Free Essay

Linux Chapter 12 and 13

In:

Submitted By theswitisreal
Words 926
Pages 4
Review Questions
2. B
4. B
6. A, C
8. B, C
10. A
12. B
14. True
16. D
18. A
20. A, C, D
Hands On Projects
12-1
1. OK 2. OK 3. Just one device, eth0 for the Ethernet. Just one driver for that device. 4. Most likely when the system was first installed. OK 5. OK 6. OK 7. 8. OK 9. OK 10. The old one as the script has not been read since it was modified. OK 11. OK 12. The new one as the modified script was read at boot.Yes 13. OK 14. OK 15. The modified configuration. 16. OK

12-2 1. OK 2.

3. No DNS servers have been setup. 4. Files then dns. 5. an entry for: 127.0.0.1 server1 localhost.localdomain localhost 6. Yes 7. Yes 8. Yes it was resolved, but not available to contact. 9. Yes it was resolved, but not available to contact. 10. OK
12-3
1. OK 2. 204.152.189.116, yes, zeus-pub.kernel.org. 3. nslookup lists the IP of your DNS server. 4. Detailed query information and statistics. 5. OK
12-4
1. OK 2. 10.0.2.2 3. OK 4. Yes it will interfere with the default gateway. 5. 30 6. No, and at least 1. 7. Ok
Discovery Assignments
1.
Subnet mask = 255.240.0.0
Hosts per network = 220-2
First five ranges are:
100.0.0.1–100.15.255.254
100.16.0.1–100.31.255.254
100.32.0.1–100.47.255.254
100.48.0.1–100.63.255.254
100.64.0.1–100.79.255.254

2.
The cat command is run on the remote system; to display the results of a text file to the local terminal on your machine, you just save this to a file on the local machine instead using redirection. The cat command cannot be used to save a binary file in this manner as it only works on text files.
3. You must first purchase a domain from a domain registrar such as godaddy.com or networksolutions.com. There are lots of them and you can simply Google "domain registrar" to find one. A couple domain names available would be, www.superdupernoobpwnerpooper.com www.whereismyface.com, and finally, www.isthisreallifeoramijusthigh.com

Chapter 13
Review Questions
2. D
4. False
6. B
8. B, C
10. True
12. True
14. True
16. A
18. A
20. D
Hands On Projects
13-1
1. OK 2. OK 3. OK 4. OK 5. OK 6. OK 7. OK 8. OK 9. OK 10. OK

13-2 1. OK 2. OK 3. OK 4. OK 5. OK 6. OK 7. 1 Hour is the default TTL is how long data will remain in other name servers cache. 8. The two records include, Zone Authority Information (SOA) and Name Server localhost (NS) 9. OK 10. OK 11. OK 12. OIK 13. YES 14. YES 15. OK 16. OK 17. OK 18. OK 19. OK 20. YES because we just added it. 21. YES because we just added it. 22. YES because we just added it. 23. YES with % Packet loss. It was transmitted from ds-any-fp3-real.wal.b.yahoo.com 24. YES. 25. YES AND YES 26. No 27. NO 28. The names of the resources. 29. OK
13-3
1. OK 2. There are no runlevels with the ntp daemon. All of them are off. 3. OK 4. OK 5. OK I was able to get the offset to -0.000905. 6. OK, I was surprised to see there’s 3 servers I’m synched to. 7. OK
13-4
1. OK 2. /var/www/html 3. Index.html index.html.var 4. Apache 5. Apache 6. NO 7. The Apache Daemons were started. 8. OK 9. OK 10. Yes 11. .054 ms 12. N/A 13. OK 14. Yes 15. NO 16. OK 17. Yes 18. The root admin owns it and it uses other. 19. Forbidden 20. OK 21. OK 22. OK 23. OK
13-5
1. OK 2. OK 3. OK 4. Samba and NETBIOS daemons. 5. Yes, Yes. 6. OK 7. Yes 8. OK 9. OK 10. No 11. OK 12. YES 13. OK 14. YES 15. OK 16. OK
13-6
1. OK 2. NO and OK 3. OK 4. OK 5. Yes, SSH, internet, ipp, apache. 6. The NFS filesystem. 7. The mounted directory of NFS and YES they are identical. 8. OK 9. OK
13-7
1. OK 2. OK 3. OK 4. OK 5. OK 6. OK 7. OK 8. OK 9. YES 10. OK 11. OK 12. OK 13. OK 14. YES 15. OK 16. OK 17. OK 18. OK 19. YES 20. YES 21. Wrong Directory 22. OK 23. OK 24. OK 25. OK 26. OK 27. OK 28. OK 29. OK 30. FTP dir 31. Root Dir 32. OK
13-8
1. OK 2. Yes 3. OK 4. OK 5. OK 6. OK 7. Yes it shows up 220 localhost.localdomain ESMTP Sendmail 8.14.4/8.14.4 8. No it doesn’t, the command was unrecognized. 9. OK
13-9
1. OK 2. No it isn’t installed. 3. OK 4. OK 5. OK 6. OK 7. OK 8. OK 9. OK 10. OK 11. YES 12. 70 characters 13. OK 14. OK 15. OK 16. OK 17. OK 18. OK 19. OK 20. OK 21. OK 22. OK
Discovery Questions
1. OK
2. OK
3. OK
4. OK

Similar Documents

Premium Essay

Chapter 13

...Capter 2 CHAPTER 13 Post Exploitation South Texas College Advance Network Security CHAPTER 13 Contents Introduction ...................................................................................................................................................................3 I. Exploiting XP .........................................................................................................................................................4 II. Exploiting Ubuntu ...............................................................................................................................................20 Summary ......................................................................................................................................................................39 1 CHAPTER 13 2 CHAPTER 13 Introduction In the post-exploitation phase, we will look at information gathering on the exploited systems, privilege escalation. Perhaps we’ll find that we can access sensitive data stored on the exploited system. Maybe the exploited system is part of a domain, and we can use it to access other systems on the domain. These are just a few of the potential avenues open to us in post exploitation. Post exploitation is arguably the most important way to get a clear picture of a client’s security posture. 3 CHAPTER 13 I. Exploiting XP Kalis IP Address 4 CHAPTER 13 Windows XP IP Address 5 CHAPTER...

Words: 857 - Pages: 4

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights reserved...

Words: 38351 - Pages: 154

Free Essay

Nt1430 Week 1 Hw

...NT1430 12/15/13 Chapter 1 #1, 4 1. Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, users must be allowed to redistribute modified versions under the same terms/licensing, and you can not restrict people from redistributing/modifying/using the software. 4. GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed by Richard Stallman. Linux is the name of operating system kernel developed by Linus Torvalds. GNU's tools aside the Linux kernel make the operating system known as “Linux” aka “GNU/Linux”. Thousands, possibly hundreds of thousands, of people helped refine the operating system because it was distributed freely online. Chapter 2 # 1 1. Installing Fedora/RHEL uses the process of copying operating system files from a CD, DVD, or USB flash drive to the hard disk on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible including fresh installations, upgrades from older releases of Fedora, and dual-boot. Chapter 3 #1, 4, 8 1. A live system gives you a chance to preview Fedora without installing it. It does not write/install to hard disks. 4. Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive. 8. When the system...

Words: 470 - Pages: 2

Premium Essay

Redhat

...edhat® ® Te r r y C o l l i n g s & K u r t W a l l UR ON IT OOLS IN Y T C E CD-R L TH O ED UD M Linux Solutions from the Experts at Red Hat ® ® P R E S S™ SEC Red Hat® Linux® Networking and System Administration Red Hat® Linux® Networking and System Administration Terry Collings and Kurt Wall M&T Books An imprint of Hungry Minds, Inc. Best-Selling Books G Digital Downloads G e-Books G Answer Networks e-Newsletters G Branded Web Sites G e-Learning New York, NY G Cleveland, OH G Indianapolis, IN Red Hat® Linux® Networking and System Administration Published by Hungry Minds, Inc. 909 Third Avenue New York, NY 10022 www.hungryminds.com Copyright © 2002 Hungry Minds, Inc. All rights reserved. No part of this book, including interior design, cover design, and icons, may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording, or otherwise) without the prior written permission of the publisher. Library of Congress Control Number: 2001093591 ISBN: 0-7645-3632-X Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/RT/QT/QS/IN Distributed in the United States by Hungry Minds, Inc. Distributed by CDG Books Canada Inc. for Canada; by Transworld Publishers Limited in the United Kingdom; by IDG Norge Books for Norway; by IDG Sweden Books for Sweden; by IDG Books Australia Publishing Corporation Pty. Ltd. for Australia and New Zealand; by TransQuest Publishers Pte Ltd. for Singapore, Malaysia, Thailand...

Words: 220815 - Pages: 884

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Premium Essay

Advanced Routing

...Linux Advanced Routing & Traffic Control HOWTO Bert Hubert Netherlabs BV Gregory Maxwell Remco van Mook Martijn van Oosterhout Paul B Schroeder Jasper Spaans Revision History Revision 1.1 DocBook Edition 2002−07−22 A very hands−on approach to iproute2, traffic shaping and a bit of netfilter. Linux Advanced Routing & Traffic Control HOWTO Table of Contents Chapter 1. Dedication.........................................................................................................................................1 Chapter 2. Introduction ......................................................................................................................................2 2.1. Disclaimer & License.......................................................................................................................2 2.2. Prior knowledge................................................................................................................................2 2.3. What Linux can do for you...............................................................................................................3 2.4. Housekeeping notes..........................................................................................................................3 2.5. Access, CVS & submitting updates..................................................................................................3 2.6. Mailing list..............................................

Words: 28706 - Pages: 115

Free Essay

A Hands on Intro to Hacking

...transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in USA First printing 18 17 16 15 14   123456789 ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066 I. Title. No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol...

Words: 117203 - Pages: 469

Free Essay

Computer Analysis

...Fedora 12 Security-Enhanced Linux User Guide Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric Paris James Morris Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Edition 1.4 Author Author Author Author Author Author Copyright © 2009 Red Hat, Inc. Copyright © 2009 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. All other trademarks are the property of their respective owners...

Words: 26838 - Pages: 108

Premium Essay

Quartus Installation Instructions

...com/common/legal.html. Altera warrants performance of its semiconductor products to current specifications in accordance with Altera's standard warranty, but reserves the right to make changes to any products and services at any time without notice. Altera assumes no responsibility or liability arising out of the application or use of any information, product, or service described herein except as expressly agreed to in writing by Altera. Altera customers are advised to obtain the latest version of device specifications before relying on any published information and before placing orders for products or services. ISO 9001:2008 Registered November 2011 Altera Corporation Altera Software Installation and Licensing Manual Contents Chapter 1. Installing Altera Software Altera Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–1 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2 Cables and Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 14842 - Pages: 60

Free Essay

Essay

...Guide to Linux+ ISBN 0-619-21621-2 End of Chapter Solutions Chapter 3 Solutions Review Questions 1. What is the default shell in Linux called? a. SH b. BSH c. CSH d. BASH Answer: d 2. What equivalent to the man command generally provides an easier-to-read description of the queried command and also contains links to other related information? a. who b. man help c. man -descriptive d. info Answer: d 3. What command can you use to safely shut down the Linux system immediately? a. shutdown -c b. shutdown -r c. down d. halt Answer: d 4. What command is equivalent to the man –k keyword command? a. find keyword b. man keyword c. apropos keyword d. appaloosa keyword Answer: c 5. The Red Hat Fedora installation can be performed in which two of the following modes? a. text b. full c. subtext d. graphical e. administrator assisted Answer: a,d 6. Linux commands entered via the command line are not case sensitive. True or False? Answer: False 7. Which command blanks the terminal screen erasing previously displayed output? a. erase b. clean c. blank d. clear Answer: d 8. When sitting at a computer running Linux, what key combination is pressed to open the graphical terminal? a. Ctrl+Alt+F1 ...

Words: 1133 - Pages: 5

Premium Essay

Using Linux

...Guide to Linux+ (2nd Edition) ISBN 0-619-21621-2 End of Chapter Solutions Chapter 1 Solutions Review Questions 1. Every computer consists of physical components and logical components. The logical components of a computer that understand how to work with the physical components are referred to as: a. hardware b. records c. software d. processors Answer: c 2. The operating system software is necessary for a computer to function. True or False? Answer: True 3. Linux is a ___________ and ___________ operating system. a. production, stable b. multiuser, multitasking c. processing, operating d. large, useful Answer: b 4. The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need to have support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules Answer: a, c 5. Which of the following kernels are developmental kernels? (Choose all that apply.) a. 2.3.4 b. 2.5.5 c. 2.2.7 d. 2.4.4 Answer: a, b 6. A production kernel refers to a kernel whose: a. revision number is even b. minor number is odd ...

Words: 1315 - Pages: 6

Premium Essay

Dfsdfsd.Pdf

...Guide to Linux+ (2nd Edition) ISBN 0-619-21621-2 End of Chapter Solutions Chapter 1 Solutions Review Questions 1. Every computer consists of physical components and logical components. The logical components of a computer that understand how to work with the physical components are referred to as: a. hardware b. records c. software d. processors Answer: c 2. The operating system software is necessary for a computer to function. True or False? Answer: True 3. Linux is a ___________ and ___________ operating system. a. production, stable b. multiuser, multitasking c. processing, operating d. large, useful Answer: b 4. The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need to have support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules Answer: a, c 5. Which of the following kernels are developmental kernels? (Choose all that apply.) a. 2.3.4 b. 2.5.5 c. 2.2.7 d. 2.4.4 Answer: a, b 6. A production kernel refers to a kernel whose: a. revision number is even b. minor number is odd ...

Words: 1315 - Pages: 6

Premium Essay

Class Notes - Networking

...PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Essential Linux Administration: A Comprehensive Guide for Beginners Page 1 of 4 PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. ESSENTIAL LINUX ® ADMINISTRATION: A COMPREHENSIVE GUIDE FOR BEGINNERS i CHUCK EASTTOM WITH SERGE PALLADINO Course Technology PTR A part of Cengage Learning 9781133795308 i ii Essential Linux Administration: A Comprehensive Guide for Beginners Chuck Easttom with Serge Palladino Publisher and General Manager, Course Technology PTR: Stacy L. Hiquet Associate Director of Marketing: Sarah Panella Manager of Editorial Services: Heather Talbot Marketing Manager: Mark Hughes Acquisitions Editor: Heather Hurley Project and Copy Editor: Marta Justak Technical Reviewer: Danielle Shaw Interior Layout Tech: MPS Limited, a Macmillan Company Cover Designer: Mike Tanamachi Indexer: Sharon Shock Proofreader: Kelly Talbot © 2012 Course Technology, a part of Cengage Learning. ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording...

Words: 34239 - Pages: 137

Free Essay

Linux Final

...Chapter 7 2. Before a user-defined variable can be used by processes that run in subshells, that variable must be ___c. exported_. 4. Which of the following files is always executed immediately after a user logs in to a Linux system and receives a BASH shell? a. /etc/profile 5. Which command could you use to see a list of all environment and user-defined shell variables as well as their current values? c. set 6. Every if construct begins with if and must be terminated with __d. fi. 12. How do you indicate a comment line in a shell script? d. Begin the line with #. Chap 8 4. Which runlevel halts the system? a. 1 5. Which file does init reference on startup to determine the default runlevel? d. /etc/inittab 6. Which two commands entered at a command prompt can be used to start X Windows, the window manager, and the default desktop environment? b. gdm c. startx 11. How many active partitions are allowed per hard disk drive? c. 1 15. In what directory is the Linux kernel stored? a. /boot Chap 9 1. Which command entered without arguments is used to display a list of processes running in the current shell? d. ps 4. Which process will always have a PID of 1 and a PPID of 0? c. init 5. A process spawning or initiating another process is referred to as _b. forking ____. 9. The at command is used to __c. schedule processes to run at a single instance in the future_. 11. Every process has a process ID and a ___d. parent process ID_. Chap 10 ...

Words: 500 - Pages: 2

Premium Essay

Os and Utilities

...systems Explain the purpose of several utility programs See Page 397 for Detailed Objectives Discovering Computers 2012: Chapter 8 2 System Software • System software consists of the programs that control or maintain the operations of the computer and its devices Operating systems Page 398 Utility Programs Discovering Computers 2012: Chapter 8 3 Operating Systems • An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources Start and shut down a computer Coordinate tasks Provide a user interface Manage programs Establish an Internet connection Control a network Manage memory Configure devices Monitor performance Provide utilities Pages 398 - 399 Automatically update Administer security 4 Discovering Computers 2012: Chapter 8 Operating Systems Pages 398 – 399 Figure 8-1 Discovering Computers 2012: Chapter 8 5 Operating System Functions • The process of starting or restarting a computer is called booting Cold boot • Turning on a computer that has been powered off completely Page 400 Figure 8-2 Warm boot • Using the operating system to restart a computer Discovering Computers 2012: Chapter 8 6 Operating System Functions Page 401 Figure 8-3 Discovering Computers 2012: Chapter 8 7 Operating System Functions A boot drive is the drive from which your...

Words: 1834 - Pages: 8