Chapter 10 Flashcards

Administering Network Security (39 cards)

1
Q

what is a super server or a super daemon

A
  • > a program that listens for network connections on behalf of other programs
  • > when connection is initiated connection is handed to the intended server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

name Linux’s 2 primary super daemons

A
  • > inetd

- > xinetd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which of the two primary super daemons are legacy

A

inetd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what file control launched services of inetd

A

/etc/inetd.conf
or
/etc/inetd.d/.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does a typical inetd line look like?

A

ftp stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.ftpd -l

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how did the inetd program work

A

it called tcpd which did two things

  • > check if client is authorised to use system
  • > if authorized ut called the program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

where do we still see tcp wrappers

A
  • > ftp server, vsftp

- > if tcp wrappers are used, then the libwrap library is used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how do you determine a network uses tcp wrappers

A

idd Network Service Daemon | grep libwrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

where is tcp wrappers configured

A
  • > /etc/hosts.allow

- >/etc/hosts.deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

if a host is listed in both /etc/hosts.allow -.deny what happens

A

allow takes precedence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the format of /etc/hosts.allow -.deny

A

daemon-list : client-list

daemon list are listed in /etc/services

leading trailing dot specifies networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how do you place an exception in /etc/hosts.allow -.deny

A

[…] : 192.168.7. EXCEPT 192.168..7.105

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is xinetd

A
  • > extended super daemon
  • > provides inetd legacy features
  • >
    • security options
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which file controls the xinetd super daemon

A

/etc/xinetd.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does the bind option do via xinetd

A

tels xnetd to listen only on one network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

name xinetd options

A
  • > bind
  • > only_from
  • > no_access
  • > access_time
17
Q

where must you set the xinetd features

A

/etc/xinetd.d/ and place between { … }

if you want to restrict all xinetd servers place it in /etc/xinetd.conf

18
Q

name security audit tools

A
  • > netstat
  • > lsof
  • > remote network scanners
  • > nmap
  • > fuser
19
Q

what doe the netstat -ap command do

A

active network sockets that can reveal running servers

20
Q

what does the lsof program do

A

lists nomily open files

  • used to identify what programs are open in a dir
  • > def of file is broad for lsof
  • > can be used to check ports
21
Q

what does the ls -i option do

22
Q

how do you use lsof to check ftp servers

A
# lsof -i :fpt
-> ftp can be replaced with 21, ftp port number
23
Q

what type of utility is nmap

A

remote network scanner

  • > easy to use
  • > security audits on your system
24
Q

what can nmap do

A

check for open ports

25
how do you do a simple audit with nmap
nmap -sT 127.0.0.1 | 1st run should be on loop back to see what network services are running on your system without firewall interfering
26
how do you see the services can be reached outside the firewall
nmap -sT 192.168.0.1 -> system ip
27
what is nmap graphical user interface build
Nessus
28
what does fuser do
determine processes currently using ports
29
how do you issue a fuser command
fuser 22/tcp
30
how do you user fuser to see what is accessing por 631 using udp
$ sudo fuser -nv udp 631
31
how do you move /etc/password passwords to /etc/shaddow
pwconv
32
what are the standard password hashes for linux
- >md5 | - >sha
33
how do you run a single program with root permissions
su -c -"lsof -i"
34
where does you system store log entries of uses to sudo
/var/log/secure
35
where do you edit what tasks users may perform sudo
/etc/sudoers
36
how do you determine who is logged on
$ who | $ w
37
describe the who command
show - >who is logged on - >username - > current terminal - > time they logged on
38
describe the w command
- > who is logged on - > what they are doing - >CPU usage
39
what does the last command do?
provide current and historic data concerning users