Agenda Networking with Linux & UNIX OS –Overview –Setup –Common Utilities.

Slides:



Advertisements
Similar presentations
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Advertisements

6 UNIX Network Utilities Mauro Jaskelioff. Introduction Overview of computer networks Network related utilities –Accessing a remote computer –Transferring.
Using Kerberos the fundamentals. Computer/Network Security needs: Authentication Who is requesting access Authorization What user is allowed to do Auditing.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
System Hardening Borrowed from the CLICS group. System Hardening How do we respond to problems? (e.g. operating system deadlock) Detect Detect (Detect.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
Working Environment - - Linux - -.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 10.
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Workshop 1: Introduction to TCP/IP
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
1 Intro to Linux - getting around HPC systems Himanshu Chhetri.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Chapter 10 Networking and the Internet ITSC 1458.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Agenda User Profile File (.profile) –Keyword Shell Variables Linux (Unix) filters –Purpose –Commands: grep, sort, awk cut, tr, wc, spell.
SAMBA Integrating Linux and Window. What is Samba? Free suite of programs that enables flavors of UNIX to work with other operating systems such as OS/2.
Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
ITI-481: Unix Administration Meeting 3. Today’s Agenda Hands-on exercises with booting and software installation. Account Management Basic Network Configuration.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Chapter 9 Networking Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, Original Notes by Raj Sunderraman.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Linux Networking and Security
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
Phil Hurvitz Securing UNIX Servers with the Secure.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
IT ELECTRONIC COMMERCE THEORY NOTES
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Agenda Introduction to Shell Scripts Purpose of Shell Scripts
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
Agenda Using FTP What is FTP? How to Use the FTP Program How to transfer files Using FTP.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
 Router Configurations part1 2 nd semester
Cygwin CMSC 104 UMBC.  CygWin is a collection of free software tools originally developed by Cygnus Solutions to allow various versions of Microsoft.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Secure services Unit-IV CHAP-1
Ssh: secure shell.
Enumeration.
Introduction to Operating Systems
FTP Lecture supp.
A Guide to Unix Using Linux Fourth Edition
Introduction to Programming the WWW I
FTP - File Transfer Protocol
Logging into the linux machines
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Telnet/SSH Connecting to Hosts Internet Technology.
Logging into the linux machines
Presentation transcript:

Agenda Networking with Linux & UNIX OS –Overview –Setup –Common Utilities

Networking with Linux & UNIX OS The UNIX and Linux operating systems are well suited for allowing connections and transferring data between file servers (servers). Many individuals create their own servers as home to allow data to be transferred to school, etc...

Networking with Linux & UNIX OS Because students tend to gain access to more servers throughout their program (Phobos, Tux, Poseidon, Linux server at home) there is a need to protect access into their accounts, as well as use a set of tools to connect and transfer data among these servers

Networking Setup For Linux OS - Step 1: –Use editor to check settings in file /etc/hosts.allow should have nothing in it except comments and maybe your localALL:LOCALHOST at most if you see anything like ALL:ALL You should remove it! This says that EVERYONE has ACCESS to your computer!!!!

Networking Setup For Linux OS- Step 2: –Use editor to check settings in file /etc/hosts.deny You should have the following line: ALL:ALL what that means is everyone is not allowed in just in case you have any problems - remember to have in your hosts.allow ALL:localhost

Networking Setup Linux & Unix OS –Similar to Linux, a file requires to be setup to allow the user to transfer data between systems (or containing different login names). –A file called.rhosts should be setup in the user’s home directory containing the server name and /or static IP address followed by a space followed by the account’s username. –This will allow the system to “trust” you to use special “remote commands” (rlogin, rcp, rsh)

ATTENTION One weakness with the “remote” commands is that other users may view your data! Most servers (to protect themselves) use “secure” commands. You cannot use “remote” commands on servers such as Phobos, Tux, Gothic, etc, but you can use “secure” commands

.shosts In order to use “secure” commands, A file called.shosts should be setup in the user’s home directory containing the server name and/or static I.P. address followed by a space followed by the account’s username

Common Utilities for Networking telnet –Used to remotely connect to remote server (eg. telnet tux.senecac.on.ca) ftp –Used to transfer files between servers - very similar to MS-DOS FTP in terms of get and put commands. (eg. ftp tux.senecac.on.ca) rlogin(“secure” command is slogin) –Used to connect to remote server (eg. rlogin tux ) CRTL-D to return back to original server rcp

Common Utilities for Networking rwho –Displays users who are actively logged onto other remote systems rsh (“secure” command is ssh) –Allows user to run commands, scripts, programs remotely in other servers talk / write –Commands to intiate text-based conversion among users (check previous notes for usage)

Common Utilities for Networking rcp (“secure” commands is scp) – Used to transfer files between two between servers (works like copy & requires.rhosts file in home directories –For example: rcp doc1 tux:reports/doc1.txt This command copies file doc1 on your account on the current server to your other account on the tux server.

Common Utilities for Networking wall –Used to broadcast a message to all users currently logged onto server that allow message reception. (eg. echo hi everyone | wall ) ping –Used to test network connection (see how well server is running - if running). Can use both static IP address and DNS address. Examples: ping ping tux.senecac.on.ca

Common Utilities for Networking ruptime –determines how long remote server has been running since last “shut-down” Note: depending on UNIX administration, some of these command may or may not work….