Premium Essay

Dump File

In: Social Issues

Submitted By kennguyenusa
Words 749
Pages 3
TDC463 –Lab01: IP Static Routing

Learning Objective:
1. 2. 3. Learn the basics of Cisco IOS commands. Configure static routing paths on Cisco router Learn the Linux tools to test route paths

2. Network Diagram
Host1 fa0/1 R1 s0/1/0 s0/1/0 R2 s0/1/1 R3 s0/1/1 Host2 fa0/0
192.168.2.10

192.168.1.10

3. Lab Configuration Procedure
Preliminary ‐ IP address Assignment Machine Host1 Host2 R1 R2 R3 You will be shown steps later to configure these addresses. Make sure that you do not change configuration of interfaces other than the ones mentioned above. Step 1: Make a reservation for this lab like you did in the preliminary lab. Step 2: When it’s your reserved time slot, connect to the DL Pod as you did in the preliminary lab. Interface eth1 eth1 fa0/1 s0/1/0 s0/1/0 s0/1/1 fa0/0 s0/1/1 IP Address (Mask) 192.168.1.10/24 192.168.2.10/24 192.168.1.1/24 192.168.10.1/24 192.168.10.2/24 192.168.20.2/24 192.168.2.3/24 192.168.20.3/24

Summer II 2012

TDC463 – lab01

Page 1 of 4

Step 3: Configure the IP addresses on the routers Remember that you need to enter the following commands to get into the configuration mode: enable conf term R1 int fa0/1 ip address 192.168.1.1 255.255.255.0 no shutdown int s0/1/0 ip address 192.168.10.1 255.255.255.0 no shutdown exit Step 4: Configure the Static Routes. R1 ip route 192.168.20.0 255.255.255.0 192.168.10.2 ip route 192.168.2.0 255.255.255.0 192.168.10.2 exit R2 int s0/1/0 ip address 192.168.10.2 255.255.255.0 no shutdown int s0/1/1 ip address 192.168.20.2 255.255.255.0 no shutdown exit R3 Configure R3 with the IP addreses given in the table on page 1. (Follow the examples of R1 and R2)

R2 ip route 192.168.1.0 255.255.255.0 192.168.10.1 ip route 192.168.2.0 255.255.255.0 192.168.20.3 exit R3 ip route 192.168.1.0 255.255.255.0...

Similar Documents

Free Essay

Forensic Studies Volatility

...Forensicc studies volatility 1. List the processes that were running on the victim’s machine. Which process was most likely responsible for the initial exploit? Figure 1 seeking the profile As shown in figure one, when the command “vol imageinfo –f /root/Desktop/BF.vmem” is applied, the result shows the suggested profile which is WinXPSP2x86 and WinXPSP3x86.With that we can able to identify the profile victim is using. Figure 2 Result of Pslist By using the “Pslist” command, we are able to trace the process running in the victim and based on the scenario provided, the user was emailed a link to a suspicious PDF by a co-worker. The chaos happened after the PDF file is opened. As shown in figure 2, “AcroRd32.exe” with PID 1752 is most likely responsible for the exploit. The PPID (parent PID) of AcroRd32.exe is 888 which indicate firefox.exe. 2. List the sockets that were open on the victim’s machine during infection. Are there any suspicious processes that have sockets open? Figure 3 Result of listing Sockets Figure 3 shows the list of socket that were opened on the victim’s machine during the exploitation Figure 4 Result of Connection The figure above shows the list of connection found in victim’s machine and the most suspicious connection to external website is the AcroRd32.exe (PID 1752) and svchost.exe (PID 880). These application caught our attention because it does not have any outbound HTTP connections. Figure 5 Information of IP After......

Words: 1584 - Pages: 7

Free Essay

Nt1430

...a new user |   | | arch | Print machine architecture | | | awk | Find and Replace text within file(s) |   | | bc | An arbitrary precision calculator language |   | | cal | Display a calendar | | | cat | Concatenate files and print on the standard output | | | chdir | Change working directory | | | chgrp | Change the group ownership of files | | | chkconfig | Tool for maintaining the /etc/rc[0-6].d directory hierarchy |   | | chmod | Change the access permissions of files and directories |   | | chown | Change the user and group ownership of files | | | chroot | Change root directory |   | | cksum | Print CRC checksum and byte counts |   | | clear | Clear terminal screen |   | | cmp | Compare two files |   | | comm | Compare two sorted files line by line |   | | cp | Copy one or more files to another location |   | | cron | Daemon to execute scheduled commands |   | | crontab | Schedule a command to run at a later time |   | | csplit | Split a file into context-determined pieces |   | | cut | Divide a file into several parts |   | | date | Display or change the date & time |   | | dc | Desk Calculator |   | | dd | Data Dump - Convert and copy a file |   | | df | Display free disk space |   | | diff | Display the differences between two files |   | | diff3 | Show differences among three files |   | | dir | Briefly list directory contents |   | |...

Words: 924 - Pages: 4

Premium Essay

Unit 1 Lab

...(Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? Accurate time is important because of the date/time stamps (records) that occur on both log-in's and any changes that were made. This allows the logs to be checked to see what individual made the changes, or was logged-in at the time the changes were implemented. 2. During the install, a password has been set for the "root" user. What is the "root" user, and when is it appropriate to use this account? The "root" user is name or account that by default has access to all commands and files. It is also referred to as the root account, root user and the superuser. It would be appropriate to use this account to modify the system in any way desired and to grant and revoke access permissions (eg. the ability to read, modify and execute specific files and directories) for other users, including any of those that are by default reserved for root. 3. During the install, X-Window and a Desktop Manger were installed. However, in a production environment it is recommended NOT to run the X-Window...

Words: 1655 - Pages: 7

Premium Essay

Is3440 Linux Security Lab 1

...Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator......

Words: 1494 - Pages: 6

Free Essay

Linux Shortcut

...*** Getting help: # View the manual for target command man command # Get help with a target command (probably the same as above, but not always): command -h # In case you forget the name of a command, print possible commands relating to any given word: apropos word # View index of help pages: info *** Command Line Utilities: **** Basic File and Directory Operations: # Print current working directory: pwd # Show files in current directory: ls # Show maximum information about all files, including hidden: ls -a # Recurse into subdirectories and list those as well: ls -R # List files by modification time, most recent first. ls -lt # Move/rename a file or directory (be careful that you don't move the source over a destination with the same name): mv source destination # Delete target forever (be very careful), use -r recursive flag for directories: rm target # Copy file or directory: cp source destination # Mount filesytem: mount /dev/device_name /media/device_name # Unmount: umount /media/device_name # Forensically clone filesystems and do other low-level operations on files. Be careful with this one. Can be destructive: dd # Work with disk partitions: parted # Filesystem creation tool: mkfs **** System Administration: # Execute command as an administrator (can be destructive/insecure. Use only for system administration tasks): sudo command # Become system administrator: sudo -s # Quit system......

Words: 1920 - Pages: 8

Free Essay

Lab 1 Is3440 Linux Security

...----------------------------------------- 1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? The most interesting importance of NTP would be the auto key system, if your system doesn’t keep correct time a attacker who needs to change time so that a replay attack can happen could be very damaging, that is why today’s version of NTP shields against this in several ways. 2. During the install, a password has been set for the “root” user, and when is it appropriate to use this account? It is highly recommended that you only use this account when there are tasks that require root privileges such as moving files or directories into or out of system directories. 3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Windows Environment. Explain the purpose for this recommendation? In a production environment hardware requirements and not to run the X-Windows Environment may sometimes vary, X-Window is intended for primarily workstation use only example personal computing on a Linux box. The X-Window was intended and developed for the network GUI only, X-Windows by itself doesn’t even have an interface. 4. During the install process it asks what the options given to create the partition are? Name them? It asked would I like to create Primary or an......

Words: 1158 - Pages: 5

Premium Essay

Electronic Security

...With the latest advances in today’s technology and the innovation that has risen from our low observable aircraft all the way down advanced composite structures that are raising the bar in air superiority (PR Newswire, 2009). In this era, there are individuals who have the capability to get into your computer’s files, deploy viruses, Trojans and worms that will destroy your computer and your life. These have a negative impact on the lives of millions of people across the globe. Identity theft, privacy violations and stealing copyright material and selling it for financial gain (Oregon Law Review, 2003). The information that I will go over explains why many acts were put into action due to these problems. Even though they are all put in place, there are still people who think they are above the law. In 1997, the no electronic theft act (NET) was established. This act was established due to the fact that many major corporations were losing revenue because people were uploading company products onto servers where people had free reign on what was being uploaded (Oregon Law Review, 2003). The problem was that these individuals were doing this for financial gain to put money in their pockets. There were also some who were in charge of these sites but were not looking for any type of monetary gain. The way that the punishments have been established is that even if you were involved with these acts of piracy and had no intent to distribute for money, you will still be penalized. ...

Words: 1179 - Pages: 5

Premium Essay

Install a Core Linux Operating System on a Server

...Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator......

Words: 1168 - Pages: 5

Premium Essay

Lyt2 Task 1

...office. This limits access to files and puts a dependency on repeated personal communication for document access wasting time and efficiency. Lastly, administrative tasks continue to be reliant on a paper based system producing possible processing and communication delays. How Identified Challenges Affect Key Stakeholders Managers and executives are the key stakeholders affected by outdated or incorrect documentation. Individuals or teams could be under the impression that business decisions are being made with information that is helpful and pertinent while in fact the information could be detrimental. When multiple managers and executives are involved confusion could arise about the needed information compounding the problem and leading to lengthy debates and discussion that are not required and create a confusion in business direction. This potential for errors in decision making puts the company at a considerable danger for loss of profitability, unsatisfied customers, and an uncertain future. Separate file servers and email servers affect two key stakeholders. The employees and the managerial and executive group both find themselves dependent on personal communication to gain access to documents that are not local to that individual’s office. For the employee this could result in delayed interactions with customers causing a dissatisfied client base. Employee time is wasted on trying to track down other staff members for access to files. Employee......

Words: 2045 - Pages: 9

Premium Essay

Is-3440 Unit 1 Lab Answers

...use Make it easier to recover a corrupted file system or operating system installation. Performance Smaller file systems are more efficient. You can tune file system as per application such as log or cache files. Dedicated swap partition can also improve the performance (this may not be true with latest Linux kernel 2.6). Security Separation of the operating system files from user files may result into a better and secure system. Restrict the growth of certain file systems is possible using various techniques. Backup and Recovery Easier backup and recovery. Stability and efficiency You can increase disk space efficiency by formatting disk with various block sizes. It depends upon usage. For example, if the data is lots of small files, it is better to use small block size. Testing Boot multiple operating systems such as Linux, Windows and FreeBSD from a single hard disk. 6. It serves as 'backup' RAM. That is, should your computer run out of RAM, it will use the swap area as a temporary source of more memory, Swap space can be a dedicated swap partition (recommended), a swap file, or a combination of swap partitions and swap files. I wouldn’t recommend one over the other I believe that a balanced use of both is a good idea. 7. File system size, Extents, Delayed and Multi block allocation, Online defragmentation and fsck speed, Backward compatibility, Inodes / Timestamps and Persistent preallocation. 8. /etc/passwd file stores essential information, which is......

Words: 497 - Pages: 2

Premium Essay

Perimeter Network Security System

...permission. Taking advantage of Ext3 journaling file system in a forensic investigation AD Copyright SANS Institute Author Retains Full Rights Taking advantage of Ext3 journaling file system in a forensic investigation fu ll r igh ts. Taking advantage of Ext3 journaling file system in a forensic investigation rr eta ins GCFA Gold Certification Author: Gregorio Narváez, gnarvae@yahoo.com Adviser: Paul Wright th 07 ,A ut ho Accepted: December 30 , 2007 © SA NS In sti tu te 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Gregorio Narváez © SANS Institute 2007, 1 As part of the Information Security Reading Room Author retains full rights. Taking advantage of Ext3 journaling file system in a forensic investigation TABLE OF CONTENT 1. INTRODUCTION............................................................................................................................... 3 1.1 Lab Setup .................................................................................................................................... 3 2. EXT3FS JOURNAL FUNDAMENTALS......................................................................................... 4 fu ll r igh ts. 2.1 Journal Life Cycle....................................................................................................................... 6 2.2 File Deletion Process: Ext2 Vs......

Words: 15276 - Pages: 62

Free Essay

Comp1600

...I Workshop 1.3: Editors and File Utilities Learning Objectives In this workshop, you will learn how to use some common editors and file utilities in Linux. Editor You use an editor to edit text files (e.g., input source programs, change the configuration files in /etc). You should be familiar with at least one editor in Linux. Some common editors include emacs, vi and pico. On X-windows, some common editors are xedit, gedit and kedit. Basics of vi vi is one of the common editor in Linux/Unix. It has two modes: insert mode and command mode. To get into insert mode: A, a, I, i, O, o To get out of insert mode: To move around in command mode: h, l, j, k, Ctrl-U, Ctrl-D, Ctrl-F, Ctrl-B Editing in command mode: x : delete 1 character 3x : delete 3 characters X : backspace to delete the last character dd : delete 1 line 3dd : delete 3 lines d^ : delete from the beginning of line D : delete up to the end of line u : undo last command . : redo last command yy : yank 1 line (copy into buffer) 10yy : yank 10 lines p : paste the buffer below the current line P : paste the buffer above the current line J : joint two lines : : go into ex mode /something/ : find something forward ?something? : find something backward Text File Format in Linux/DOS For text files in DOS, appears at end of each line, where the control 1 COMP1600 - Software Development Workshop I characters and stand for "carriage return" and "line fit". For text files in Linux, appears at the......

Words: 971 - Pages: 4

Free Essay

Uefi Shell Specification

...UEFI Shell Specification September 25, 2008 Revision 2.0 The material contained herein is not a license, either expressly or impliedly, to any intellectual property owned or controlled by any of the authors or developers of this material or to any contribution thereto. The material contained herein is provided on an "AS IS" basis and, to the maximum extent permitted by applicable law, this information is provided AS IS AND WITH ALL FAULTS, and the authors and developers of this material hereby disclaim all other warranties and conditions, either express, implied or statutory, including, but not limited to, any (if any) implied warranties, duties or conditions of merchantability, of fitness for a particular purpose, of accuracy or completeness of responses, of results, of workmanlike effort, of lack of viruses and of lack of negligence, all with regard to this material and any contribution thereto. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." The Unified EFI Forum, Inc. reserves any features or instructions so marked for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION OR NON-INFRINGEMENT WITH REGARD TO THE SPECIFICATION AND ANY CONTRIBUTION THERETO. IN NO EVENT WILL ANY AUTHOR OR DEVELOPER OF......

Words: 35960 - Pages: 144

Free Essay

Assignment 1

...#include #include #include // global definitions // macros unsafe, use enums enum { MAXSIZE = 65536, LINE_LN = 16, CHUNK_SZ = 1, }; // Assignment 1.c // Usage- ./Assignment\ 1 "filename" // Output- Dumps the hex data of a file // Returns- 2 on error, 1 on warning, 0 on success int main(int argc, char** argv) { // local definitions // file to read FILE* fpFile; // binary data of file unsigned char acByte[MAXSIZE]; // nBytes read is value returned by fread // nCurbyte is the current line being printed as a multiple of 16 // nByteOffset is the current byte being read minus nCurByte // nRet is a value returned by a function int nBytesRead, nCurByte, nByteOffset, nRet; if(argc < 2) { fprintf(stderr, "Error; please enter a file name.\n"); exit(2); } // fopen is unsafe and nReturns an error if((nRet = fopen_s(&fpFile, argv[1], "rb"))) { fprintf(stderr, "Error; fopen_s(&fpFile, %s, \"rb\") = %d\n", argv[1], nRet); exit(2); } // load the entire file into acByte nBytesRead = fread(acByte, 1, MAXSIZE, fpFile); fclose(fpFile); // nBytesRead cannot exceed MAXSIZE so we do not do ultimate bounds checking for (nCurByte = 0; nCurByte < nBytesRead; nCurByte += LINE_LN) { // prints the line number as a multiple of 16 printf("%04x\t", nCurByte); for (nByteOffset = 0; nByteOffset + nCurByte < nBytesRead; nByteOffset++) { // prints the current byte printf("%02x", acByte[nByteOffset +......

Words: 256 - Pages: 2

Free Essay

Re: Lesson 06 Discussion Question

...Investigations 3 Understanding Storage Formats for Digital Evidence • Three formats – Raw format – Proprietary formats – Advanced Forensics Format (AFF) Guide to Computer Forensics and Investigations 4 Raw Format • Makes it possible to write bit-stream data to files • Advantages – Fast data transfers – Can ignore minor data read errors on source drive – Most computer forensics tools can read raw format • Disadvantages – Requires as much storage as original disk or data – Tools might not collect marginal (bad) sectors Guide to Computer Forensics and Investigations 5 Proprietary Formats • Features offered – Option to compress or not compress image files – Can split an image into smaller segmented files – Can integrate metadata into the image file • Disadvantages – Inability to share an image between different tools – File size limitation for each segmented volume Guide to Computer Forensics and Investigations 6 Advanced Forensics Format • Developed by Dr. Simson L. Garfinkel of Basis Technology Corporation • Design goals – Provide compressed or uncompressed image files – No size restriction for disk-to-image files – Provide space in the image file or segmented files for metadata – Simple design with extensibility – Open...

Words: 2803 - Pages: 12