. Background on Linux 2. Starting / Finishing 3. Typing Linux Commands 4. Commands to Use Right Away 5. Linux help continued 2 Contents 6.

More information

RSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux

RSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux RSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux Version 1.1 October 2017 Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 Configuration... 5 General...

More information

Using RDP with Azure Linux Virtual Machines

Using RDP with Azure Linux Virtual Machines Using RDP with Azure Linux Virtual Machines 1. Create a Linux Virtual Machine with Azure portal Create SSH key pair 1. Install Ubuntu Bash shell by downloading and running bash.exe file as administrator.

More information

Linux crash lecture by Andrey Lukyanenko

Linux crash lecture by Andrey Lukyanenko Linux crash lecture by Andrey Lukyanenko T-110.5102 Laboratory Works in Networking and Security 20.1.2015 Otaniemi based on material of Miika Komu, 2013 Traversing Directories cd Change Directory Change

More information

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood

More information

L.A.M.P. Stack Part I

L.A.M.P. Stack Part I L.A.M.P. Stack Part I By George Beatty and Matt Frantz This lab will cover the basic installation and some configuration of a LAMP stack on a Ubuntu virtual box. Students will download and install the

More information

106 M/C Questions -1-1 Minute Per Question. 106 M/C Questions -2-1 Minute Per Question

106 M/C Questions -1-1 Minute Per Question. 106 M/C Questions -2-1 Minute Per Question 106 M/C Questions -1-1 Minute Per Question PRINT Name: LAB Section: Test Version: 620 One-Answer Multiple Choice 106 Questions 15 of 15% Read all the words of these instructions and both sides (back and

More information

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

Preparing for the Prime Home Installation

Preparing for the Prime Home Installation Prerequisites and Verifications, page 1 Verify Default OS Configurations, page 1 Additional OS Configurations, page 7 Prerequisites and Verifications Before installing Prime Home, verify that the servers

More information

User Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC)

User Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC) User Management René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Lectures 1 System administration introduction 2 Operating System installation 3 User

More information

Security principles Host security

Security principles Host security Security principles Host security These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host Security:

More information

BPPM Patrol Agent Installation Steps on Linux and Automation Integration

BPPM Patrol Agent Installation Steps on Linux and Automation Integration BPPM Patrol Agent Installation Steps on Linux and Automation Integration Author: Karlis Peterson, Software Consultant, BMC Software Version: 1.0 Date: May 12, 2013 DISCLAIMER NOTICE This is Field Developed

More information

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year! ITDUMPS QUESTION & ANSWER Accurate study guides, High passing rate! IT dumps provides update free of charge in one year! HTTP://WWW.ITDUMPS.COM Exam : 1Z0-100 Title : Oracle Linux 5 and 6 System Administration

More information

*nix Crash Course. Presented by: Virginia Tech Linux / Unix Users Group VTLUUG

*nix Crash Course. Presented by: Virginia Tech Linux / Unix Users Group VTLUUG *nix Crash Course Presented by: Virginia Tech Linux / Unix Users Group VTLUUG Ubuntu LiveCD No information on your hard-drive will be modified. Gives you a working Linux system without having to install

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

Table of Contents. Table of Contents License server installation guide - Linux. Download SCL

Table of Contents. Table of Contents License server installation guide - Linux. Download SCL Table of Contents Table of Contents License server installation guide - Linux Download SCL Download Synopsys Installer Install SCL - RHEL and CentOS Install SCL - Debian and Ubuntu Customizing the License

More information

Communication protocols and services

Communication protocols and services This chapter describes various protocols and that may be enabled on Modberry. SSH Connection SSH service is started up on boot and already preinstalled and configured. You may access your device through

More information

Project #3: Implementing NIS

Project #3: Implementing NIS Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow

More information

SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting

SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting Synopsis: This is the second System Administration class, a follow-on class for new administrators with limited networking

More information