Chapter 3 Unix Overview. Figure 3.1 Unix file system.

Slides:



Advertisements
Similar presentations
Chapter 2 Booting and Shutting Down Kim Grempler (Sections 2.0 to 2.3) Leon Dague (Sections 2.4 to 2.7)
Advertisements

Detecting Intruders from log files and traces Special Intruder Detection Systems (IDS) are now a market niche, and there are many products on the market.
153 Configuring and Securing ARPA/Berkeley Services Version A.01 H3065S Module 13 Slides.
Unix Refresher This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
Netprog: daemons and inetd1 Daemons & inetd Refs: Chapter 13.
Homework 5b: Samba. Computer Center, CS, NCTU 2 Network-based File Sharing (1)  NFS (UNIX-based) mountd is responsible for mount request nfsd and nfsiod.
Linux and UNIX Overview 1 Linux and UNIX Overview.
Unix Network Programming Chapter 13: Daemon processes and the inetd superserver Jani Peusaari.
Daemon Processes and inetd Superserver
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 11.
Jai, 2004 Incident Response & Computer Forensics Chapter 6 Live Data Collection from Unix Systems Information Networking Security and Assurance Lab National.
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Unix System.
Information Networking Security and Assurance Lab National Chung Cheng University Live Data Collection from Unix Systems.
Linux+ Guide to Linux Certification, Second Edition
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
Network File System (NFS) in AIX System COSC513 Operation Systems Instructor: Prof. Anvari Yuan Ma SID:
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
Chapter 11 Phase 5: Covering Tracks and Hiding. Attrition Web Site  Contains an archive of Web vandalism attacks
1 COP 4343 Unix System Administration Unit 16: file server – samba.
1 Network File Sharing. 2 Module - Network File Sharing ♦ Overview This module focuses on configuring Network File System (NFS) for servers and clients.
1 COP 4343 Unix System Administration Unit 15: file server – ftp – nfs.
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
Linux Security Anthony Albrecht – Services & Accounts
ITI-481: Unix Administration Meeting 5. Today’s Agenda Network Information Service (NIS) The Cron Program Syslogd and Logging.
Network Services CSCI N321 – System and Network Administration Copyright © 2000, 2007 by Scott Orr and the Trustees of Indiana University.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
ITI-481: Unix Administration Meeting 3. Today’s Agenda Hands-on exercises with booting and software installation. Account Management Basic Network Configuration.
Bugs SATAN scans for It is interesting to look at the bugs SATAN scans for. They are easily detected by the scanners and therefore do not pose a threat.
Inetd...Server of Servers Looks at a number of ports Determines when a service is needed on any of those ports Calls the appropriate server Restarts new.
Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Linux Introduction What is Linux? How do you use it?
Linux Security. See who's logged in 1) w (more information) 2) who (less information)
CENT 305 Information Systems Security Overview of System Logging syslog 1.
 FreeBSD firewalls › ipfw -- IP firewall and traffic shaper control program  ipfw(8) › ipf (IP Filter) - alters packet filtering lists for IP packet.
Linux Architecture Overview 1. Initialization Uboot – hardware init, loads kernel Kernel – remaining initialization, calls “init” Init – 1 st process,
Berkeley R Utilities & the new S Utilities The Unix (or Berkeley) r utilities provide an alternative to IP facilities telnet and ftp. Three programs: rlogin.
Cracking Techniques Onno W. Purbo
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Other useful commands netstat ps tail kill. netstat Print network connections, routing tables, interface statistics, masquerade connections, and multicast.
Core System Services. INIT Daemon The init process is the patron of all processes. first process that gets started in any Linux/ UNIX -based system.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
1 Daemons & inetd Refs: Chapter Daemons A daemon is a process that: –runs in the background –not associated with any terminal Unix systems typically.
Phil Hurvitz Securing UNIX Servers with the Secure.
Daemons Ying Zhang CMSC691X, Summer02. Outline  Introduction  Init and Cron  System daemons  Print daemons and NFS daemons  Time synchronization.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
Agenda Networking with Linux & UNIX OS –Overview –Setup –Common Utilities.
Linux Architecture Overview.
Unit – 5 FTP Server. FTP Introduction One of the oldest and most commonly used protocols The original specification for the File Transfer Protocol was.
Unix System Administration Chapter 31 Daemons. Out of the Goo, the Primordial Process l Init l Always the first process to run after system boot l Always.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
Getting Started with Linux
Linux and UNIX Overview
UNIX Introduction History Main Features UNIX Operating System
LINUX ADMINISTRATION
Exercise 7 Samba.
Onno W. Purbo Cracking Techniques Onno W. Purbo
LINUX ADMINISTRATION 1
Overview of Unix Jagdish S. Gangolly School of Business
Network Services CSCI N321 – System and Network Administration
UNIX Services and Daemons
Network Services.
NFS.
Daemons & inetd Refs: Chapter 12.
The Attack and Defense of Computers
數位芝麻網路公司 蔡志展 2001/8/18 CVS Setup 數位芝麻網路公司 蔡志展 2001/8/18.
IS 4506 Configuring the FTP Service
Presentation transcript:

Chapter 3 Unix Overview

Figure 3.1 Unix file system

Table 3.1 Important Directories in the Unix file system DirectoryPurpose /The root directory /bin or /sbinCritical executables needed to boot the system /devDevice drivers /etcSystem configuration files such as passwords, network addresses and names,system startup scripts /homeUser home directories /libShared libraries used by programs /mntTemporary mount point for file systems /procImages of currently executing processes on the system /tmpTemporary files /usrA variety of critical system files, including system utilities (/usr/bin), and administration executables (/usr/sbin) /varStores varying files such as /var/log, /var/mail

Figure 3.2 Unix Architecture

Figure 3.3 Relationship between init, inetd, and various network services

Sample /etc/inetd.conf file containing services spawned by inetd /etc/inetd.conf file format Service name (port # defined in /etc/services) Socket type (stream or dgram) Protocol (tcp, udp, rpc/tcp, or rpc/udp) Wait status (wait or nowait) Username (service run as) Server program Server program arguments Use of inetd.conf to create backdoor listeners and attack relays

Common Unix Administration Tasks  Vulnerability of using “.” in your search path $PATH  Showing all running processes ps –aux ps –aef  Killing/restarting processes kill –HUP pid killall –HUP inetd  /etc/passwd file  Unix permissions rwxrwxrwx chmod command

Common Unix Administration Tasks (cont.)  SetUID programs –Executes with permissions of its owner, not of its user –/etc/passwd setUID root r-s--x--x –Creating setUID files #chmod 4741 foo  Finding setUID files  Vulnerability of setUID programs

Unix Trust  Authenticating users on behalf of another machine  R-commands –rlogin –rsh –rcp  Weakness of r-commands –Actions based on IP address of trusted machine –Undermining r-commands via IP address spoofing

Logs and Auditing  Syslog daemon –Syslogd  /etc/syslog.conf  /var/log –/var/log/messages –/var/log/http  Accounting files –Utmp Records who is currently logged into a system used by who command –Wtmp records all logins and logouts used by last command –lastlog Records time and location of each user’s last login to system

Network File System (NFS)  mountd  Nfsd  Share only folders that require sharing  Export files only to hosts requiring access  Carefully assign permissions to shared files  Avoid NFS sharing across the Internet  Alternatives –Secure ftp –IPSec-based VPN