Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Overig

lab experiments for securing windows and linux lab

Beoordeling
-
Verkocht
-
Pagina's
56
Geüpload op
22-05-2023
Geschreven in
2022/2023

providing all lab experiments for securing windows and linux lab

Instelling
Vak

Voorbeeld van de inhoud

CourseName:Securing windows and Linux Course Code: CSB-472


Experiment:3.2

Aim: Understanding the Linux Client Configuration

Software Required: linux OS .

Description:
Linux configuration files are the heart of the Linux operating system. These files are one of
the biggest differences between the Linux and Windows operating systems. The Windows
OS does use per-application configuration files as well, but Windows largely depends on
something called the Registry. The Registry is an ultra-fast database that stores
configurations for the Windows OS and its applications.
Linux is much simpler. Configurations for applications in Linux are stored in individual
configuration files. This makes management of the Linux OS both much easier and more
difficult. These configuration options are easy to change as well as migrate to other systems,
but these files can be more tedious to document as well.
A configuration file, also known as a config file, is a local file that controls the operations of
a program, utility or process. Linux configuration files contain the settings and instructions
for different systems, utilities, applications and processes. They’re frequently plain-text files
that contain a variable name (the name of the setting) followed by it's value, commands or
instructions. Many Linux configuration files can be opened with a plain-text editor and
updated directly, though you will most likely be using a command-line editor like Nano or
Vim to edit these files.
Pseudo code/Algorithms/Flowchart/Steps:
Step 1: Start the Kali and Metasploitable PCs. Log on only to the Kali
PC. Step 2: View the network card configuration using ifconfig.
Step 3: Use the cat command to view the fi le resolv.conf to determine the DNS address.
Step 4: Use the netstat –nr command to determine the gateway router address.




Name: Shruti Ojha UID:19bcs1708

, CourseName:Securing windows and Linux Course Code: CSB-472
Step 5: Use the ifconfig command to change the network configuration for a machine.
Step 6: View the ARP table.
Step 7: Ping the Metasploitable machine by IP address and view the cache.
Step 8: Modify the ARP cache and view the ARP cache again.
Step 9: Log off from the Kali PC.


Implementation/Output:




Learning Outcome :
i: About linux commands.
ii: About linux client configuration.




Name: Shruti Ojha UID:19bcs1708

, CourseName: Securing Windows and Linux Course Code: CSB-472


Experiment 1.2

Aim: Knowledge about the CA server Using Certificates and SSL in windows.

Software Required:

1) Windows XP Pro

2) Windows Server

3) Ethereal for analyzing captured session

Description:
A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates
used to create digital signatures and encryption keys. The role of the CA in this process is to guarantee the
identity of the party granted the certificate. Usually, this means that the CA has an arrangement with a
financial institution that provides information to validate the grantee's identity

Pseudo code/Algorithms/Flowchart/Steps:
How to install an SSL certificate on a Linux Server USING Plesk.
It is a web hosting platform that has a very simple configuration. This simple configuration
helps all web hosting providers to manage a lot of virtual hosts easily and on a single server.
Ever since its conception, Plesk has been coming up as a preferred choice for all the web
hosting companies
1. First Log into the control panel of Plesk.
2. Then, Select Domain;
3. The third step implies choosing the domain to be updated.
4. In the next step click on the ‘Add New Certificate’ icon.
5. Save the certificate name in the ‘Certificate Name’ box.




Name: Shruti Ojha UID:19BCS1708

, CourseName: Securing Windows and Linux Course Code: CSB-472
One would have the certificate and key files saved on the local computer. These certificate
and key files are provided by the certificate authority and are important for the installation.
6. The next step is to find these files. Open these in a Notepad or in other similar text
formats from where one can copy the text.
7. Copy the entire text of the files.
8. Paste them in the correct boxes. Reading through the content and the box name in Plesk
will give one an idea where to paste it.
9. Next, click on the ‘Send Text’ button.
10. Go to the ‘Hosting Section’. It is on the domain screen.
11. Click ‘Set-up’ from this section. A drop down list will follow.
12. The next step is to click on the ‘new certificate’ from the drop down list.
13. Click ‘Ok’ to finish.
How to install SSL Certificate on Linux servers that do not have Plesk.
1. The first and foremost step is to upload the certificate and important key files. One can
upload the files to the server using – S/FTP.
2. Login to Server. It is important to log in via SSH. Logging in via SSH will help the user to
become the root user.
3. Give Root Password.
4. One can see /etc/httpd/conf/ssl.crt in the following step. Move the certificate file here
5. Next move key file also to /etc/httpd/conf/ssl.crt
It is important to ensure the security of the files that has been moved. One can keep the
files secure by restricting permission. Using ‘chmod 0400’ will help users to securely restrict
permission to the key.
6. Next Go to etc/httpd/conf.d/ssl.conf. Here the user will find Virtual Host Configuration
set up for the domain.




Name: Shruti Ojha UID:19BCS1708

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
22 mei 2023
Aantal pagina's
56
Geschreven in
2022/2023
Type
OVERIG
Persoon
Onbekend

Onderwerpen

$18.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
silentsoul

Maak kennis met de verkoper

Seller avatar
silentsoul chandigarh university
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
2
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen