Mid 1960 ’ s - Multics - proposed by AT&T, Honeywell, GE & MIT; funded by DARPA 1969 - Thompson & Ritchie create Unix 1978 to 84 - Bill Joy & Chuck Haley.

Slides:



Advertisements
Similar presentations
6 UNIX Network Utilities Mauro Jaskelioff. Introduction Overview of computer networks Network related utilities –Accessing a remote computer –Transferring.
Advertisements

1 Introduction to UNIX Ke Liu
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Lesson 22 – Introduction to Linux Systems Administration.
Linux+ Guide to Linux Certification, Second Edition
Guide To UNIX Using Linux Third Edition
Linux+ Guide to Linux Certification, Second Edition
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
ENGINEERING COMPUTING CENTER LINUX workshop
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
CS 350 Chapter-6. A brief history of TCP/IP 1983 TCP/IP came to ARPAnet ARPAnet and MILNET dissolved in 1990 BSD UNIX.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
O.S security Ge Zhang Karlstad University. Outline Why O.S. security is important? Security schemes in Unix/Linux system Security schemes in windows system.
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
Computation for Physics 計算物理概論 Introduction to Linux.
Overview of Linux CS3530 Spring 2014 Dr. José M. Garrido Department of Computer Science.
1 THE UNIX FILE SYSTEM By Chokechai Chuensukanant ID COSC 513 Operating System.
Lesson 7-Creating and Changing Directories. Overview Using directories to create order. Managing files in directories. Using pathnames to manage files.
Computation for Physics 計算物理概論 Introduction to Linux.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
1 Web Server Administration Chapter 9 Extending the Web Environment.
The Saigon CTT Chapter 16 Remote Connectivity. The Saigon CTT  Objectives  Explain : telnet rsh ssh  Configure FTP.
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
1 Version 3.0 Module 11 TCP Application and Transport.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Session 2 Wharton Summer Tech Camp Basic Unix. Agenda Cover basic UNIX commands and useful functions.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
TCP/IP (Transmission Control Protocol / Internet Protocol)
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
Linux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Introduction to Programming Using C An Introduction to Operating Systems.
Managing Files CSCI N321 – System and Network Administration Copyright © 2000, 2007 by the Trustees of Indiana University except as noted.
Basic of UNIX For fresh members of SPARCS
CITA 310 Section 8 Extending the Web Environment (Textbook Chapter 9)
Linux Operations and Administration
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Linux A practical introduction. 1)Background and Getting Started Linux is an operating system with multiple providers Red Hat/CentOS (our version) Ubuntu.
1 Introduction to Unix. 2 What is UNIX?  UNIX is an Operating System (OS).  An operating system is a control program that helps the user communicate.
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
1 CS3695 – Network Vulnerability Assessment & Risk Mitigation – Introduction to Unix & Linux.
Karlstad University Operating System security Ge Zhang Karlstad University.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Getting Started with Linux
Overview of Linux Fall 2016 Dr. Donghyun Kim
UNIX Introduction History Main Features UNIX Operating System
Unit 4: Transport protocols
Web Server Administration
Unix Access Control Basic CE 2
Web Programming Essentials:
Security and File Permission
Adding New Users.
Chapter 7 Network Applications
Computer Networks Protocols
Presentation transcript:

mid 1960 ’ s - Multics - proposed by AT&T, Honeywell, GE & MIT; funded by DARPA Thompson & Ritchie create Unix 1978 to 84 - Bill Joy & Chuck Haley (Berkeley U.) create BSD Unix Unix Wars I - BSD 4.2 versus System V Unix Wars II - SVR4 versus OSF ISO Standard - POSIX Linus Torvalds creates Linux

BSD Mach System V HP-UXAIX OSF/1 SunOS Solaris NeXTStep Free BSD OS X Linux

Authentication Admin File Systems Network-related Audit

UID /etc/passwd UserName :*: UID : GID : FullName : UserDir : UserShell entry: GID passwords encrypted via crypt() salt 16-bits ID reserved ID 0 is root 16 or 32 bits /etc/group stores local groups wheel group for system administrators

Standard Users root - superuser account daemon - executes as background process - handles system events such as print spooling lp - print server process guest - generic visitor account nobody - default user for unprivileged access - user owns no files mail - system account for processing sshd - for running secure shell tasks www - for running a web server

shell commands command line interface Born (sh), c-shell (csh), tc-shell (tcsh) ls -- list directory information cd -- set current directory pwd -- display current directory cat -- display contents of textfile whoami -- display current user su -- log in as a different user (will be prompted for password) man -- give help on command sudo -- execute a single command as root (must specify password)

ufs ffs  original Unix File System  first tree-structured directory system  Fast File System  allows longer file names (255 chars rather than 14)  supports symbolic links inodes  separate inode (index node) per file/directory  an inode has an address (index) but no name  each inode resides on the disk  contents: address of associated item (file/directory) item type item size (in bytes) time of last inode modification time of last modification of item (mtime) time of last item access (atime) reference count (number of names for this inode) item ’ s UID item ’ s primary GID directory ...consists of a list of pairs: name - inode index item ’ s mode bits (permissions)

standard directory entries shell commands. refers to this directory ’ s inode.. refers to inode of the parent of this directory cp -- copy (duplicate) file mv -- move file from one directory to another mkdir -- create new directory ln -- create new link (use -s flag for symbolic link) rm -- remove one name rmdir -- log in as a different user (will be prompted for password) chown -- change owner of file/directory chmod -- change mode (permissions) for a file umask -- set default mode (permissions) for this user

- rwx r-x --- t - file d directory c character device (tty, printer) b block device (disk, CD) l symbolic link s socket ownergroupworld Mode: sticky bit set GID set UID read (owner) write (owner) execute (owner) r read w write x execute s set (in place of x) Example t “ sticky ” bit

TCP Wrappers host-based firewalls a common way to secure network transmissions on some Unix versions when tcp wrappers are turned on... a) look in /etc/hosts.allow file for allowed firewall access results logged to syslog b) look in /etc/hosts.deny file for denied firewall access c) if no rules apply, then access is granted optionally sends banners to clients can transfer access to “ jail ” or “ faux ” Free BSD OS X varies with Linux

echo (UDP Port 7) ping command sends datagram to test connectivity systat (TCP Port 11) netstat command returns user names, login times, and so forth ftp (TCP Ports 20 & 21) file transfer protocol ftp transmits in plaintext - sftp encrypts anonymous ftp is a vulnerability ssh (TCP Port 2) secure shell for remote login uses symmetric encryption (ssh.config) requires that client have public key telnet (TCP Port 23) original remote login shell - uses plaintext

smtp (TCP Port 25) Simple Mail Transfer Protocol - Internet standard for transfer dns (TCP & UDP Port 53) Domain Name System (stay tuned) dhcp (UDP Ports 67 & 68) Dynamic Host Configuration Protocol IP address leasing utility finger (TCP Port 79) retrieves user info (name, location, login, telephone, and so forth http (TCP Ports 80 & 443) HypterText Transfer Protocol (WWW protocol) POP, POPS, IMAP, IMAPS (TCP Ports 109, 110, 143, 993 & 995) Post Office Protocol -- Internet Message Access Protocol snmp (UDP Ports 161 & 162) Simple Network Management Protocol remote system management tool rlogin & rsh (TCP Ports 513 & 514) more insecure login shells empty /etc/hosts.equiv