Practical Lecture 1 Dr. John P. Abraham Professor UTPA
Chapter 1 Dealt with setting up networks
Chapter2 Process Explorer Starting a program remotely. –I might ask you how to do this on the test Killing a process tree – why? Signed and unsigned programs –Know how to check for this and the differences Validating downloaded program using winSCP Installing active directory domain services
Chapter 3 Windows 2008 Security configuration Wizard. –New security policy creation –Rolling back security configurations –Creating a security template Applying security settings from a template –Analyzing security configurations –Auditing object access
Chapter4 DNS Old way – look up file on each machine called the host file
Host file C:\Windows\System32\drivers\etc # Copyright (c) Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a '#' symbol. # # For example: # # rhino.acme.com # source server # x.acme.com # x client host localhost ::1 localhost
Detecting unautherized changes to system files md5deep Installing IIS and FTP service –Learn to use FTP services Wireshark Capturing and analyzing telnet traffic