CourseName:Securing windows and Linux Course Code: CSB-472
Experiment:3.2
Aim: Understanding the Linux Client Configuration
Software Required: linux OS .
Description:
Linux configuration files are the heart of the Linux operating system. These files are one of
the biggest differences between the Linux and Windows operating systems. The Windows
OS does use per-application configuration files as well, but Windows largely depends on
something called the Registry. The Registry is an ultra-fast database that stores
configurations for the Windows OS and its applications.
Linux is much simpler. Configurations for applications in Linux are stored in individual
configuration files. This makes management of the Linux OS both much easier and more
difficult. These configuration options are easy to change as well as migrate to other systems,
but these files can be more tedious to document as well.
A configuration file, also known as a config file, is a local file that controls the operations of
a program, utility or process. Linux configuration files contain the settings and instructions
for different systems, utilities, applications and processes. They’re frequently plain-text files
that contain a variable name (the name of the setting) followed by it's value, commands or
instructions. Many Linux configuration files can be opened with a plain-text editor and
updated directly, though you will most likely be using a command-line editor like Nano or
Vim to edit these files.
Pseudo code/Algorithms/Flowchart/Steps:
Step 1: Start the Kali and Metasploitable PCs. Log on only to the Kali
PC. Step 2: View the network card configuration using ifconfig.
Step 3: Use the cat command to view the fi le resolv.conf to determine the DNS address.
Step 4: Use the netstat –nr command to determine the gateway router address.
Name: Shruti Ojha UID:19bcs1708
, CourseName:Securing windows and Linux Course Code: CSB-472
Step 5: Use the ifconfig command to change the network configuration for a machine.
Step 6: View the ARP table.
Step 7: Ping the Metasploitable machine by IP address and view the cache.
Step 8: Modify the ARP cache and view the ARP cache again.
Step 9: Log off from the Kali PC.
Implementation/Output:
Learning Outcome :
i: About linux commands.
ii: About linux client configuration.
Name: Shruti Ojha UID:19bcs1708
, CourseName: Securing Windows and Linux Course Code: CSB-472
Experiment 1.2
Aim: Knowledge about the CA server Using Certificates and SSL in windows.
Software Required:
1) Windows XP Pro
2) Windows Server
3) Ethereal for analyzing captured session
Description:
A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates
used to create digital signatures and encryption keys. The role of the CA in this process is to guarantee the
identity of the party granted the certificate. Usually, this means that the CA has an arrangement with a
financial institution that provides information to validate the grantee's identity
Pseudo code/Algorithms/Flowchart/Steps:
How to install an SSL certificate on a Linux Server USING Plesk.
It is a web hosting platform that has a very simple configuration. This simple configuration
helps all web hosting providers to manage a lot of virtual hosts easily and on a single server.
Ever since its conception, Plesk has been coming up as a preferred choice for all the web
hosting companies
1. First Log into the control panel of Plesk.
2. Then, Select Domain;
3. The third step implies choosing the domain to be updated.
4. In the next step click on the ‘Add New Certificate’ icon.
5. Save the certificate name in the ‘Certificate Name’ box.
Name: Shruti Ojha UID:19BCS1708
, CourseName: Securing Windows and Linux Course Code: CSB-472
One would have the certificate and key files saved on the local computer. These certificate
and key files are provided by the certificate authority and are important for the installation.
6. The next step is to find these files. Open these in a Notepad or in other similar text
formats from where one can copy the text.
7. Copy the entire text of the files.
8. Paste them in the correct boxes. Reading through the content and the box name in Plesk
will give one an idea where to paste it.
9. Next, click on the ‘Send Text’ button.
10. Go to the ‘Hosting Section’. It is on the domain screen.
11. Click ‘Set-up’ from this section. A drop down list will follow.
12. The next step is to click on the ‘new certificate’ from the drop down list.
13. Click ‘Ok’ to finish.
How to install SSL Certificate on Linux servers that do not have Plesk.
1. The first and foremost step is to upload the certificate and important key files. One can
upload the files to the server using – S/FTP.
2. Login to Server. It is important to log in via SSH. Logging in via SSH will help the user to
become the root user.
3. Give Root Password.
4. One can see /etc/httpd/conf/ssl.crt in the following step. Move the certificate file here
5. Next move key file also to /etc/httpd/conf/ssl.crt
It is important to ensure the security of the files that has been moved. One can keep the
files secure by restricting permission. Using ‘chmod 0400’ will help users to securely restrict
permission to the key.
6. Next Go to etc/httpd/conf.d/ssl.conf. Here the user will find Virtual Host Configuration
set up for the domain.
Name: Shruti Ojha UID:19BCS1708
Experiment:3.2
Aim: Understanding the Linux Client Configuration
Software Required: linux OS .
Description:
Linux configuration files are the heart of the Linux operating system. These files are one of
the biggest differences between the Linux and Windows operating systems. The Windows
OS does use per-application configuration files as well, but Windows largely depends on
something called the Registry. The Registry is an ultra-fast database that stores
configurations for the Windows OS and its applications.
Linux is much simpler. Configurations for applications in Linux are stored in individual
configuration files. This makes management of the Linux OS both much easier and more
difficult. These configuration options are easy to change as well as migrate to other systems,
but these files can be more tedious to document as well.
A configuration file, also known as a config file, is a local file that controls the operations of
a program, utility or process. Linux configuration files contain the settings and instructions
for different systems, utilities, applications and processes. They’re frequently plain-text files
that contain a variable name (the name of the setting) followed by it's value, commands or
instructions. Many Linux configuration files can be opened with a plain-text editor and
updated directly, though you will most likely be using a command-line editor like Nano or
Vim to edit these files.
Pseudo code/Algorithms/Flowchart/Steps:
Step 1: Start the Kali and Metasploitable PCs. Log on only to the Kali
PC. Step 2: View the network card configuration using ifconfig.
Step 3: Use the cat command to view the fi le resolv.conf to determine the DNS address.
Step 4: Use the netstat –nr command to determine the gateway router address.
Name: Shruti Ojha UID:19bcs1708
, CourseName:Securing windows and Linux Course Code: CSB-472
Step 5: Use the ifconfig command to change the network configuration for a machine.
Step 6: View the ARP table.
Step 7: Ping the Metasploitable machine by IP address and view the cache.
Step 8: Modify the ARP cache and view the ARP cache again.
Step 9: Log off from the Kali PC.
Implementation/Output:
Learning Outcome :
i: About linux commands.
ii: About linux client configuration.
Name: Shruti Ojha UID:19bcs1708
, CourseName: Securing Windows and Linux Course Code: CSB-472
Experiment 1.2
Aim: Knowledge about the CA server Using Certificates and SSL in windows.
Software Required:
1) Windows XP Pro
2) Windows Server
3) Ethereal for analyzing captured session
Description:
A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates
used to create digital signatures and encryption keys. The role of the CA in this process is to guarantee the
identity of the party granted the certificate. Usually, this means that the CA has an arrangement with a
financial institution that provides information to validate the grantee's identity
Pseudo code/Algorithms/Flowchart/Steps:
How to install an SSL certificate on a Linux Server USING Plesk.
It is a web hosting platform that has a very simple configuration. This simple configuration
helps all web hosting providers to manage a lot of virtual hosts easily and on a single server.
Ever since its conception, Plesk has been coming up as a preferred choice for all the web
hosting companies
1. First Log into the control panel of Plesk.
2. Then, Select Domain;
3. The third step implies choosing the domain to be updated.
4. In the next step click on the ‘Add New Certificate’ icon.
5. Save the certificate name in the ‘Certificate Name’ box.
Name: Shruti Ojha UID:19BCS1708
, CourseName: Securing Windows and Linux Course Code: CSB-472
One would have the certificate and key files saved on the local computer. These certificate
and key files are provided by the certificate authority and are important for the installation.
6. The next step is to find these files. Open these in a Notepad or in other similar text
formats from where one can copy the text.
7. Copy the entire text of the files.
8. Paste them in the correct boxes. Reading through the content and the box name in Plesk
will give one an idea where to paste it.
9. Next, click on the ‘Send Text’ button.
10. Go to the ‘Hosting Section’. It is on the domain screen.
11. Click ‘Set-up’ from this section. A drop down list will follow.
12. The next step is to click on the ‘new certificate’ from the drop down list.
13. Click ‘Ok’ to finish.
How to install SSL Certificate on Linux servers that do not have Plesk.
1. The first and foremost step is to upload the certificate and important key files. One can
upload the files to the server using – S/FTP.
2. Login to Server. It is important to log in via SSH. Logging in via SSH will help the user to
become the root user.
3. Give Root Password.
4. One can see /etc/httpd/conf/ssl.crt in the following step. Move the certificate file here
5. Next move key file also to /etc/httpd/conf/ssl.crt
It is important to ensure the security of the files that has been moved. One can keep the
files secure by restricting permission. Using ‘chmod 0400’ will help users to securely restrict
permission to the key.
6. Next Go to etc/httpd/conf.d/ssl.conf. Here the user will find Virtual Host Configuration
set up for the domain.
Name: Shruti Ojha UID:19BCS1708