Download the Full Cybrscore Lab Library

Total Page:16

File Type:pdf, Size:1020Kb

Download the Full Cybrscore Lab Library Lab Name Lab Description Lab Series NSA CAE KU's Platform Expected Duration Maximum Duration Average Duration Average Startup Duration Active Directory's are an important part of many organizations' IT structure. Thus, Active Directory security is just as important and there are several best practices to follow. This Active Directory Security Checkup Capstone CYBRScore Capstones Windows System Administration (WSA), Topics: 13 Cybersecurity Principles (CSP), Topics: j; Hyper-V 1 Hour, 30 Minutes 1 Hour, 30 Minutes 28 minutes, 44 seconds 1 minute, 41 seconds capstone tests a student's ability to manage an Active Directory while implementing Operating System Concepts (OSC), Topics: 1, 9 those best practices. Students will leverage Nmap, a network discovery and mapping tool, to identify the Additional Scanning Options systems on a network of responsibility. Students will utilize non-traditional scans to CYBRScore Scored Labs Penetration Testing (PTT), Topics: 3, 4, 5, 6, 8, 9, 10 Hyper-V 45 Minutes 45 Minutes 22 minutes, 36 seconds 1 minute, 40 seconds attempt avoiding an Intrusion Detection System (IDS). Students will leverage Nmap, a network discovery and mapping tool, to identify the Additional Scanning Options systems on a network of responsibility. Students will utilize non-traditional scans to CYBRScore Labs Penetration Testing (PTT), Topics: 3, 4, 5, 6, 8, 9, 10 Hyper-V 45 Minutes 45 Minutes 37 minutes, 46 seconds 34 seconds attempt avoiding an Intrusion Detection System (IDS). Students will leverage Nmap, a network discovery and mapping tool, to identify the Additional Scanning Options systems on a network of responsibility. Students will utilize non-traditional scans to CYBRScore Network Forensics Penetration Testing (PTT), Topics: 3, 4, 5, 6, 8, 9, 10 Hyper-V 45 Minutes 45 Minutes 19 minutes, 14 seconds 44 seconds attempt avoiding an Intrusion Detection System (IDS). MAL600 exposes students to the theoretical knowledge and hands-on techniques to reverse engineer malware that was designed to thwart the most common reverse engineering techniques. The students learn how to identify and analyze the presence of advanced packers, polymorphic malware, encrypted malware, and malicious code armored with anti-debugging and anti-reverse engineering techniques. Students gain a high-level understanding of complex malware analysis techniques and spend a significant amount of time solving hands-on challenges throughout the course. This course is for Advanced Malware Analysis Labs malware analysts, or aspiring analysts, who have already taken CYBRScore’s MAL400 CYBRScore Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 vSphere 40 Hours 41 Hours, 40 Minutes 6 minutes, 59 seconds 12 seconds (Fundamentals of Malware Analysis) and MAL500 (Reverse Engineering Malware) courses. Those who have encountered malware analysis as part of incident response, research, or secure development and want to improve upon their knowledge and skills may also find this course beneficial. Students should have intermediate malware analysis skills, the ability to read and understand moderately complex high-level language code constructs in assembly, familiarity with Windows API, networking, and scripting, and finally, experience with IDA Pro, Olly, Immunity, or another similar application. Students will use the SysInternals Suite of utilities to analyze processes, DLLs, registry Advanced Techniques for Malware Recovery edits and other auto start functions to locate and remove malicious software from an CYBRScore Scored Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 1 Hour, 5 Minutes 2 Hours 44 minutes, 11 seconds 1 minute, 21 seconds infected Windows 7 victim machine. Students will use the SysInternals Suite of utilities to analyze processes, DLLs, registry Advanced Techniques for Malware Recovery edits and other auto start functions to locate and remove malicious software from an CYBRScore Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 1 Hour, 5 Minutes 2 Hours 23 minutes, 23 seconds 35 seconds infected Windows 7 victim machine. Students will do a Vulnerability Assessment on a network. Students will then analyze the Analysis and Recommendation Report CYBRScore Labs Operating Systems Hardening (OSH), Topics: 11; IT Systems Components (ISC), Topics: 13 Hyper-V 2 Hours 2 Hours 38 minutes, 42 seconds 33 seconds results and place them in a Recommendation Report. Students will do a Vulnerability Assessment on a network. Students will then analyze the Analysis and Recommendation Report CYBRScore Scored Labs Operating Systems Hardening (OSH), Topics: 11; IT Systems Components (ISC), Topics: 13 Hyper-V 2 Hours 2 Hours 1 minute, 49 seconds 1 minute, 9 seconds results and place them in a Recommendation Report. In this lab you will attempt to conduct basic analysis on some malware samples that were Analyze and Classify Malware CYBRScore Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 1 Hour 1 Hour 29 minutes, 14 seconds 20 seconds found on the internal network. In this lab you will attempt to conduct basic analysis on some malware samples that were Analyze and Classify Malware CYBRScore Scored Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 1 Hour 1 Hour 20 minutes, 12 seconds 1 minute, 37 seconds found on the internal network. Students will become familiar with the Business Continuity Plan (BCP), Business Impact Assessment (BIA), Disaster Recovery Plan (DRP) and Computer Incident Response Plan (CIRP). Each of these documents are used to address different, but related, aspects of Analyze and Update a Company BCP/BIA/DRP/CIRP continuing or recovering business functionality during/after an incident. CYBRScore Labs Cybersecurity Planning and Management (CPM); Topics: 2, 4, 5, 6, 8, 9 Hyper-V 1 Hour, 30 Minutes 2 Hours 13 minutes, 14 seconds 28 seconds During the course of the lab, students will perform a gap analysis using the provided BCP, BIAs and DRP, and make the necessary fixes to the DRP. Students will become familiar with the Business Continuity Plan (BCP), Business Impact Assessment (BIA), Disaster Recovery Plan (DRP) and Computer Incident Response Plan (CIRP). Each of these documents are used to address different, but related, aspects of Analyze and Update a Company BCP/BIA/DRP/CIRP continuing or recovering business functionality during/after an incident. CYBRScore Scored Labs Cybersecurity Planning and Management (CPM); Topics: 2, 4, 5, 6, 8, 9 Hyper-V 1 Hour, 30 Minutes 2 Hours 38 minutes, 6 seconds 1 minute, 15 seconds During the course of the lab, students will perform a gap analysis using the provided BCP, BIAs and DRP, and make the necessary fixes to the DRP. Students will identify a browser-based attack used against a corporate asset using a Analyze Browser-based Heap Spray Attack network protocol analyzer. Students will determine the type of attack used and pinpoint CYBRScore Labs Penetration Testing (PTT), Topics: 3, 4, 5, 6, 8, 9, 10 Hyper-V 43 Minutes 1 Hour 53 minutes, 50 seconds 17 seconds exploit code in network traffic. Students will use popular system analysis tools on an infected machine in order to Analyze DoomJuice Infection to Identify Attack Vector and Payload identify signs of infection. Afterwards, students will manually remove malware from the CYBRScore Labs Penetration Testing (PTT), Topics: 3, 4, 5, 6, 8, 9, 10 Hyper-V 45 Minutes 1 Hour, 30 Minutes 11 minutes, 30 seconds 57 seconds system. Students will use the open source Volatility tool to analyze a memory snapshot and Analyze Malicious Activity in Memory Using Volatility CYBRScore Scored Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 1 Hour 2 Hours 26 minutes, 23 seconds 1 minute determine what malicious software has infected the victim machine. Students will use the open source Volatility tool to analyze a memory snapshot and Analyze Malicious Activity in Memory Using Volatility CYBRScore Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 1 Hour 2 Hours 11 minutes, 11 seconds 20 seconds determine what malicious software has infected the victim machine. Students will take some time to review malicious traffic within a controlled environment. Using Wireshark and some pointers from a previous technical report on the FlashPack Analyze Malicious Network Traffic CYBRScore Labs Network Defense (NDF), Topics: 1a, 1c, 1d, 2a, 2b, 4a Hyper-V 1 Hour, 30 Minutes 3 Hours 37 minutes, 30 seconds 28 seconds Exploit Kit, they will focus their attention on finding (in two traffic captures) evidence of when and how a victim system was infected with the exploit kit. Students will use the CFF Explorer and Hacker Process tools in order to perform an initial Analyze Packed Executable to Identify Attack Vector and Payload CYBRScore Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 45 Minutes 1 Hour, 30 Minutes 1 minute, 5 seconds 18 seconds analysis of a suspicious executable. Students will use a handful of tools to analyze a provided suspicious file. Using CFF Explorer, they will modify how the suspicious program stores variables in memory, detect what packer it was packed with, unpack that file and then save it in an unpacked state. Using ExeinfoPE, they will double-check and ensure that the processed version of the Analyze Packed Executable to Identify Attack Vector and Payload CYBRScore Scored Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 45 Minutes 1 Hour 31 minutes, 38 seconds 1 minute, 37 seconds program has been successfully unpacked. The students will then run the suspicious program while Process Hacker is running and then dump all strings associated with the suspicious process to a text file. Using the dumped strings they will piece together what the program was designed to do. Students will Identify the use of an SQL Injection through the use of Wireshark. The Analyze SQL Injection Attack students will also isolate the different aspects of the SQL Injection and execute the CYBRScore Labs Software Security Analysis (SSA); Topics: 1, 2, 3, 4, 5 Hyper-V 1 Hour 2 Hours 20 minutes, 43 seconds 21 seconds selected code.
Recommended publications
  • Test-Beds and Guidelines for Securing Iot Products and for Secure Set-Up Production Environments
    IoT4CPS – Trustworthy IoT for CPS FFG - ICT of the Future Project No. 863129 Deliverable D7.4 Test-beds and guidelines for securing IoT products and for secure set-up production environments The IoT4CPS Consortium: AIT – Austrian Institute of Technology GmbH AVL – AVL List GmbH DUK – Donau-Universit t Krems I!AT – In"neon Technologies Austria AG #KU – JK Universit t Lin$ / Institute for &ervasive 'om(uting #) – Joanneum )esearch !orschungsgesellschaft mbH *+KIA – No,ia -olutions an. Net/or,s 0sterreich GmbH *1& – *1& -emicon.uctors Austria GmbH -2A – -2A )esearch GmbH -)!G – -al$burg )esearch !orschungsgesellschaft -''H – -oft/are 'om(etence 'enter Hagenberg GmbH -AG0 – -iemens AG 0sterreich TTTech – TTTech 'om(utertechni, AG IAIK – TU Gra$ / Institute for A((lie. Information &rocessing an. 'ommunications ITI – TU Gra$ / Institute for Technical Informatics TU3 – TU 3ien / Institute of 'om(uter 4ngineering 1*4T – 1-Net -ervices GmbH © Copyright 2020, the Members of the IoT4CPS Consortium !or more information on this .ocument or the IoT5'&- (ro6ect, (lease contact8 9ario Drobics7 AIT Austrian Institute of Technology7 mario:.robics@ait:ac:at IoT4C&- – <=>?@A Test-be.s an. guidelines for securing IoT (ro.ucts an. for secure set-up (ro.uction environments Dissemination level8 &U2LI' Document Control Title8 Test-be.s an. gui.elines for securing IoT (ro.ucts an. for secure set-u( (ro.uction environments Ty(e8 &ublic 4.itorBsC8 Katharina Kloiber 4-mail8 ,,;D-net:at AuthorBsC8 Katharina Kloiber, Ni,olaus DEr,, -ilvio -tern )evie/erBsC8 -te(hanie von )E.en, Violeta Dam6anovic, Leo Ha((-2otler Doc ID8 DF:5 Amendment History Version Date Author Description/Comments VG:? ?>:G?:@G@G -ilvio -tern Technology Analysis VG:@ ?G:G>:@G@G -ilvio -tern &ossible )esearch !iel.s for the -2I--ystem VG:> >?:G<:@G@G Katharina Kloiber Initial version (re(are.
    [Show full text]
  • Getting Started with Ubuntu 12.04
    Getting Started withUbuntu 12.04 Second Edition The Ubuntu Manual Team Copyright © – by e Ubuntu Manual Team. Some rights reserved. cba is work is licensed under the Creative Commons Aribution–Share Alike . License. To view a copy of this license, see Appendix A, visit http://creativecommons.org/licenses/by-sa/./, or send a leer to Creative Commons, Second Street, Suite , San Francisco, California, , USA. Geing Started with Ubuntu . can be downloaded for free from http:// ubuntu-manual.org/ or purchased from http://ubuntu-manual.org/buy/ gswue/en_US. A printed copy of this book can be ordered for the price of printing and delivery. We permit and even encourage you to dis- tribute a copy of this book to colleagues, friends, family, and anyone else who might be interested. http://ubuntu-manual.org Second Edition Revision number: Revision date: -- :: + Contents Prologue Welcome Ubuntu Philosophy A brief history of Ubuntu Is Ubuntu right for you? Contact details About the team Conventions used in this book Installation Geing Ubuntu Trying out Ubuntu Installing Ubuntu—Geing started Finishing Installation Ubuntu installer for Windows e Ubuntu Desktop Understanding the Ubuntu desktop Unity Using Launcher e Dash Workspaces Managing windows Browsing files on your computer Nautilus file manager Searching for files and folders on your computer Customizing your desktop Accessibility Session options Geing help Working with Ubuntu All the applications you need Geing online Browsing the web Reading and composing email Using instant messaging Microblogging Viewing and editing photos Watching videos and movies Listening to audio and music Burning CDs and DVDs Working with documents, spreadsheets, and presentations Ubuntu One Hardware Using your devices Hardware identification .
    [Show full text]
  • Step-By-Step Guide to Linux Security for Beginners
    Step-by-step guide to Linux security for beginners Clément Levallois 2017-04-03 Table of Contents Ordering the server . 1 Get the latest versions of all packages . 1 Harden the kernel . 2 Forward root mail . 2 Change the SSH port. 2 Creating a user and disabling logging for root . 3 1. Installing the sudo command: 3 2. Adding a new user (let’s call it "myUser") 4 3. Enabling server connections via myUser 4 4. Disabling connection through root 4 Disabling password authentication, enabling SSH. 4 How to generate a SSH key? 5 How to disable password auth and enable SSH? 5 Setting up a firewall. 6 ip tables 6 better: uncomplicated firewall 7 Use anti-intrusion defenses and audit systems . 7 Psad 7 fail2ban 8 Lynis 8 the end. 9 last modified: 2018-10-01 Ordering the server • Server ordered on Hetzner.de (based in Germany, dirt cheap, but without management.) • Remember to install the Linux version not from the rescue system in the console but from https://robot.your-server.de/server/index in the "Linux" tab. (installing from the rescue system provided with the bare server causes a ssh key mess) • I use Debian, version 8.7 (why?) • Vi is used as a text editor in the following • we are logged as root first Get the latest versions of all packages Do: apt-get update && sudo apt-get upgrade Because: apt-get update → refreshes the repositories and fetches information about packages that are available online. apt-get upgrade → downloads and installs updates for all installed packages - as long as it doesn’t bother dependencies (install new packages, remove old ones or crosses a repo source (switch a package from one repo to another)).
    [Show full text]
  • Ubuntu: Unleashed 2017 Edition
    Matthew Helmke with Andrew Hudson and Paul Hudson Ubuntu UNLEASHED 2017 Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Ubuntu Unleashed 2017 Edition Editor-in-Chief Copyright © 2017 by Pearson Education, Inc. Mark Taub All rights reserved. Printed in the United States of America. This publication is protected Acquisitions Editor by copyright, and permission must be obtained from the publisher prior to any prohib- Debra Williams ited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information Cauley regarding permissions, request forms and the appropriate contacts within the Pearson Managing Editor Education Global Rights & Permissions Department, please visit www.pearsoned.com/ permissions/. Sandra Schroeder Many of the designations used by manufacturers and sellers to distinguish their Project Editor products are claimed as trademarks. Where those designations appear in this book, and Lori Lyons the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. Production Manager The author and publisher have taken care in the preparation of this book, but make Dhayanidhi no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in Proofreader connection with or arising out of the use of the information or programs contained Sasirekha herein. Technical Editor For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content José Antonio Rey particular to your business, training goals, marketing focus, or branding interests), Editorial Assistant please contact our corporate sales department at [email protected] or (800) 382-3419.
    [Show full text]
  • Ubuntu Server Guide Basic Installation Preparing to Install
    Ubuntu Server Guide Welcome to the Ubuntu Server Guide! This site includes information on using Ubuntu Server for the latest LTS release, Ubuntu 20.04 LTS (Focal Fossa). For an offline version as well as versions for previous releases see below. Improving the Documentation If you find any errors or have suggestions for improvements to pages, please use the link at thebottomof each topic titled: “Help improve this document in the forum.” This link will take you to the Server Discourse forum for the specific page you are viewing. There you can share your comments or let us know aboutbugs with any page. PDFs and Previous Releases Below are links to the previous Ubuntu Server release server guides as well as an offline copy of the current version of this site: Ubuntu 20.04 LTS (Focal Fossa): PDF Ubuntu 18.04 LTS (Bionic Beaver): Web and PDF Ubuntu 16.04 LTS (Xenial Xerus): Web and PDF Support There are a couple of different ways that the Ubuntu Server edition is supported: commercial support and community support. The main commercial support (and development funding) is available from Canonical, Ltd. They supply reasonably- priced support contracts on a per desktop or per-server basis. For more information see the Ubuntu Advantage page. Community support is also provided by dedicated individuals and companies that wish to make Ubuntu the best distribution possible. Support is provided through multiple mailing lists, IRC channels, forums, blogs, wikis, etc. The large amount of information available can be overwhelming, but a good search engine query can usually provide an answer to your questions.
    [Show full text]
  • Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd
    Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd. and members of the Ubuntu Documentation Project3 Abstract Welcome to the Ubuntu Server Guide! It contains information on how to install and configure various server applications on your Ubuntu system to fit your needs. It is a step-by-step, task-oriented guide for configuring and customizing your system. Credits and License This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). For a list of contributors, see the contributors page1 This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. A copy of the license is available here: Creative Commons ShareAlike License2. 3 https://launchpad.net/~ubuntu-core-doc 1 ../../libs/C/contributors.xml 2 /usr/share/ubuntu-docs/libs/C/ccbysa.xml Table of Contents 1. Introduction ........................................................................................................................... 1 1. Support .......................................................................................................................... 2 2. Installation ............................................................................................................................
    [Show full text]
  • How to Cheat at Configuring Open Source Security Tools
    436_XSS_FM.qxd 4/20/07 1:18 PM Page ii 441_HTC_OS_FM.qxd 4/12/07 1:32 PM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and deliv- ering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional mate- rials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assortment of value- added features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Configuring Ubuntu Server As a Firewall and Reverse Proxy for OWA 2007.Docx
    Configuring Ubuntu Server as a Firewall and Reverse Proxy for OWA 2007 – Configuration Guide Author: Andy Grogan Version 1.0 Location: http://www.telnetport25.com Configuring Ubuntu Server as a Firewall and Reverse Proxy for OWA 2007 – Quick Guide Jan. 18 Contents Introduction ............................................................................................................................................ 3 Key Objectives: .................................................................................................................................... 4 Beyond Scope:..................................................................................................................................... 4 Requirements: ..................................................................................................................................... 4 Software: ......................................................................................................................................... 4 Pre-requisites: ................................................................................................................................. 5 Remove the Default SSL certificate from the Exchange Client Access Server: ............................... 5 Set the Internal URL for the /OWA directory on your Client Access Server: .................................. 5 Configuring the Ubuntu Server Installation and Configuring Apache 2.10.11 ....................................... 7 Download Ubuntu Server 8.10 ISO: ...................................................................................................
    [Show full text]
  • VS-1140 Certified Ubuntu Professional Reading Material
    Certified Ubuntu Professional Sample Material Certified Ubuntu Professional 1.1.1. GETTING STARTED Ubuntu is a Debian-based Linux operating system, with Unity as its default desktop environment (GNOME was the previous desktop environment). It is based on free software and named after the Southern African philosophy of ubuntu (literally, "human- ness"), which often is translated as "humanity towards others" or "the belief in a universal bond of sharing that connects all humanity". According to some metrics, Ubuntu is the most popular desktop Linux distribution to date. See Installed base section. Development of Ubuntu is led by Canonical Ltd. a company based on the Isle of Man and owned by South African entrepreneur Mark Shuttleworth. Canonical generates revenue through the sale of technical support and other services related to Ubuntu. The Ubuntu project is publicly committed to the principles of open source development; people are encouraged to use free software, study how it works, improve upon it, and distribute it. Features Ubuntu is composed of many software packages, the majority of which are free software. Free software gives users the freedom to study, adapt/modify, and distribute it. Ubuntu can also run proprietary software. Ubuntu Desktop is built around Unity, a graphical desktop environment. Ubuntu comes installed with a wide range of software that includes LibreOffice, Firefox, Empathy, Transmission, and several lightweight games (such as Sudoku and chess).[16][17] Additional software that is not installed by default (including software that used to be in the default installation such as Evolution, GIMP, Pidgin, and Synaptic) can be downloaded and installed using the Ubuntu Software Center[18] or other APT-based package management tools.
    [Show full text]
  • Keeping Your Ubuntu Systems Secure
    Keeping Your Ubuntu Systems Secure UbuCon Summit @ SCaLE16x 8 March 2018 Elizabeth K. Joseph [email protected] @pleia2 Elizabeth K. Joseph ● Ubuntu Member since 2007 ● Co-author, The Official Ubuntu Book, 8th and 9th editions ● Systems Administrator by trade, working as a Developer Advocate at Mesosphere @pleia2 | 2 Security basics Default security features What to expect Understanding your system Hint: Probably no big Managing software revelations ;) Ubuntu on servers @pleia2 | 3 Security Basics Install all security updates Don’t run commands you don’t understand Use a supported version of Ubuntu Use firewalls, separate users, and Use trusted software sources disk encryption @pleia2 | 4 Default security features CC BY 2.0: https://www.flickr.com/photos/pleia2/26747405158/ @pleia2 | 5 Separate users User isolation, both from each other and from administrative tasks, is a core security feature in Linux. Every Linux system comes with a “root” user, which is only used for administrative tasks. In Ubuntu, using this user directly is discouraged, instead preferring use of “sudo” by individual “administrator” users. While regular desktop users cannot install new packages, a non-administrative account is perfectly functional for day to day use. Tip: For added security, even as the owner (or only user on a system) you may want to create a separate user for doing administrative tasks, and do your day to day work on a user that does not have sudo access. @pleia2 | 6 Debian & Ubuntu security teams “Debian takes security very seriously. We handle all security problems brought to our attention and ensure that they are corrected within a reasonable timeframe.” via https://www.debian.org/security/ All packages in Debian and Ubuntu “main” (and “restricted” in Ubuntu) are overseen by teams of security experts from Debian, Ubuntu and Canonical.
    [Show full text]
  • * His Is the Original Ubuntuguide. You Are Free to Copy This Guide but Not to Sell It Or Any Derivative of It. Copyright Of
    * his is the original Ubuntuguide. You are free to copy this guide but not to sell it or any derivative of it. Copyright of the names Ubuntuguide and Ubuntu Guide reside solely with this site. This guide is neither sold nor distributed in any other medium. Beware of copies that are for sale or are similarly named; they are neither endorsed nor sanctioned by this guide. Ubuntuguide is not associated with Canonical Ltd nor with any commercial enterprise. * Ubuntu allows a user to accomplish tasks from either a menu-driven Graphical User Interface (GUI) or from a text-based command-line interface (CLI). In Ubuntu, the command-line-interface terminal is called Terminal, which is started: Applications -> Accessories -> Terminal. Text inside the grey dotted box like this should be put into the command-line Terminal. * Many changes to the operating system can only be done by a User with Administrative privileges. 'sudo' elevates a User's privileges to the Administrator level temporarily (i.e. when installing programs or making changes to the system). Example: sudo bash * 'gksudo' should be used instead of 'sudo' when opening a Graphical Application through the "Run Command" dialog box. Example: gksudo gedit /etc/apt/sources.list * "man" command can be used to find help manual for a command. For example, "man sudo" will display the manual page for the "sudo" command: man sudo * While "apt-get" and "aptitude" are fast ways of installing programs/packages, you can also use the Synaptic Package Manager, a GUI method for installing programs/packages. Most (but not all) programs/packages available with apt-get install will also be available from the Synaptic Package Manager.
    [Show full text]
  • Ubuntu:Precise Ubuntu 12.04 LTS (Precise Pangolin)
    Ubuntu:Precise - http://ubuntuguide.org/index.php?title=Ubuntu:Precise&prin... Ubuntu:Precise From Ubuntu 12.04 LTS (Precise Pangolin) Introduction On April 26, 2012, Ubuntu (http://www.ubuntu.com/) 12.04 LTS was released. It is codenamed Precise Pangolin and is the successor to Oneiric Ocelot 11.10 (http://ubuntuguide.org/wiki/Ubuntu_Oneiric) (Oneiric+1). Precise Pangolin is an LTS (Long Term Support) release. It will be supported with security updates for both the desktop and server versions until April 2017. Contents 1 Ubuntu 12.04 LTS (Precise Pangolin) 1.1 Introduction 1.2 General Notes 1.2.1 General Notes 1.3 Other versions 1.3.1 How to find out which version of Ubuntu you're using 1.3.2 How to find out which kernel you are using 1.3.3 Newer Versions of Ubuntu 1.3.4 Older Versions of Ubuntu 1.4 Other Resources 1.4.1 Ubuntu Resources 1.4.1.1 Unity Desktop 1.4.1.2 Gnome Project 1.4.1.3 Ubuntu Screenshots and Screencasts 1.4.1.4 New Applications Resources 1.4.2 Other *buntu guides and help manuals 2 Installing Ubuntu 2.1 Hardware requirements 2.2 Fresh Installation 2.3 Install a classic Gnome-appearing User Interface 2.4 Dual-Booting Windows and Ubuntu 1 of 212 05/24/2012 07:12 AM Ubuntu:Precise - http://ubuntuguide.org/index.php?title=Ubuntu:Precise&prin... 2.5 Installing multiple OS on a single computer 2.6 Use Startup Manager to change Grub settings 2.7 Dual-Booting Mac OS X and Ubuntu 2.7.1 Installing Mac OS X after Ubuntu 2.7.2 Installing Ubuntu after Mac OS X 2.7.3 Upgrading from older versions 2.7.4 Reinstalling applications after
    [Show full text]