RH253读书笔记(1)-Lab 1 System Monitoring
Lab 1 System Monitoring
Goal: To build skills to better assess system resources, performance and security.
Sequence 1: Inspecting your system
Scenario: You are assigned responsibility for this system. You must learn how it is
configured.
Deliverable: Knowledge about your system.
System Setup: Before you use the system, inspect its configuration by answering the following questions with the command(s) you used to derive this answer. Throughout the class, you may need to install additional software packages on your system. Consult the Appendix for information and instruction for installing software.
Instructions:
1. What IP addresses are configured for the system?
Use /sbin/ifconfig or /sbin/ip addr to find your IP addresses. One of them should be 192.168.0.X.
2. How are these IP addresses configured?
Look in /etc/sysconfig/network-scripts/ifcfg-*
3. What runlevel is the system currently in?
runlevel or who -r
4. How was this configured?
head -20 /etc/inittab Compare the "id" record value to /proc/cmdline in the event that the current runlevel was set by the bootloader(GRUB). cat /proc/cmdline
5. Which services are currently running?
service --status-all
6. Which services are installed?
chkconfig --list (This will only display services that are controlled by a service initialization script or by xinetd. Services started by other means will not be displayed.)
7. How many "end user" accounts are there?
Use the command getent passwd | sort -t":" -k 3 -g. The end user accounts are those 500 or above. The command above merely sorts all
user accounts.
8. Which account are you now using?
whoami
9. Has anyone else logged into your system recently?
last will show who recently logged in.
Sequence 2: Monitoring TCP/IP ports
Scenario: You have done your best to understand which services you must offer, and to whom, and now must verify this configuration. This is a mere exercise in a long and on-going effort to manage your system within the definitions of your Security Policy.
If you are located in an Internet-enabled classroom, please do not attempt to use nmap to scan machines outside the example.com domain or outside the 192.168.0.0/24 subnet unless instructed to do so. Thank you for your cooperation.
Deliverable: Familiarity with utilities in an audit of system services..
Instructions:
1. Work with a lab partner, and monitor network ports on each of your systems. Which TCP ports are open, and which have a service listening at the other end? With respect to your system, which ports have a service listening, but are not open to your partner?
a. For purposes of this lab, instructions will refer to station X and stationY, where stationX is the "local" system and stationY, the "remote." In the listings below, data redirected to a file is suggested, but not required while gathering data about the systems.
# netstat -tpnl > $HOME/netstat-stationY.out
# nmap stationX | grep tcp > $HOME/nmap-stationX.out
2. Determine which hosts are on your subnet.
a. Again, the nmap utility may be used to more broadly scan your system networking subnet. As we are using a IPV4 class C address range, the argument provided nmap is in the form "N.N.N.*", where "N" is replaced by the 3 octets of your IP network address.
# nmap -sP Your IP Network Address
3. Determine which programs, utilities or services are configured to run at system boot time. Which of these was configured during package installation, and which were configured by the system administrator?
a. Run chkconfig to audit your system, based on the current runlevel.
# chkconfig --list | grep $(runlevel | cut -d" " -f2):on
b. Each system initialization script contains lines used by chkconfig which describe how and when the script is to be run. Note that the example below uses regular expression classes to ensure, for example, a "space" and a "tab" are both matched.
To determine which scripts are default installed to run at system boot:
# grep '^#[[:space:]]chkconfig:[[:space:]][[:digit:]]\+' /etc/init.d/*
To determine which scripts are default installed not to run at system boot:
# grep '^#[[:space:]]chkconfig:[[:space:]]-' /etc/init.d/*
Sequence 3: Logging to a centralized loghost
Scenario: Your boss thinks it is a great idea to have one central logging host. Work together with your neighbor to configure your machine as a logging host.
Deliverable: A central logging host
Instructions:
1. Set up syslogd to accept remote messages.
a. Edit /etc/sysconfig/syslog, and add the -r option as below:
SYSLOGD_OPTIONS="-r -m 0"
2. Restart syslogd.
a. # service syslog restart
Now your machine will accept logging messages from other machines.
3. Set up syslogd to send some messages to another machine.
a. Append /etc/syslog.conf with the following line:
user.* @192.168.0.Y
Where 192.168.0.Y is your neighbor's IP address.
b. If you have SELinux problems, you may need to restore the context on all files in /etc/
# restorecon -R /etc/
4. Restart syslogd.
a. # service syslog restart
Now your machine sends messages from user programs to your neighbor's machine.
5. Test the new setup by using logger to generate a syslog message:
# logger -i -t yourname "This is a test"
Does the message appear in your neighbor's /var/log/messages?
6. Challenge questions:
Why does this message also appear in your own /var/log/messages?
How can you prevent it?
The message appears in /var/log/messages because the syslog.conf file has an entry that sends all user messages to /var/log/messages:
*.info;mail.none... /var/log/messages
To prevent this, add a user.none entry like the others:
*.info;user.none,mail.none... /var/log/messages
RH253读书笔记(1)-Lab 1 System Monitoring的更多相关文章
- RH253读书笔记(2)-Lab 2 System Resource Access Controls
Lab 2 System Resource Access Controls Goal: To become familiar with system resource access controls. ...
- RH133读书 笔记(4) - Lab 4 System Services
Lab 4 System Services Goal: Develop skills using system administration tools and setting up and admi ...
- RH133读书笔记(11)-Lab 11 System Rescue and Troubleshooting
Lab 11 System Rescue and Troubleshooting Goal: To build skills in system rescue procedures. Estimate ...
- RH253读书笔记(4)-Lab 4 The Domain Name System
Lab 4 The Domain Name System Goal: To install and configure a DNS server System Setup: Throughout th ...
- RH253读书笔记(3)-Lab 3 Securing Networking
Lab 3 Securing Networking Goal: To build skills with the Netfilter packet filter Sequence 1: Applyin ...
- RH253读书笔记(6)-Lab 6 Implementing Web(HTTP) Services
Lab 6 Implementing Web(HTTP) Services Goal: To implement a Web(HTTP) server with a virtual host and ...
- RH253读书笔记(5)-Lab 5 Network File Sharing Services
Lab 5 Network File Sharing Services Goal: Share file or printer resources with FTP, NFS and Samba Se ...
- RH253读书笔记(7)-Lab 7 Electronic Mail
Lab 7 Electronic Mail Goal: To build common skills with MTA configuration Estimated Duration: 90 min ...
- RH253读书笔记(9)-Lab 9 Account Management Methods
Lab 9 Account Management Methods Goal: To build skills with PAM configuration Sequence 1: Track Fail ...
随机推荐
- org.jsoup.select.Selector
org.jsoup.select.Selector CSS-like element selector, that finds elements matching a query. Selector ...
- PHP类中的七种语法说明
类中的七种语法说明 -属性 -静态属性 -方法 -静态方法 -类常量 -构造函数 -析构函数 <?php class Student { // 类里的属性.方法和函数的訪问权限有 (函数和方法是 ...
- uva 571 素数的性质
给定 两个杯子,容量分别分Ca,Cb, 要我们用这两个瓶子倒来倒去,得到某个瓶子里装有N的水 而且给的数据保证 Cb > N,且Ca,Cb互质 那么我们肯定可以在容量为Cb的杯子里得到N的水 ...
- hdu1561(树形背包)
给定n,m表示n个城堡,我们可以选择攻占m个城堡.要使得价值最大 接下来n行 a b, 第i行的a b,表示攻占第i个城堡的价值为b,但需要先攻占第a个城堡 如果有多个a=0的点,那么就不是一棵树 ...
- 通过action 跨进程启动activity
在一些场景中我们需要从一个进程启动另外的一个应用的activity,这有什么好办法? 这里介绍一种方法,通过自定义 action 通过filter来启动. 如果你需要启动一个你自己写的另一个app的a ...
- 源代码分析:LayoutParams的wrap_content, match_parent, 而详细的价值观
问题: 慢慢地熟悉android 的过程中.发现view 要么layout初始化,建或者生产活动是很清楚.被添加到父控制,然后开始了相应的生命周期.但父控件的整个界面.还是第一个系统view. 怎么来 ...
- 将 Android* x86 NDK 供 Eclipse* 而移植 NDK 演示示例应用程序
目标 面向 Eclipse (ADT) 的 Android 插件如今支持基于 NDK 的应用开发. 其可自己主动生成项目和构件文件以及代码存根.并可集成到整个 Android 应用开发中(构建原生库. ...
- 成都传智职工high翻竞赛场
日前,由石羊街道总工会.天府新谷园区党委联合主办的“2013年职工趣味竞赛”盛大开幕.传智播客成都java培训中心员工积极参与,活跃在各大项目的比赛中,员工们用笑脸.身影告诉大家:竞赛场上,我们hig ...
- 使用cm-12.0源代码编译twrp
Select the newest branch available. This step is not necessary with Omni because Omni already includ ...
- js缓冲运动
缓冲运动 现象:逐渐变慢,最后停止 原理:距离越远,速度越大 速度的计算方式: 1,速度由距离决定 2,速度=(目标值-当前值)/缩放系数 说明:速度为正负数时,也决定了物体移动的方向 示例:div缓 ...