Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [root@localhost ~]# history
- 1 man iptables
- 2 reboot
- 3 grub2-setpassword
- 4 ls -lrt /boot/grub2/
- 5 cat user.cfg
- 6 cat /boot/grub2/user.cfg
- 7 reboot
- 8 cd linuxsecurity/
- 9 ./countdown 12
- 10 fdisk /dev/sda
- 11 cryptsetup luksFormat /dev/sda3
- 12 xxd /dev/sda3 | less
- 13 cryptsetup luksOpen /dev/sda3 secret
- 14 ls -l /dev/mapper/
- 15 mkfs.ext4 /dev/mapper/secret
- 16 mount /dev/mapper/secret /mnt
- 17 cp /etc/a* /mnt/
- 18 ls /mnt
- 19 umount /mnt
- 20 cryptSetup luksClose /dev/sda3
- 21 cryptsetup luksClose /dev/sda3
- 22 cryptsetup luksClose /dev/mapper/secret
- 23 history
- 24 ldd $(which login)
- 25 ldd $(which passwd)
- 26 ldd $(which ssh)
- 27 cd /etc/pam.d/
- 28 ls
- 29 vim login
- 30 ls -l
- 31 vim system-auth
- 32 find / -name "pam_unix.so"
- 33 cd /usr/lib64/security/
- 34 ls
- 35 man -k pam_
- 36 ls
- 37 man -k pam_
- 38 man pam_setquota
- 39 vim /etc/securetty
- 40 chvt 5
- 41 man pam_securetty
- 42 cd /etc/pam.d
- 43 vim system-auth
- 44 chvt 6
- 45 vim login
- 46 vim system-auth
- 47 cp login login.bak
- 48 vim login
- 49 history
- 50 cd /usr/lib64/security/
- 51 ls
- 52 dnf provides */pam_allow.so
- 53 dnf provides "*/pam_allow.so"
- 54 man pam_permit
- 55 vim login
- 56 cd /etc/pam.d/
- 57 vim login
- 58 chvt 3
- 59 mv login login.bak
- 60 mv login login.bad
- 61 mv login.bak login
- 62 ldd $(which sshd)
- 63 pwd
- 64 ls
- 65 vim sshd
- 66 find / -name "pam_permit.so"
- 67 history
- 68 cd
- 69 useradd anna
- 70 passwd anna
- 71 cd /home/anna
- 72 ls -ld .
- 73 pwd
- 74 echo wortel > rootfile
- 75 cat rootfile
- 76 su - anna
- 77 mkdir -p /data/sales
- 78 groupadd sales
- 79 usermod -aG sales anna
- 80 id anna
- 81 chgrp sales /data/sales
- 82 echo hello > /data/sales/afile
- 83 chown anna:sales /data/sales/afile
- 84 chmod 077 /data/sales/afile
- 85 su - anna
- 86 man 7 capabilities
- 87 pwd
- 88 echo fun > demo
- 89 chmod 400 demo
- 90 ls -l
- 91 chmod 444 demo
- 92 ls -l
- 93 su - anna
- 94 pwd
- 95 vim playme
- 96 chmod +x playme
- 97 ls -l playme
- 98 cat playme
- 99 chmod u+s playme
- 100 ls -l playme
- 101 su - anna
- 102 find / -perm +4000
- 103 find / -perm /4000
- 104 ls -l /usr/bin/passwd
- 105 ls -l /etc/shadow
- 106 find / -perm /4000 > /tmp/suidfiles.txt
- 107 cat /tmp/suidfiles.txt
- 108 find / -perm /4000 > /tmp/suid-$(date +%d-%m-%y).txt
- 109 ls /tmp/sui*
- 110 diff /tmp/suidfiles.txt /tmp/suid-16-11-23.txt
- 111 echo $?
- 112 echo hello >> /tmp/suid-16-11-23.txt
- 113 diff /tmp/suidfiles.txt /tmp/suid-16-11-23.txt
- 114 echo $?
- 115 history
- 116 su - anna
- 117 groupadd account
- 118 useradd -G account linda
- 119 passwd linda
- 120 cd /data/
- 121 ls -l
- 122 chmod 770 sales
- 123 chmod g+s sales
- 124 ls -ld sales/
- 125 echo wortel > sales/wortelfile
- 126 ls -l sales/wortelfile
- 127 su - linda
- 128 setfacl -R -m g:account:rX /data/sales
- 129 su - linda
- 130 getfacl /data/sales
- 131 echo root > sales/rootfile
- 132 getfacl sales/rootfile
- 133 rm sales/rootfile
- 134 setfacl -m d:g:account:rx /data/sales
- 135 echo root > sales/rootfile
- 136 getfacl sales/rootfile
- 137 history
- 138 cd
- 139 cat linuxsecurity/resources.txt
- 140 history
- 141 touch /root/removeme.txt
- 142 chattr +i /root/removeme.txt
- 143 rm -f /root/removeme.txt
- 144 ls -l removeme.txt
- 145 lsattr *
- 146 chattr -i removeme.txt
- 147 iptables -L
- 148 systemctl disable --now firewalld
- 149 iptables -P OUTPUT DROP
- 150 iptables -P INPUT DROP
- 151 ping google.com
- 152 iptables -A OUTPUT -p icmp -j ACCEPT
- 153 ping google.com
- 154 ping 8.8.8.8
- 155 iptables -A OUTPUT -p tcp --dport=53 -j ACCEPT
- 156 iptables -A OUTPUT -p udp --dport=53 -j ACCEPT
- 157 ping google.com
- 158 iptables -A INPUT -m state --state=ESTABLISHED,RELATED -j ACCEPT
- 159 ping google.com
- 160 iptables -L
- 161 ssh 192.168.29.139
- 162 iptables -A OUTPUT -p tcp --dport 22 -j ACCEPT
- 163 ssh 192.168.29.139
- 164 iptables -A INPUT -p tcp --dport 22 -j ACCEPT
- 165 iptables -L
- 166 history
- 167 iptables-save
- 168 iptables-save --help
- 169 ls -l /etc/sysconfig/
- 170 iptables-save > /etc/sysconfig/iptables-save.conf
- 171 history -w
- 172 chvt 2
- 173 chvt 2
- 174 chvt 2
- 175 cd linuxsecurity/
- 176 ./countdown 12
- 177 ./countdown 15
- 178 fdisk /dev/sda
- 179 cryptsetup luksFormat /dev/sda3
- 180 xxd /dev/sda3 | less
- 181 cryptsetup luksOpen /dev/sda3 secret
- 182 ls -l /dev/mapper/
- 183 mkfs.ext4 /dev/mapper/secret
- 184 mount /dev/mapper/secret /mnt
- 185 cp /etc/a* /mnt/
- 186 ls /mnt
- 187 umount /mnt
- 188 cryptSetup luksClose /dev/sda3
- 189 cryptsetup luksClose /dev/sda3
- 190 cryptsetup luksClose /dev/mapper/secret
- 191 history
- 192 ldd $(which login)
- 193 ldd $(which passwd)
- 194 ldd $(which ssh)
- 195 cd /etc/pam.d/
- 196 ls
- 197 vim login
- 198 ls -l
- 199 vim system-auth
- 200 find / -name "pam_unix.so"
- 201 cd /usr/lib64/security/
- 202 ls
- 203 man -k pam_
- 204 ls
- 205 man -k pam_
- 206 man pam_setquota
- 207 vim /etc/securetty
- 208 chvt 5
- 209 man pam_securetty
- 210 cd /etc/pam.d
- 211 vim system-auth
- 212 chvt 6
- 213 vim login
- 214 vim system-auth
- 215 cp login login.bak
- 216 vim login
- 217 history
- 218 cd /usr/lib64/security/
- 219 ls
- 220 dnf provides */pam_allow.so
- 221 dnf provides "*/pam_allow.so"
- 222 man pam_permit
- 223 vim login
- 224 cd /etc/pam.d/
- 225 vim login
- 226 chvt 3
- 227 mv login login.bak
- 228 mv login login.bad
- 229 mv login.bak login
- 230 ldd $(which sshd)
- 231 pwd
- 232 ls
- 233 vim sshd
- 234 find / -name "pam_permit.so"
- 235 history
- 236 cd
- 237 useradd anna
- 238 passwd anna
- 239 cd /home/anna
- 240 ls -ld .
- 241 pwd
- 242 echo wortel > rootfile
- 243 cat rootfile
- 244 su - anna
- 245 mkdir -p /data/sales
- 246 groupadd sales
- 247 usermod -aG sales anna
- 248 id anna
- 249 chgrp sales /data/sales
- 250 echo hello > /data/sales/afile
- 251 chown anna:sales /data/sales/afile
- 252 chmod 077 /data/sales/afile
- 253 su - anna
- 254 man 7 capabilities
- 255 pwd
- 256 echo fun > demo
- 257 chmod 400 demo
- 258 ls -l
- 259 chmod 444 demo
- 260 ls -l
- 261 su - anna
- 262 pwd
- 263 vim playme
- 264 chmod +x playme
- 265 ls -l playme
- 266 cat playme
- 267 chmod u+s playme
- 268 ls -l playme
- 269 su - anna
- 270 find / -perm +4000
- 271 find / -perm /4000
- 272 ls -l /usr/bin/passwd
- 273 ls -l /etc/shadow
- 274 find / -perm /4000 > /tmp/suidfiles.txt
- 275 cat /tmp/suidfiles.txt
- 276 find / -perm /4000 > /tmp/suid-$(date +%d-%m-%y).txt
- 277 ls /tmp/sui*
- 278 diff /tmp/suidfiles.txt /tmp/suid-16-11-23.txt
- 279 echo $?
- 280 echo hello >> /tmp/suid-16-11-23.txt
- 281 diff /tmp/suidfiles.txt /tmp/suid-16-11-23.txt
- 282 echo $?
- 283 history
- 284 su - anna
- 285 groupadd account
- 286 useradd -G account linda
- 287 passwd linda
- 288 cd /data/
- 289 ls -l
- 290 chmod 770 sales
- 291 chmod g+s sales
- 292 ls -ld sales/
- 293 echo wortel > sales/wortelfile
- 294 ls -l sales/wortelfile
- 295 su - linda
- 296 setfacl -R -m g:account:rX /data/sales
- 297 su - linda
- 298 getfacl /data/sales
- 299 echo root > sales/rootfile
- 300 getfacl sales/rootfile
- 301 rm sales/rootfile
- 302 setfacl -m d:g:account:rx /data/sales
- 303 echo root > sales/rootfile
- 304 getfacl sales/rootfile
- 305 history
- 306 cd
- 307 cat linuxsecurity/resources.txt
- 308 history
- 309 touch /root/removeme.txt
- 310 chattr +i /root/removeme.txt
- 311 rm -f /root/removeme.txt
- 312 ls -l removeme.txt
- 313 lsattr *
- 314 chattr -i removeme.txt
- 315 iptables -L
- 316 systemctl disable --now firewalld
- 317 iptables -P OUTPUT DROP
- 318 iptables -P INPUT DROP
- 319 ping google.com
- 320 iptables -A OUTPUT -p icmp -j ACCEPT
- 321 ping google.com
- 322 ping 8.8.8.8
- 323 iptables -A OUTPUT -p tcp --dport=53 -j ACCEPT
- 324 iptables -A OUTPUT -p udp --dport=53 -j ACCEPT
- 325 ping google.com
- 326 iptables -A INPUT -m state --state=ESTABLISHED,RELATED -j ACCEPT
- 327 ping google.com
- 328 iptables -L
- 329 ssh 192.168.29.139
- 330 iptables -A OUTPUT -p tcp --dport 22 -j ACCEPT
- 331 ssh 192.168.29.139
- 332 iptables -A INPUT -p tcp --dport 22 -j ACCEPT
- 333 iptables -L
- 334 history
- 335 iptables-save
- 336 iptables-save --help
- 337 ls -l /etc/sysconfig/
- 338 iptables-save > /etc/sysconfig/iptables-save.conf
- 339 history -w
- 340 reboot
- 341 systemctl enable --now firewalld
- 342 firewall-cmd --list-all
- 343 firewall-cmd --get-services
- 344 firewall-cmd --add-service murmur
- 345 firewall-cmd --list-all
- 346 cat /usr/lib/firewalld/services/murmur.xml
- 347 firewall-cmd --add-port 123/tcp
- 348 firewall-cmd --list-all
- 349 firewall-cmd --runtime-to-permanent
- 350 firewall-cmd --info-service=murmur
- 351 cp /usr/lib/firewalld/services/murmur.xml /etc/firewalld/services/sander.xml
- 352 firewall-cmd --get-services | grep sander
- 353 systemctl restart firewalld
- 354 firewall-cmd --get-services | grep sander
- 355 man firewalld.richlanguage
- 356 firewall-cmd --permanent --zone=public --add-rich-rule='rule service name="ssh" log prefix="ssh" level="notice" limit value="2/m" accept'
- 357 firewall-cmd --list-all
- 358 firewall-cmd --reload
- 359 firewall-cmd --list-all
- 360 history
- 361 systemctl status auditd
- 362 less /var/log/audit/audit.log
- 363 grep AVC /var/log/audit/audit.log
- 364 auditctl -w /etc/passwd -p wa -k passwd-access
- 365 cat /etc/passwd
- 366 grep passwd-access /var/log/audit/audit.log
- 367 auditctl -w /bin -p x
- 368 ls
- 369 tail /var/log/audit/audit.log
- 370 dnf install -y httpd
- 371 vim /etc/httpd/conf/httpd.conf
- 372 mkdir /web; echo hello web > /web/index.html
- 373 systemctl restart httpd
- 374 curl localhost
- 375 grep AVC /var/log/audit/audit.log
- 376 ps Zaux | grep http
- 377 ls -Z /var/www
- 378 ls -Zd /web
- 379 ls -dZ /var/tmp
- 380 journalctl | grep sealert
- 381 sealert -l 3a0ddcf9-27f3-40b8-9322-a78a9616955e | less
- 382 # ausearch -c 'httpd' --raw | audit2allow -M my-httpd
- 383 # semodule -X 300 -i my-httpd.pp
- 384 ausearch -c 'httpd' --raw
- 385 usearch -c 'httpd' --raw | audit2allow -M my-httpd
- 386 ausearch -c 'httpd' --raw | audit2allow -M my-httpd
- 387 semodule -i my-httpd.pp
- 388 curl localhost
- 389 grep AVC /var/log/audit/audit.log
- 390 semodule -d my-httpd.pp
- 391 semodule --help
- 392 semodule -r my-httpd.pp
- 393 ssh student@192.168.29.139
- 394 dnf install fapolicyd
- 395 systemctl enable --now fapolicyd
- 396 cp /bin/ls /tmp/ls
- 397 fapolicyd-cli --add-file /tmp/ls --trust-file myapp
- 398 cat /etc/shadow
- 399 ls -l /etc/shadow
- 400 fapolicyd-cli --file /tmp/ls --trust-file myapp
- 401 history
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement