Linuxing In London - 19/10/2016. session 1: root, su or sudo? ALINA ŚWIĘTOCHOWSKA PRINCIPAL TECHNOLOGIST UNIX/LINUX
|
|
- Clifford Merritt
- 6 years ago
- Views:
Transcription
1 Linuxing In London - 19/10/2016 session 1: root, su or sudo? ALINA ŚWIĘTOCHOWSKA PRINCIPAL TECHNOLOGIST UNIX/LINUX
2 root, su or sudo? What is superuser? Using root and its password (or not) Using su (or not) Job role assignments with sudo
3 What is superuser? what it should not be
4 What is superuser? Definition Limitations Risks
5 Superuser definition Superuser is an account with numeric UID of 0 Nearly all Linux administration must be done as root This user (user id 0) has unrestricted access to the system Shell assignment in the /etc/passwd file might restrict the power For network service processes, use privileged system accounts Associated with specific administrative functions Use them, where relevant
6 Login as root DON T. NEVER. EVER. Exceptions: You inherited a system without an account with elevated privileges You have a third party (or in-house written) application that expects to see a string root to validate authorisation Fix your exception: Add appropriate account Sort the application - upgrade / replace / file a bug Then: REMOVE root s PASSWORD user system
7 Why should we avoid root? Hackers love it Every UNIX/Linux has root; only password to be cracked No auditing Too many people end up having the password: who removed that file? No file locking at the standard OS level Whose modification prevail? $ sudo useradd -o -u 0 backdoor notice, this is also a superuser!
8 Working with su (or not)...
9 Working with su Using the su command Configuration and logging PROs and CONs
10 su configuration and logging The set user (su) command switches to another user The effective user and group id changed; a new shell for the new user started Configuration: /etc/default/su - startup directives for su (not used in RHEL 7) /etc/login.defs /etc/pam.d/su /etc/pam.d/su-l - global login definitions for shadow programs - configuration (rules) file used by PAM - as above, but used if su was invoked with -l option Log file - wherever authpriv is configured $ grep -r authpriv /etc/rsyslog* RHEL 7 - /var/log/secure Ubuntu 16 - /var/log/auth.log
11 PROs and CONs of su PROs Well established and known Every UNIX and linux has it Simple to use CONs Requires password for root Limited logging and auditing Encourages prolonged session Too many individuals end up with root password
12 sudo switch user to do stuff
13 sudo What is it? Why? How it works? Simple configuration Making the best of aliases and environment Drawbacks and risks
14 What is it? The sudo tool is alternative to su (ish) Can define who can do what as which user on which host Several merits and advantages over su: Full logging in /var/log/messages for transaction audit Timestamp-based "tickets" limit sudo session to short period The configuration can be centralised across the network To see what you can do: $ sudo -l
15 How? To start a sudo session: $ sudo mount /mnt/disk1 Password: start sudo session provide password your own password allowed? consult /etc/sudoers YES NO start command log it start time ticket log it ticket valid for a few minutes
16 Take out insurance policy Initially, ensure access in case things don t go right first time! $ sudo passwd root $ su - root Save the templates # cp /etc/sudoers /etc/sudoers_orig # cp -R /etc/sudoers.d /etc/sudoers.d_orig Feels wrong? Looks wrong? It should!
17 Default configuration Have a peak at the configuration, before blowing it away root and the members of group wheel can run all commands, on all machines, with any identity
18 Simple configuration Uses Extended Backus-Naur Form (EBNF) notation What it all means: root All=(ALL) ALL %wheel All=(ALL) ALL /etc/sudoers who where (host) as whom ('runas') allowed commands Add the system owner to group wheel # usermod -G wheel qa wheel:x:10:root,qa /etc/group
19 'User' and 'runas' aliases User_Alias - a list of users, UIDs, system groups or netgroups User_Alias User_Alias User_Alias FULLTIMERS = bobm, petek, colinb ASSOCIATES = martinb, grahamb WEBMASTERS = sueb, mickw, elliet Runas_Alias - a list of users, UIDs, system groups or netgroups Runas_Alias Runas_Alias DB = ingres, mysql OP = %adm, admins
20 'Host' and 'Cmnd' aliases Host_Alias - a list of hosts, netgroups, IP addresses, networks Host_Alias Host_Alias WWW = booboo, rupert, teddy, care, sun* CDROM = /24, booboo, padders Cmnd_Alias - a list of allowed commands Cmnd_Alias SHUT = /usr/sbin/reboot, /usr/sbin/halt, \ /usr/sbin/systemctl reboot Cmnd_Alias DUMPS = /usr/bin/mt, /sbin/dump, /sbin/rdump, \ /sbin/restore
21 Putting it all together Rule 1: sudoers policy works on last match principle Typically, aliases are used for the purpose, for example: user FULLTIMERS ASSOCIATES grahamb WEBMASTERS %admins, %wheel bob mickw host = (run as user) command ALL = NOPASSWD: ALL ALL = (DB) ALL LOCAL = /sbin/service crond restart WWW = (www) ALL, (root) /usr/bin/su www ALL = ALL CDROM = (root) DUMPS ALL = (OP) SHUT, DUMPS
22 Options can be: booleans integers strings integers used as booleans insults passwd_tries=3 secure_path = /sbin:/usr/sbin timestamp_timeout=0 Options control overall behaviour of sudo operation, but can be applied to: users hosts runas commands >DB!/bin/systemctl!lecture setenv insults!lecture env_reset!lecture
23 Environment Plenty environmental definitions to explore man 5 sudoers always_set_home secure_path = /sbin:/bin:/usr/sbin:/usr/bin env_reset env_keep += "COLORFGBG COLORTERM" env_keep += "LANG LANGUAGE LC_ALL LC_COLLATE LC_CTYPE" env_keep += "LC_MESSAGES LC_MONETARY LC_NUMERIC LC_TIME" env_keep += "LINES COLUMNS" env_keep += "LSCOLORS" env_keep += "SSH_AUTH_SOCK" env_keep += "TZ" env_keep += "DISPLAY XAUTHORIZATION XAUTHORITY" env_keep += "EDITOR VISUAL
24 Using builtins with sudo Beware : environment may be inherited, but never promoted [qa@ewok ~]$ ls /var/log/samba ls: cannot open directory /var/log/samba: Permission denied [qa@ewok ~]$ cd /var/log/samba -bash: cd: /var/log/samba: Permission denied [qa@ewok ~]$ sudo cd /var/log/samba [qa@ewok ~]$ sudo sh -c 'cd /var/log/samba; ls ' cores log log log.csukleapp55 log. log log log.ewok log log log log.nmbd log log log log.purism log log log log.smbd [...]
25 Logging with rsyslog Default log destination, wherever authpriv is set to go $ grep -r authpriv /etc/rsyslog* RHEL 7 - /var/log/secure Ubuntu 16 - /var/log/auth.log sudo uses local2 facility to submit messages to rsyslog local2.notice used for successful sudo activity local2.alert used for failed sudo activity local2.=notice local2.=alert /var/log/sudo_success /var/log/sudo_failure
26 Finally, hints and traps best kept secrets, perhaps
27 Using redirection/piping with sudo Same issue: who does what Redirection and piping are handled by your shell......not the sub-shell created for sudo ~]$ sudo blkid /dev/sda1: UUID="501e86ba-47d2-4b88-b158-dde e" TYPE="xfs" [...] /dev/sda6: UUID="f60ee74b a77-96ac-baefacc74380" TYPE="swap" /dev/sda7: UUID="afd88844-ca25-4e0f-89cc-3f097ec5327f" TYPE="xfs" /dev/sr0: LABEL="UDF Volume" TYPE="udf" ~]$ sudo blkid > /var/log/blkid -bash: /var/log/blkid: Permission denied ~]$ sudo sh -c blkid > /var/log/blkid
28 Fixing a broken sudoers file Error: $ sudo visudo sudo: >>> /etc/sudoers: syntax error near...<<< sudo: parse error in /etc/sudoers near line 120 sudo: no valid sudoers sources found, quitting sudo: unable to initialize policy plugin Fix: part of polkit tools - policy kit, authorization framework for APIs [qa@ewok ~]$ pkexec vi /etc/sudoers == AUTHENTICATING FOR org.freedesktop.policykit.exec === Authentication is needed to run `/bin/vi' as the super user Authenticating as: QA Student (qa) Password: ==== AUTHENTICATION COMPLETE ===
29 Escaping into shell Imagine the following assignment for user fred: fred $ sudo vi ~ ~ ~ ~ :!bash All = (ALL) /usr/bin/vi Do not assign programs which have a so-called escape into shell ability! Avoid command exclusions - can always find a hole E.G:!/usr/bin/vi - exclusion may not stop access to other similar programs...
30 Time ticket To control grace time between password authentication: [...] timestamp_timeout=0 0 means password required with every sudo command Avoid NOPASSWD in user/group assignments freddie ALL=NOPASSWD: ALL
CSE 265: System and Network Administration
CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users
More informationUser Management. lctseng
User Management lctseng ID User ID, Group ID % id lctseng uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 Same as above Super user (defined by uid = 0) root
More informationSudo: Switch User Do. Administrative Privileges Delegation Campus-Booster ID : **XXXXX. Copyright SUPINFO. All rights reserved
Sudo: Switch User Do Administrative Privileges Delegation Campus-Booster ID : **XXXXX www.supinfo.com Copyright SUPINFO. All rights reserved Sudo: Switch User Do Your trainer Presenter s Name Title: **Enter
More informationSUDO(8) System Manager s Manual SUDO(8)
NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p
More informationSUDO(8) System Manager s Manual SUDO(8)
NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p
More informationComputer Center, CS, NCTU
User Management Adding New Users ID User ID, Group ID % id liuyh uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm) % id 10047 Super user root uid=10047(liuyh) gid=200(dcs)
More informationVISUDO(8) System Manager s Manual VISUDO(8)
NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file
More informationSUDO(8) System Manager s Manual SUDO(8)
NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p
More informationThere are two tools with which you should be familiar: the program su, and more importantly, sudo. Here we see how to use them.
Operating Systems and Systems Integration Administration, the root User and Configuring sudo 1 Aim The aim of this activity is to understand the purpose of the root account, and the security risks of logging
More informationThe kernel is the low-level software that manages hardware, multitasks programs, etc.
November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains
More informationLAB #7 Linux Tutorial
Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing
More informationCS/CIS 249 SP18 - Intro to Information Security
Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses
More informationNETW 110 Lab 3 Post-Installation Configuration Page 1
NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration
More informationChapter 5: User Management. Chapter 5 User Management
Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts
More informationVISUDO(8) System Manager s Manual VISUDO(8)
NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file
More informationLab Authentication, Authorization, and Accounting
Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices
More informationUNIT 10 Ubuntu Security
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account
More informationSUDOERS(5) File Formats Manual SUDOERS(5)
NAME sudoers - default sudo security policy plugin DESCRIPTION The sudoers policy plugin determines a user s sudo privileges. It is the default sudo policy plugin. The policy is driven by the /etc/sudoers
More informationIntroduction to Unix May 24, 2008
Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory
More informationSUDOERS(5) File Formats Manual SUDOERS(5)
NAME sudoers - default sudo security policy plugin DESCRIPTION The sudoers policy plugin determines a user s sudo privileges. It is the default sudo policy plugin. The policy is driven by the /etc/sudoers
More information1Z Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions
1Z0-409 Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-409 Exam on Oracle Linux Fundamentals (Oracle Partner Network)... 2 Oracle
More informationNETW 110 Lab 5 Creating and Assigning Users and Groups Page 1
NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users
More informationAccess Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.
Access Control CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Access Control Describe the permissions available to computing processes
More informationLinux Kung Fu. Stephen James UBNetDef, Spring 2017
Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and
More informationUser & Group Administration
User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process
More informationCourse Wiki. Today s Topics. Web Resources. Amazon EC2. Linux. Apache PHP. Workflow and Tools. Extensible Networking Platform 1
Today s Topics Web Resources Amazon EC2 Linux Apache PHP Workflow and Tools Extensible Networking Platform 1 1 - CSE 330 Creative Programming and Rapid Prototyping Course Wiki Extensible Networking Platform
More informationINTRODUCTION TO LINUX
INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free
More informationHANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke
HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS Or something broke Securing your VM 101 Getting Comfy in Linux -> Comfort ++ You After This Talk Quick recap from last week. Setup
More informationRace Condition Vulnerability Lab
Concordia Institute for Information Systems Engineering - INSE 6130 1 Race Condition Vulnerability Lab Copyright c 2006-2012 Wenliang Du, Syracuse University. The development of this document is funded
More informationThe Wonderful World of Services VINCE
The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services
More informationLinux Kung-Fu. James Droste UBNetDef Fall 2016
Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org
More informationManaging Users, Managing Security
CHAPTER 19 Managing Users, Managing Security The heart of Linux security is determining who can use what file and what kind of use is permitted. This is not all there is to making Linux a more secure system,
More informationHow to monitor RedHat Enterprise Linux 5 or 6 using Microsoft System Center Operations Manager (SCOM) 2012 SP1 - Part 1
How to monitor RedHat Enterprise Linux 5 or 6 using Microsoft System Center Operations Manager (SCOM) 2012 SP1 - Part 1 Modifications of the Linux OS and SCOM It's really a mess to get a running configuration
More informationIntroduction. What is Linux? What is the difference between a client and a server?
Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions
More informationCSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions
CSE 390a Lecture 3 Multi-user systems; remote login; editors; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1
More informationCTEC1863/2018F Bonus Lab Page 1 of 5
CTEC1863/2018F Bonus Lab Page 1 of 5 Bonus Lab: OpenSUSE Linux Rescue In this lab, we will install an OpenSUSE virtual machine. However, both the non-root user and the root passwords are unknown. To fix
More informationCSE 390a Lecture 4. Persistent shell settings; users/groups; permissions
CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture summary
More informationReview of Fundamentals
Review of Fundamentals 1 The shell vi General shell review 2 http://teaching.idallen.com/cst8207/14f/notes/120_shell_basics.html The shell is a program that is executed for us automatically when we log
More informationCross-Platform Management
Cross-Platform Management with MS Operations Management Suite Pete Zerger @pzerger pete.zerger@gmail.com Lee Berg @LeeAlanBerg LeeAlanBerg@gmail.com Lee Berg Madison, WI Madison, Wi @LeeAlanBerg Consultant
More informationReview of Fundamentals. Todd Kelley CST8207 Todd Kelley 1
Review of Fundamentals Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 GPL the shell SSH (secure shell) the Course Linux Server RTFM vi general shell review 2 These notes are available on
More informationLinux Kung Fu. Ross Ventresca UBNetDef, Fall 2017
Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built
More informationUNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan
UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication
More informationPost Ubuntu Install Exercises
Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control
More informationUser Management. Lctseng, arr. by pschiu
User Management Lctseng, arr. by pschiu ID q User ID, Group ID % id lctseng (ID Name) Ø uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 (UID) Ø Same as above
More informationCSE 303 Lecture 4. users/groups; permissions; intro to shell scripting. read Linux Pocket Guide pp , 25-27, 61-65, , 176
CSE 303 Lecture 4 users/groups; permissions; intro to shell scripting read Linux Pocket Guide pp. 19-20, 25-27, 61-65, 118-119, 176 slides created by Marty Stepp http://www.cs.washington.edu/303/ 1 Lecture
More informationInformation System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)
Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood
More informationProgramming Project # 2. cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel)
Programming Project # 2 cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel) Background context Unix permissions model Prof Mitchell will cover during OS security (next week
More information10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]
1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik
More informationEverything about Linux User- and Filemanagement
Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................
More informationTECH 4272 Operating Systems
TECH 4272 Lecture 3 2 Todd S. Canaday Adjunct Professor Herff College of Engineering sudo sudo is a program for Unix like computer operating systems that allows users to run programs with the security
More informationPerl and R Scripting for Biologists
Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications
More informationUsing Commands. Introduction to Unix. May 24, 2008 Rabat, Morocco. Hervey Allen
Using Commands Introduction to Unix May 24, 2008, Morocco Hervey Allen GUIs and CLIs What's are some example GUIs? Windows Mac OS X (Darwin, X and Aqua) Gnome, KDE (on Xwindow) What about example CLIs?
More informationMIS Week 10. Operating System Security. Unix/Linux basics
MIS 5170 Operating System Security Week 10 Unix/Linux basics Tonight s Plan 2 Questions from Last Week Review on-line posts In The News Download Kali Install Kali Unix/Linux Basics Scripting Appropriate
More informationLab Working with Linux Command Line
Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed
More informationCIS 5373 Systems Security
CIS 5373 Systems Security Topic 3.2: OS Security Access Control Endadul Hoque Slide Acknowledgment Contents are based on slides from Ninghui Li (Purdue), John Mitchell (Stanford), Bogdan Carbunar (FIU)
More informationOverview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions
Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System
More informationAssume that username is cse. The user s home directory will be /home/cse. You may remember what the relative pathname for users home directory is: ~
Introduction to Open Source Software Development Spring semester, 2017 School of Computer Science and Engineering, Pusan National University Joon-Seok Kim LINUX: COMMANDS Review Lab #1 2 Create Directories
More informationIntroduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines
Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical
More informationClick Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements
Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
More informationMANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG
MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online
More informationAnswers to Even- Numbered Exercises
Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine
More informationUnix Introduction to UNIX
Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various
More informationBasic UNIX system administration
Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright 2001-2003. System administration Thus far, we ve only discussed:
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationReview of Fundamentals. Todd Kelley CST8207 Todd Kelley 1
Review of Fundamentals Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 The CST8207 course notes GPL the shell SSH (secure shell) the Course Linux Server RTFM vi general shell review 2 Linux
More informationCSE 390a Lecture 4. Persistent shell settings; users/groups; permissions
CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture summary
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More informationIntroduction to Linux
Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,
More informationIntroduction to Linux (Part I) BUPT/QMUL 2018/03/14
Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Contents 1. Background on Linux 2. Starting / Finishing 3. Typing Linux Commands 4. Commands to Use Right Away 5. Linux help continued 2 Contents 6.
More informationCST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB
Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs
More informationManaging Xen With Xen-Tools, Xen-Shell, And Argo
By Falko Timme Published: 2006-10-21 20:35 Managing Xen With Xen-Tools, Xen-Shell, And Argo Version 1.0 Author: Falko Timme Last edited 10/21/2006 This guide describes how
More informationcommands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes
Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with
More informationIntroduction to the shell Part II
Introduction to the shell Part II Graham Markall http://www.doc.ic.ac.uk/~grm08 grm08@doc.ic.ac.uk Civil Engineering Tech Talks 16 th November, 1pm Last week Covered applications and Windows compatibility
More informationOPERATING SYSTEMS LINUX
OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code
More informationLab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationOBSERVEIT CLOUDTHREAT GUIDE
OBSERVEIT CLOUDTHREAT GUIDE Contents 1 About This Document... 2 1.1 Intended Audience... 2 1.2 Related ObserveIT Software and Documentation... 2 1.3 Support... 2 2 Product Overview... 3 3 Installing the
More informationIntroduction. Let s start with the first set of slides
Tux Wars Class - 1 Table of Contents 1) Introduction to Linux and its history 2) Booting process of a linux system 3) Linux Kernel 4) What is a shell 5) Bash Shell 6) Anatomy of command 7) Let s make our
More informationUser accounts and authorization
User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2016 Lecture 5 Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 User Operating System Interface - CLI CLI
More informationOS Security. Authorization. Radboud University Nijmegen, The Netherlands. Winter 2015/2016
OS Security Authorization Radboud University Nijmegen, The Netherlands Winter 2015/2016 A short recap Authentication establishes a mapping between entities (users) and intended operations Typical approach:
More informationINSE 6130 Operating System Security
INSE 6130 Operating System Security Access Control Mechanisms Prof. Lingyu Wang 1 Recap ACM: modeling access control in any system Who can do what to whom 6 primitive operations Commands, special ones
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationMore Raspian. An editor Configuration files Shell scripts Shell variables System admin
More Raspian An editor Configuration files Shell scripts Shell variables System admin Nano, a simple editor Nano does not require the mouse. You must use your keyboard to move around the file and make
More informationUNIX/Linux Auditing. Baccam Consulting, LLC Training Events
UNIX/Linux Auditing Baccam Consulting, LLC tanya@securityaudits.org Training Events www.securityaudits.org/events.html ***CISSP Course being offered April 25-April 29, 2016 Copyright 2005-2016, Baccam
More informationUnix. Examples: OS X and Ubuntu
The Command Line A terminal is at the end of an electric wire, a shell is the home of a turtle, tty is a strange abbreviation, and a console is a kind of cabinet. - Some person on SO Learning Resources
More informationOperating Systems. Copyleft 2005, Binnur Kurt
3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.
More informationUser Accounts. The Passwd, Group, and Shadow Files
User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.
More informationHands-on Keyboard: Cyber Experiments for Strategists and Policy Makers
Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity
More informationOperating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing
Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out
More informationLab E2: bypassing authentication and resetting passwords
Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and
More informationUSER GUIDE. Snow Inventory Agent for Unix. Version 5. Release date Document date SNOWSOFTWARE.COM
USER GUIDE Product Snow Inventory Agent for Unix Version 5 Release date 2016-09-27 Document date 2016-09-27 CONTENTS 1 Introduction... 3 1.1 Prerequisites... 3 2 Installation... 5 2.1 Prepared installation
More informationQ) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...
Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer
More informationNational University of Computer and Emerging Sciences Operating System Lab - 02 Lab Manual
National University of Computer and Emerging Sciences Operating System Lab - 02 Lab Manual Objective This lab is all about running commands in Ubuntu Terminal and compiling C program in Ubuntu Table of
More informationLinux & Shell Programming 2014
Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationA Brief Introduction to the Linux Shell for Data Science
A Brief Introduction to the Linux Shell for Data Science Aris Anagnostopoulos 1 Introduction Here we will see a brief introduction of the Linux command line or shell as it is called. Linux is a Unix-like
More informationCSE 391 Lecture 3. bash shell continued: processes; multi-user systems; remote login; editors
CSE 391 Lecture 3 bash shell continued: processes; multi-user systems; remote login; editors slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/391/
More information1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions
1Z0-100 Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-100 Exam on Oracle Linux 5 and 6 System Administration2 Oracle 1Z0-100 Certification
More informationBPPM Patrol Agent Installation Steps on Linux and Automation Integration
BPPM Patrol Agent Installation Steps on Linux and Automation Integration Author: Karlis Peterson, Software Consultant, BMC Software Version: 1.0 Date: May 12, 2013 DISCLAIMER NOTICE This is Field Developed
More information