Tags

    Week 3, class 1 (3.1)

    Comments

    /groups/advancedcomputerscience/search/index.rss?tag=hotlist/groups/advancedcomputerscience/search/?tag=hotWhat’s HotHotListHot!?tag=hot1/groups/advancedcomputerscience/sidebar/HotListairport extreme setup pagesadminadmin2014-09-22 19:45:24+00:002014-09-22 19:45:24updated4Added tag - hotadminadmin2014-09-22 19:45:23+00:002014-09-22 19:45:23addTag3adminadmin2014-09-22 19:45:09+00:002014-09-22 19:45:09updated2First createdadminadmin2014-09-22 19:38:45+00:002014-09-22 19:38:45created1wiki2014-09-22T19:45:24+00:00groups/advancedcomputerscience/wiki/0554cFalseairport setup pages/groups/advancedcomputerscience/wiki/0554c/airport_setup_pages.htmladmin4 updatesairport setup pages Basic Airport extreme setup pages, using utility 6.3.2 Basic config screen, notice MAC addresses of clients: [Screen Shot 2014-09-...Falseadmin2014-09-22T19:45:24+00:00hot/groups/advancedcomputerscience/search/index.rss?sort=modifiedDate&kind=all&sortDirection=reverse&excludePages=wiki/welcomelist/groups/advancedcomputerscience/search/?sort=modifiedDate&kind=all&sortDirection=reverse&excludePages=wiki/welcomeRecent ChangesRecentChangesListUpdates?sort=modifiedDate&kind=all&sortDirection=reverse&excludePages=wiki/welcome0/groups/advancedcomputerscience/sidebar/RecentChangesListmodifiedDateallRecent ChangesRecentChangesListUpdateswiki/welcomeNo recent changes.reverse5search

    Unix war games———


    Victim computer:

    1. login as yourself (admin)

    2. create a user called “test” with a generic password (you will erase this user when done)

    3. endow this user with admin rights

    4. see if you can monitor what this user does as he/she attacks your computer (try history and tail -f)


    Attacking computer:

    1. ssh to the victim machine as test

    2. check with the user that you can shutdown the computer in 1 minute, with a restart

    3. make the victim machine say something interesting

    4. open an application on the victim machine

    5. run software update on the victim machine

    6. create a directory of your choosing, and create a document inside this folder with a secret message


    Victim user:

    1. determine who is attacking you, and from which IP address

    2. go to top and ps to find the user logged in

    3. kill the intruder’s opened program

    4. find their new folder

    5. read the secret message

    6. alter the message, copy to a new document (you will upload later to their machine)

    7. kill the intruder

    8. counter-attack the intruder, doing the same steps