Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07
|
|
- Claribel Hancock
- 6 years ago
- Views:
Transcription
1 0Handouts:
2 Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to log on to your partner's system as root. This attempt should fail, because the /etc/securetty file disallows it. 2. Make a copy of the /etc/securetty file: host# cp /etc/securetty /etc/securetty.orig 3. Now, move the /etc/securetty file to the /root directory: host# mv /etc/securetty /root/securetty 4. Make sure that the /etc/securetty file no longer exists. 5. Have your partner log on to your system directly as root. Was he or she successful? 6. Now, move the /root/securetty file back to /etc/securetty.
3 Optional Lab 1-2: Denying Telnet access using the /etc/nologin file In this lab, you will use another PAM element, the /etc/nologin file, to deny Telnet access. 1. Use touch to create a file named /etc/nologin. 2. Enter the following text: ********************************************* Access denied. Contact your Security Manager. ********************************************* 3. Using a non-root account, try to access this system using Telnet. 4. Have your partner try to access your system. 5. With your /etc/nologin file still present, open an FTP session to your partner's server. 6. Notice that the session is successful because the nologin file applies only to Telnet-based logon sessions. 7. When you are finished experimenting, delete the /etc/nologin file.
4 Optional Lab 2-1: Pruning users and determining system state in Linux 1. Boot into Linux and log on as root. 2. Use the /usr/sbin/useradd program to add the following users: sales marketing1 marketing2 3. Use the passwd command to create passwords for each user. 4. Log in as root and change to the /etc/home directory. 5. Notice that home directories have been created for the sales and marketing users. 6. Log out as root and log in as these users. 7. Log out and log back in as root. 8. As root, use the /usr/sbin/userdel command to remove the sales user: /usr/sbin/userdel 9. The sales user has been removed. Change to the /home/ directory. You should still see the home directory for the sales user. Still in the /home/ directory, issue the following command: rm -fr sales Warning: Be extremely careful when using the -fr options with the rm command. These options cause the rm command to delete everything you specify. For example, rm will delete all files, directories and sub-directories. 10. Still as root, use the /usr/sbin/userdel -r command to remove the marketing1 and marketing2 users: /usr/sbin/userdel -r marketing1 /usr/sbin/userdel -r marketing2 11. List the /home/ directory. You will see that these user directories are no longer present.
5 12. Still as root, add a group: /usr/sbin/groupadd ciw 13. Delete this group: /usr/sbin/groupdel ciw 14. Now, read your hard drive s configuration: cat /etc/fstab 15. Consider saving this information so that you know the system s original state. 16. To discover the open processes on your system, issue the following command: ps aux > processes.txt 17. Use the less command to view this file: less processes.txt 18. Scroll up and down this file using the up and down arrow keys on your keyboard. When you are finished viewing these processes, press q. 19. Now, have a partner log in to your system and run the top command. 20. While your partner is logged in, issue the following command: ps aux > processes2.txt 21. You now have two files that are essentially snapshots of your system s state. The /usr/bin/diff command compares the contents of two files to determine the differences between the two. Issue the following command: /usr/bin/diff processes processes2 22. What do these files tell you about how your system state has changed? 23. System modules allow your Linux system to use NICs, sound cards, and other devices. You do not want anyone to install additional modules without your permission. The fact that additional modules have been installed could point to illicit activity. You should create a baseline that allows you to determine what modules are installed. Now, use the /sbin/lsmod command to view the modules currently installed on your system. Now, issue the following command to store this information: /sbin/lsmod > modules.info
6 24. Now you can run lsmod in the future and compare the output to this file. 25. Now, use the lsof command to list all open files on the system: /usr/sbin/lsof less 26. Because Linux treats everything as if it were a file, the lsof command lists open processes, files and even network connections. Scroll down the file by pressing the down arrow key. If you want to scan this list quickly, press the space bar to have the less command scroll down the information a screen at a time. 27. When you are finished, press q. 28. The lsof command is quite versatile. For example, you can list files opened by a specific user. Create an account named lsoftest, give it a password, and have your partner log in to your system using this account. After your partner has logged in, issue the following command: lsof ulsoftest less 29. You should see a list of all files (including modules, login files, and terminals) that this user has opened, simply because this user has logged in. 30. You can also see the activity associated with an IP address. For example, suppose your system s IP address is To view all activity emanating from , you would issue the following command: lsof -i@ Now, use this command to trace the changes your partner s connection makes to your system s state. Note: You can also check for Ipv6 addresses: lsof -i@[0:1:2:3:4:5:6:7] 31. You can also use lsof to see remote connections to a port on your host. Have your partner connect to your system using Telnet. Start the Telnet daemon, if necessary. When your partner has connected, issue the following command: lsof -i TCP@partner sipaddress The above lists all TCP-based connections from your partner's system to your own system.
7 32. To terminate any connection to an IP address, you can use lsof in conjunction with the kill command to instantly log off any user. Make sure your partner is logged on, then try the following command: kill -9 `/usr/sbin/lsof Note: You must use the backtic character (`) and not the apostrophe character. The backtic character is above the TAB key. This command will terminate all logged-in users from the remote system with the IP address of You can learn more about how to create additional lsof commands by consulting its man page. 33. Now, use the find command to search and list the writeable files on your system: find /! -type l \( -perm \) -exec ls -l {} \; Note: This command has find search the root directory (/) for all files that are world-readable and -writeable (i.e., any file that has both the read and write bit set for all users). It then lists those files (-exec ls). The final expressions are essential to the exec option. Issue the man find command for additional information. 34. To list only files in the /root/ directory, you can modify the command as follows: find /root/! -type l \( -perm \) -exec ls -l {} \; 35. To save this information to a file, you would issue the following command: find /root/! -type l \( -perm \) -fls save.txt In this lab, you learned how to prune users and groups, as well as how to document the state of your Linux system.
8 Optional Lab 2-2: Renaming default Windows 2000 accounts 1. Log on to Windows Open the Local Security Policy snap-in. 3. In the Security Settings Local Policies Security Options section, select the Rename administrator account value. 4. Enter root into the Local policy setting dialog box, then click OK. 5. Log off and try to log back on as administrator. You will not be able to do so. Log on as root, then open the Computer Management snap-in to verify that the administrator account has been completely renamed. 6. When you are finished, change the Rename administrator account value to administrator, so that the system is back to its default. This step is necessary to prevent confusion in future labs. 7. Using the Security Policy snap-in, rename the guest account.
9 Optional Lab 2-3: Creating a second root account in Linux In this lab, you will create a second account that has root privileges. You cannot completely remove the root account without affecting the daemons that run on the system. However, you can create a second root account for login purposes. 1. Boot into Linux and log in as root. 2. Make a copy of the /etc/passwd file and name it /etc/passwd.orig. This step is necessary in case something goes wrong, and also because you will need to return your system to its default to avoid problems in future labs: host# cp /etc/passwd /etc/passwd.orig 3. Use the /usr/sbin/useradd and /usr/bin/passwd commands to create a new user named administrator: /usr/sbin/useradd administrator /usr/bin/passwd administrator 4. Now, edit the /etc/passwd file so that the root entry reads as follows: root:x:0:0:root:/root:/bin/false 5. Edit the administrator entry so that it reads as follows: administrator:x:0:0::/home/administrator:/bin/bash 6. Close the /etc/passwd file, making sure to save your changes. 7. Log out and try to log back in as root. You will not be able to do so. However, all system daemons can still use the root account. You have simply disabled all terminal access to the root account. 8. Log in as administrator. Stop a few services and add a few users. You will be able to do so, because your administrator account is now defined as the "root" account. Remember, daemons do not look for the text string of "root." They look for the UID of the user who is administering the service. Note: For the sake of convenience, you may want to modify the environment of this new account so that it behaves like that of the root account. For example, compare the.bashrc and.bash_profile files for each account to see the changes you will have to make. Note also that if you want to use the su command, you will have to specify the new root account. For example, type su administrator, instead of just su.
10 9. To avoid confusion in future labs, replace the existing /etc/passwd file with the original: host# cp /etc/passwd.orig /etc/passwd Note: Failure to perform this last step may cause problems in future labs.
11 Optional Lab 3-1: Copying and moving files In this lab, you will move and copy files between two Windows 2000 partitions. After the files are copied or moved, you will determine how these changes affect the files' security settings. Note: To perform this lab, you must have two partitions on your hard drive. 1. Log on as administrator. Note: If you have renamed the administrator account earlier and not changed this value back to the default, then log on using the proper account name. 2. Using Windows Explorer, create a folder called Source in the C:\ folder. 3. Create a folder called Dest1 in the C:\ folder. 4. Create a folder called Dest2 in the D:\ folder. 5. Assign Full Control access of C:\Source to Group1. 6. Remove the Everyone group access from C:\Source. 7. Assign Full Control access of C:\Dest1 to Group2. 8. Remove the Everyone group access from C:\Dest1. 9. Assign Read access of D:\Dest2 to Group Remove the Everyone group access from D:\Dest Create a file called Test1.Txt in C:\Source. 12. Create a file called Test2.Txt in C:\Source. 13. Create a file called Test3.Txt in C:\Source. 14. Create a file called Test4.Txt in C:\Source. 15. Examine the permissions for all of the test files in C:\Source. 16. Open a Command Prompt. 17. Using your command prompt, access the C:\Source directory. 18. Copy Test1.Txt to C:\Dest1.
12 19. Move Test2.Txt to C:\Dest Copy Test3.Txt to D:\Dest Move Test4.Txt to D:\Dest2 using the following command: move test4.txt d:\dest2 22. Using Windows Explorer, note the permissions on each test file in C:\Dest1 and D:\Dest2.
13 Optional Lab 3-2: Finding setuid and setgid programs in your Linux system 1. Try the following command and search for setuid/setgid commands available on your system: host# find / \( -perm \) -exec ls -l {} \; Note: In the preceding command, the find command is told to search the root directory (i.e., the entire hard drive), which is known in UNIX systems as /. The first \ and / characters escape the -perm from the shell. The + sign has the find function search for files that have setuid permissions or higher. If these characters were not present, the find command would fail. The -exe command has find then use the ls -l command. The {} \; characters tell find to use the ls -l command to provide a long listing of the files that it finds. 2. If you want to discover both setuid/setgid and files that have at least read permission bits set in the Other field, you would enter the following command: host# find / \( -perm o -perm \) -exec ls -l {} \; Note: The preceding command is similar to that in Step 1, except that it uses the -o command, which searches for permissions of 4000 or greater (setuid/setgid) or 2000 or greater. As a result, you will see files that have bits set in the Other field, as well as any setuid or setgid bits. 3. Graphical Linux tools exist to help you issue some simplified find commands. One is called kfind, and is part of the KDE desktop. If you have the KDE desktop installed, open a terminal in the X Window environment and issue the following command: kfind &
14 4. When the kfind GUI appears, have kfind search all files on the system. Make sure the Name&Location is selected, enter an asterisk in the Named field, and a forward slash in the Look in field, as shown in Figure OL3-1. Figure OL3-1: Selecting all system files in kfind 5. Select the Advanced tab and select the SUID executable files option. 6. Click the start button ( ). 7. After the search is complete, you will see a list of SUID executable files, as shown in Figure OL3-2. Figure OL3-2: Listing suid executable files in kfind
15 Optional Lab 4-1: Installing setup files for the Linux Security Analyzer agent on Windows 2000 In this lab, you will install the Linux Red Hat 7.0 agent setup files on Windows Although the agents appear to be written for Linux 6.0, they will work for any version of Red Hat between 6.0 and 7.0. After you install the agent setup files on Windows 2000, you will install them on your partner's Linux system in the next lab. Note: One partner in each group should complete this lab. The system must have the FTP service running. If you were using Windows NT 4.0, you would also need the Windows NT 4.0 Option Pack, because an FTP server is the most convenient way to transfer files between your NT and Linux systems. 1. Desktop: Open Windows Explorer. Access the WebTrends Security Analyzer Agent for Red Hat Linux installation file (AgentLinux60.exe) from your instructor or download it from To install the Linux agent, double-click the AgentLinux60.exe file. 2. Select OK at the Linux Agent Setup Install window to begin the process. The Linux agent setup files will install on Windows Note: In the next part of this lab, you will copy the Linux agent setup files to your FTP server. 3. Open Windows Explorer, if necessary. 4. Copy the file wsa_agent-3.5.linux60.i586.rpm from the default installation directory: C:\Program Files\WebTrends Security Analyzer\wsa_agents\Linux60\ to the following directory: C:\Inetpub\ftproot\ 5. Close Windows Explorer.
16 Optional Lab 4-2: Installing and configuring a Security Analyzer Linux Agent In this lab, you will install and configure a Security Analyzer Linux Agent on your partner's system. Note: One partner in each group should complete this lab in Linux. The Linux system will access the agent setup files from the Windows 2000 system's FTP service. 1. Linux: Log on as root. 2. Linux: At the prompt, enter the following commands: Host# ftp [partner's IP address] Name: anonymous Password: ftp ftp> bi ftp> get wsa_agent-3.5.linux60.i586.rpm ftp> bye 3. Linux: Enter the following command in the same directory as the WebTrends agent you just downloaded. Verify that the file exists in the current directory by entering: Host# ls You will see the following file among several others: wsa_agent-3.5.linux60.i586.rpm 4. Linux: Enter the command: Host# rpm -ivh wsa_agent-3.5.linux60.i586.rpm
17 You will receive a message to run the configure.sh command in the /usr/local/wsa directory. However, you must first create an agent.dat file. To accomplish these procedures, run the commands: Host# cd /usr/local/wsa Host# touch agent.dat Host#./configure.sh 5. Enter Y to start the server at system startup. Enter Y to start the agent now.
18 Optional Lab 4-3: Scanning a Linux system from Windows Console In this lab, you will scan the Linux agent from the Security Analyzer Console. 1. Add a new profile by selecting File New profile. Note: If you are using the demo version, you should delete the "Intermediate Security Analysis" profile because the demo version allows only six profiles. 2. In the Profile Description field, enter Partner Computer. In the Security Test Policy section, select Critical Security Analysis, as shown in Figure OL4-1. Figure OL4-1: Adding new profile 3. Select Next. In the Hosts To Scan section, click the Add button. Enter your partner's IP address (the system with the Linux agent installed) in the Starting address field. Click OK. You will scan only one host in this lab. 4. Click Finish. The Partner Computer profile you have created will appear in the Security Analyzer window. 5. Select the Partner Computer profile and click Scan. Choose the New Scan radio button and select OK. The scan will take several minutes. A new window titled WSA Partner Computer will display the results. 6. Select the Vulnerabilities tab, which will display the security risks on your partner's Linux system. Scroll through the high-risk vulnerabilities on your
19 partner's system. If none exist, open the medium- and low-risk vulnerabilities. In some cases, you may receive only one risk: the low-risk vulnerability SMTP service enabled. 7. Select the Fixes Needed tab. A list of recommendations to secure your system from high-risk vulnerabilities appears. You may receive only one fix: Remove Unnecessary Services: SMTP. In the next lesson, you will implement this fix and other recommendations to secure Linux systems. 8. Close the WSA Partner Computer window. 9. Create a report and analyze the results. 10. When you are finished, exit the WebTrends Security Analyzer.
20 Optional Lab 5-1: Using Bastille In this lab, you will use the latest version of Bastille appropriate to your version of Linux. This lab assumes the use of the X-Window version of Bastille. If you prefer, you can install the text-only version. 1. Log on as root and enter X-Windows by entering startx at the command prompt. If your system defaults to an X-Window interface, log on directly as root. 2. Obtain the Bastille RPM or tarball as well as all supporting files. If your instructor does not have the files, go to the following sites: Using Bastille, make the following changes to your system: Using the FilePermissions module, disable the r-tools, and configure your system so that ping and traceroute are available only to root. Using the BootSecurity module, take the necessary steps to enhance your server's physical security. Use the SecureInetd module to create a consistent policy for your Xinetd daemons. When you are finished, click the EndScreen menu, click the Yes radio button, and begin writing these changes to your system Using the Logging module, configure additional logging modules. 4. After you have made these settings, test them by logging on as a non-root user. See if you can use ping and traceroute. 5. Reboot the system and experiment with the Linux single-user mode. In this lab, you have experimented with the Bastille application. You now have used a tool that can help you apply standard policies to all of your Linux systems.
21 Optional Lab 5-2: Exercising granular authentication control in Linux In this lab, you and a partner will edit the /etc/pam.d/login file to invoke the /lib/security/pam_access.so module. You will then edit the /etc/security/access.conf file to limit access to the system based on user and location. 1. Make a copy of the /etc/pam.d/login file and name it /etc/pam.d/login.orig. 2. Make a copy of the /etc/security/access.conf file and name it /etc/security/access.conf.orig. Note: Failure to make these copies can result in difficulties later. 3. Using a text editor, open the /etc/pam.d/login file. 4. Enter the following line, if it is not already present: account required /lib/security/pam_access.so 5. Now that you have enabled the loading of the /lib/security/pam_access.so module, you can edit the /etc/security/access.conf file. (Open this file with a text editor.) 6. Enter the following line at the bottom of the file: -:ALL:ALL EXCEPT LOCAL 7. Have your partner try to access your system using Telnet. 8. This connection should fail because you have denied logon access to all users from all remote locations. Note: If you were to enter -:ALL:ALL and log off, all accounts, including root, would be denied access to the entire system. The only remedy for this lockout is to boot into single-user mode, or use an X-Windows login, then edit the file so that at least root can access the console. 9. Place a comment in front of the -:ALL:ALL EXCEPT LOCAL entry (use the # character). 10. Create two new user accounts named access1 and access2. Make sure you give each account the password password.
22 11. Now, enter a new line in /etc/security/access.conf that reads as follows: -:ALL EXCEPT access1 root:all 12. Have your partner log on as access1. Your partner should be successful. 13. Now, have your partner log on as access2. Note that your partner can log on as access1, but not as access2, or as any other user name except root. 14. Alter the entry in /etc/security/access.conf as follows: -:ALL EXCEPT access1 access2 root:all 15. Test this entry by having your partner log on as access1 and access2. Both accounts should now be able to log on. 16. If time permits: Edit the entry so that only access1 and access2 can remotely log on from your domain: -:ALL EXCEPT access1 access2:your_dns_domain_name 17. When you are finished experimenting, either edit the existing file to comment out all lines, or copy access.conf.orig so that it becomes access.conf.
LAB #7 Linux Tutorial
Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing
More informationNETW 110 Lab 5 Creating and Assigning Users and Groups Page 1
NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users
More informationCS Fundamentals of Programming II Fall Very Basic UNIX
CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)
More informationCS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX
CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot
More information14. Configuring Telnet in Knoppix
14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix
More informationSANOG VI IP Services Workshop: FreeBSD Install
SANOG VI IP Services Workshop: FreeBSD Install FreeBSD is designed to be a server operating system. This becomes apparent during the installation process. The FreeBSD installer is a console-based (not
More informationUNIT 9 Introduction to Linux and Ubuntu
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 9 Introduction to Linux and Ubuntu Learning Objectives Participants will understand the basics of Linux, including the nature,
More informationLinux Survival Guide
Linux Survival Guide Introduction: This guide is intended for use with classes at DACC that use a Linux operating system as the platform for students. It provides a quick summary and examples of how to
More informationNETW 110 Lab 3 Post-Installation Configuration Page 1
NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration
More informationFind out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~
CIS 105 Working with directories You have using directories in a Windows environment extensively. Often in Windows we are calling them folders. They are important in order to organize our files. It is
More informationOperating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07
0Handouts: Lesson 1 Quiz 1. What is the working definition of authentication? a. The ability for a person or system to prove identity. b. Protection of data on a system or host from unauthorized access.
More informationLab 1: Accessing the Linux Operating System Spring 2009
CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux
More informationCS/CIS 249 SP18 - Intro to Information Security
Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses
More informationOperating Systems. Copyleft 2005, Binnur Kurt
3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.
More informationOperating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing
Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out
More information8 Administering Groups
8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you
More informationTHE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG224 Information Technology Part I: Computers and the Internet Laboratory 2 Linux Shell Commands and vi Editor
More informationLab 4: Protocols and Default Network Ports - Connecting to a Remote System
CompTIA Security+ Lab Series Lab 4: Protocols and Default Network Ports - Connecting to a Remote System CompTIA Security+ Domain 1 - Network Security Objective 1.4: Implement and use common protocols Objective
More informationPart I. Introduction to Linux
Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing
More informationIntroduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines
Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical
More informationCIS 192 Linux Lab Exercise
CIS 192 Linux Lab Exercise Lab 8: Samba Spring 2009 Lab 8: Samba The purpose of this lab is to share files among Windows and Linux hosts on a common network. The goal is to browse directories on the Linux
More informationNetwork Monitoring & Management. A few Linux basics
Network Monitoring & Management A few Linux basics Our chosen platform Ubuntu Linux 14.04.3 LTS 64-bit LTS = Long Term Support no GUI, we administer using ssh Ubuntu is Debian underneath There are other
More informationSysinstall main menu. Move the cursor down by using the DOWN-ARROW and select Standard.
Initial Boot from Install Disc 1 Turn on the power for your machine. Sysinstall main menu Immediately place the first CD-ROM of the FreeBSD 5.3 install set in your machine's CD-ROM drive. You'll see an
More information1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application.
CIT 210L Name: Lab #2 1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application. 2. Listing installed packages -
More informationOperating Systems Linux 1-2 Measurements Background material
Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing
More informationcommands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes
Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationCapability and System Hardening
P a g e 1 Date Assigned: mm/dd/yyyy Date Due: mm/dd/yyyy by hh:mm Educational Objectives Capability and System Hardening This lab is designed to help you gain a better understanding of system hardening
More informationChapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER
Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression
More informationGetting Started With UNIX Lab Exercises
Getting Started With UNIX Lab Exercises This is the lab exercise handout for the Getting Started with UNIX tutorial. The exercises provide hands-on experience with the topics discussed in the tutorial.
More informationLab 3a Using the vi editor
Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode
More informationETHICAL HACKING LAB SERIES. Lab 3: Using the SYSTEM Account
ETHICAL HACKING LAB SERIES Lab 3: Using the SYSTEM Account Certified Ethical Hacking Domain: System Hacking Document Version: 2015-08-14 otherwise noted, is licensed under the Creative Commons Attribution
More informationQ) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...
Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer
More informationParallel Programming Pre-Assignment. Setting up the Software Environment
Parallel Programming Pre-Assignment Setting up the Software Environment Authors: B. Wilkinson and C. Ferner. Modification date: Aug 21, 2014 (Minor correction Aug 27, 2014.) Software The purpose of this
More informationUsing LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)
Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers
More informationUNIT 10 Ubuntu Security
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account
More informationSession 1: Accessing MUGrid and Command Line Basics
Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources
More informationUser Guide Version 2.0
User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...
More informationIntroduction to Linux
Introduction to Linux The command-line interface A command-line interface (CLI) is a type of interface, that is, a way to interact with a computer. Window systems, punched cards or a bunch of dials, buttons
More informationUnix Tutorial Haverford Astronomy 2014/2015
Unix Tutorial Haverford Astronomy 2014/2015 Overview of Haverford astronomy computing resources This tutorial is intended for use on computers running the Linux operating system, including those in the
More informationPlease note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of
Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of 2015. The materials for this course are still being developed.
More informationLab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationIntermediate Programming, Spring Misha Kazhdan
600.120 Intermediate Programming, Spring 2017 Misha Kazhdan Outline Unix/Linux command line Basics of the Emacs editor Compiling and running a simple C program Cloning a repository Connecting to ugrad
More informationTJU Syllabus for Linux Fundamentals and Applications
TJU Syllabus for Linux Fundamentals and Applications Code: 2160281 Title: Linux Fundamentals and Applications Semester Hours: 40 Credits: 2 Semester Structure Offered by: for: Prerequisite: Hour Lecture:24
More informationSome Ubuntu Practice...
Some Ubuntu Practice... SANOG 10 August 29 New Delhi, India 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control services
More informationCommand-Line Interface (CLI) Basics
4 CHAPTER This chapter is intended as a quick reference, not as a step-by-step explanation of the Cisco IOS. The chapter describes basic Cisco IOS software command-line interfaces that you may need to
More informationCCNA Discovery Server Live CD v2.0
CCNA Discovery Overview CCNA Discovery Server Live CD v2.0 Information and Installation Instructions The Discovery Server Live CD provides all of the network services necessary to support the CCNA Discovery
More informationCST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB
Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs
More informationUnix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University
Unix/Linux Basics 1 Some basics to remember Everything is case sensitive Eg., you can have two different files of the same name but different case in the same folder Console-driven (same as terminal )
More informationActivity 1: Using Windows XP Professional Security Checklist
Activity 1: Using Windows XP Professional Security Checklist Verify that all Disk partitions are Formatted with NTFS NTFS partitions offer access controls and protections that aren't available with the
More informationProgramming Project # 2. cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel)
Programming Project # 2 cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel) Background context Unix permissions model Prof Mitchell will cover during OS security (next week
More informationChapter 1 An Introduction to C++, Unix, SSH and Komodo Edit
Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Contents 1 An Introduction to C++, Unix, SSH and Komodo Edit 1.1 Introduction 1.2 The C++ Language 1.2.1 A Brief Introduction 1.2.1.1 Recommended
More informationGroup Editing of Files and Web Sites
Introduction Some research groups like to maintain a project/research group web page. We recommend that a single individual perform this task. Any member of the group may contribute and provide edits for
More information15. Creating a Samba Server in Knoppix v.3
15. Creating a Samba Server in Knoppix v.3 Estimated Time: 60 minutes Objective In this lab, the student will start the samba service in Knoppix, allowing transfer of files to and from a indows XP computer
More informationThis is Worksheet and Assignment 12. Disks, Partitions, and File Systems
This is Worksheet and Assignment 12 This is a combined Worksheet and Assignment.. Quizzes and tests may refer to work done in this Worksheet and Assignment; save your answers. You will use a checking program
More informationPost Ubuntu Install Exercises
Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control
More informationIntroduction to Unix May 24, 2008
Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationPerl and R Scripting for Biologists
Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications
More informationLinux Kung Fu. Stephen James UBNetDef, Spring 2017
Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and
More informationDownloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018
Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 This guide will help you download and install IBM Db2 software,
More informationExercise Sheet 2. (Classifications of Operating Systems)
Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user
More informationEMS Installation. Workstation Requirements CHAPTER. EMS Lite (Windows 95/98) EMS NT (Windows NT 4.0)
CHAPTER 2 EMS Installation This chapter provides instructions for installing the Element Management System (EMS) software on a user workstation. Workstation Requirements The following sections list the
More informationGlobal Array Manager
NEC Express Server Express5800 series NEC Express5800/100,ft Series Global Array Manager Ver. 5.00 Installation Manual [Linux Server Edition] Trademarks Microsoft, Windows and Windows NT are registered
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises
More informationEM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices
EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn
More informationLab Working with Linux Command Line
Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed
More informationThis is Lab Worksheet 3 - not an Assignment
This is Lab Worksheet 3 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make sure
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationRFC RFC. Configuring FTP Server. FTP Clients
RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,
More informationLab Authentication, Authorization, and Accounting
Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices
More informationIntroduction to Linux
Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,
More informationProcesses are subjects.
Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions
More informationTivoli Provisioning Manager for OS Deployment Installation on W2003R2-NFS-MySQL
This post is about the installation of IBM Tivoli Provisioning Manager for OS Deployment (TPMfOSD). Although the potential audience is small, I am sure that those who want to switch to use a MySQL database
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationOperating System Interaction via bash
Operating System Interaction via bash bash, or the Bourne-Again Shell, is a popular operating system shell that is used by many platforms bash uses the command line interaction style generally accepted
More informationIntroduction. What is Linux? What is the difference between a client and a server?
Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions
More informationEKT332 COMPUTER NETWORK
EKT332 COMPUTER NETWORK LAB 1 INTRODUCTION TO GNU/LINUX OS Lab #1 : Introduction to GNU/Linux OS Objectives 1. Introduction to Linux File System (Red Hat Distribution). 2. Introduction to various packages
More informationUnix Basics. UNIX Introduction. Lecture 14
Unix Basics Lecture 14 UNIX Introduction The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the hub of the operating system: it allocates
More informationExtended Search Administration
IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using
More informationBasic Linux Security. Roman Bohuk University of Virginia
Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls
More informationEmbedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island
Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller
More informationGetting Started with UNIX
Getting Started with UNIX What is UNIX? Boston University Information Services & Technology Course Number: 4000 Course Instructor: Kenny Burns Operating System Interface between a user and the computer
More informationChapter 1 An Introduction to C++, Unix, SSH and Komodo Edit
Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit A portion of this lab is to be done during the scheduled lab time. The take-home programming assignment is to be turned in before the next lab;
More informationEnabling Smart Card Logon for Linux Using Centrify Suite
DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/
More informationWhen talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used:
Linux Tutorial How to read the examples When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: $ application file.txt
More informationIntroduction to Linux. Fundamentals of Computer Science
Introduction to Linux Fundamentals of Computer Science Outline Operating Systems Linux History Linux Architecture Logging in to Linux Command Format Linux Filesystem Directory and File Commands Wildcard
More informationInstalling and Upgrading Cisco Network Registrar Virtual Appliance
CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar
More informationBrief Linux Presentation. July 10th, 2006 Elan Borenstein
Brief Linux Presentation July 10th, 2006 Elan Borenstein History 1965 - Bell Labs (AT&T), GE and MIT Project to develop a new (multiuser, multitasking) operating system - MULTICS. (not successful) History
More informationCounterACT Macintosh/Linux Property Scanner Plugin
CounterACT Macintosh/Linux Property Scanner Plugin Version 7.0.1 and Above Table of Contents About the Macintosh/Linux Property Scanner Plugin... 4 Requirements... 4 Supported Operating Systems... 4 Accessing
More informationBasic Linux Command Line Interface Guide
This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting
More informationMonitoring Windows Systems with WMI
Monitoring Windows Systems with WMI ScienceLogic version 8.8.1 Table of Contents Introduction 4 Monitoring Windows Devices in the ScienceLogic Platform 5 What is SNMP? 5 What is WMI? 5 PowerPacks 5 Configuring
More informationLinux Kung Fu. Ross Ventresca UBNetDef, Fall 2017
Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built
More informationRedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically
More informationIntroduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University
Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an
More informationCS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists
CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists Name: In this lab you will learn: PartA Cisco 2600 Router Configuration Static Routing PartB 20 min Dynamic
More informationThe kernel is the low-level software that manages hardware, multitasks programs, etc.
November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 2.0, Last Edited 10/1/2006 Students Name: Date of Experiment: Part I: Objective The objective of the exercises
More informationHitchhiker s Guide to VLSI Design with Cadence & Synopsys
Hitchhiker s Guide to VLSI Design with Cadence & Synopsys David Money Harris 17 January 2009 The VLSI design tools at Harvey Mudd College are hosted on a Linux server named chips. This document introduces
More informationRH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking
More information