Franske CNT-2311 Labs: Difference between revisions
Jump to navigation
Jump to search
BenFranske (talk | contribs) No edit summary |
BenFranske (talk | contribs) No edit summary |
||
Line 102: | Line 102: | ||
##With the telnet or ftp utilities | ##With the telnet or ftp utilities | ||
#Examine network traffic with the tcpdump utility | #Examine network traffic with the tcpdump utility | ||
=Chapter 9= | |||
#Try viewing some of the predefined environment variables | |||
#Try setting an environment variable of your own and then viewing it | |||
#Create an alias for a command and they try using it | |||
#Explore the global and per-user shell configuration files | |||
#Write a basic shell script, make it executable and test it out | |||
#Try writing a shell script using conditionals, loops or functions and then test it out | |||
#Setup one of the email server programs such as Postfix on your system for local mail delivery | |||
#Try sending messages between users of your system using the command line as well as a graphical client | |||
#Create an e-mail alias which directs mail to one or more users on your system and test it out | |||
#Install the MySQL server on your system and work through all the MySQL commands from p.456 to p.465 | |||
=Chapter 10= | |||
#Install the xinetd super server and explore the configuration files | |||
#Use the netstat and lsof commands to check open ports on your system | |||
#Install the nmap scanner and try running a scan on your own system (127.0.0.1) | |||
#Setup the sudo program to allow limited access to run commands as root for various users on your system and try this out | |||
#Search your system for all SUID/SGID files | |||
#Install the SSH server on your systems and try SSHing from one system to another | |||
#Try copying files between systems with SCP | |||
#Try to setup SSH to use authorized_keys instead of passwords for one of your users | |||
#Install GPG and create a key for your user | |||
#Try encrypting and decrypting a text file using GPG |
Revision as of 17:45, 24 November 2010
Chapter 1
- Demonstrate directory navigation and other basic shell tasks
- Demonstrate use of environment variables
- Demonstrate methods of getting help for a command in Linux
- Demonstrate redirection and piping
- Demonstrate use of all text processing commands
Chapter 2
- Install Fedora as a second virtual machine
- Download an RPM file for a program in Fedora
- Use the RPM utility to query for information about the RPM package
- Install a program using RPM in Fedora
- Download and install a program using YUM in Fedora
- Download and install a program using apt-get or aptitude in Ubuntu
- Use ldd to get information about what libraries a program uses
- Use ps and top to view processes running on the system
- Use job control to start and stop jobs as well as run jobs in the background and list all currently running jobs
Chapter 3
- Experiment with viewing data about system hardware and driers using the following utilities
- cat /proc/interrupts
- cat /proc/ioports
- cat /proc/dma
- lspci
- lsmod
- lsusb
- dmesg
- Create a new virtual hard drive file and add it as a secondary hard drive to your Linux VM
- Partition the second hard drive into multiple partitions
- Format the partitions on the second hard drive
- Mount and unmount the formatted partitions to various mountpoints you have created within your filesystem
Chapter 4
- Use the ls command to list files in a directory
- Use the -a and -l options to get a long file listing and one that includes hidden files
- Display the file types as part of the listing
- Use the cp command to try copying files and entire directories from one location to another
- Use the mv command to try moving files and entire directories from one location to another
- Use the rm command to try deleting files and entire directories
- Use the touch command to modify file access times
- Use the tar utility to backup a folder and all the files it contains into a single gzipped tar file
- Extract your gzipped tar file to some other location on your drive
- Use the ln utility to create hard and soft links to files in other places on your system
- Use the mkdir and rmdir commands to create and remove directories on your system
- Use the chown command to change the owner AND group of a file and of a directory plus all the files it contains (recursively)
- Use the chgrp command to change just the group of a file
- Use the chmod command to change the permissions on a file or directory using both octal and symbolic modes
- Use the locate, find, whereis, which and type commands to try finding files on your system
Chapter 5
- Identify and explore the GRUB configuration file on your system
- Use the dmesg utility to display the kernel ring buffer on your system
- Use the init command to switch between text-mod and GUI interfaces on a Fedora system
- Use the runlevel command to display the current runlevel and verify that it is changing
- Explore the inittab file (and it's Upstart replacement used in Ubuntu)
- View the SysV startup scripts installed on your system and check which ones are setup to start and stop at each of the runlevels
- Use the chkconfig command to list services running at each runlevel on your system
- Try shutting down and restarting your system using the shutdown command in combination with a shutdown timer
- Use Vi to create and edit a file, including:
- Yanking and pasting lines and groups of lines
- Deleting groups of lines at a time
- Searching and replacing text
- Saving and quitting
Chapter 6
- Use the Xorg -configure command to create a xorg.conf file and review the sections found in that file
- Attempt to change the X resolution through the xorg.conf file
- If you are unable to change the resolution in the xorg.conf file try changing it through a GUI monitor resolution tool
- Try out several accessibility options in X, for example:
- Sticky Keys
- Slow Keys
- Bounce Keys
- Mouse Keys / Mouse Navigation Emulation
- Dwell Click / Simulated Mouse Clicks
- Check the locales installed on your system with the locale -a command
- Change the current locale (including switching the character encoding method if you have a locale with a different encoding method installed) and timezone of your system
- Create a new text file while in a different character encoding mode
- Change your locale and timezone back to their original settings
- Use the iconv program to convert the text file you created to your default character encoding method
Chapter 7
- Users and Groups
- Create new users on the system
- Create new groups on the system
- Explore the /etc/passwd, /etc/group and /etc/shadow files
- Change the password of the current user
- Change the password of another user as Root
- Use the chown and chgrp commands to change the owner and group associated with files and folders
- Remove users from the system
- Explore the system logging settings in /etc/syslog.conf and /etc/logrotate.conf
- Review system logfiles
- Manually set the system date and time
- Configure NTP to automatically update the system date and time
- Setup a system and user cron job to run a scheduled task
Chapter 8
- Check network interface configurations with ifconfig
- Set the system hostname (temporairly with hostname and permanently with /etc/hostname)
- Resovle DNS names with nslookup, host and dig
- Explore system name resolution settings in /etc/hosts, /etc/resolv.conf and /etc/nsswitch.conf
- Configure a network interface in both Ubuntu and Fedora using graphical and text only modes for DHCP and for a static address
- Stop and start a network interface to apply settings
- Explore the system routing table
- Enable IP Forwarding
- Test system connectivity
- With the ping command
- With the traceroute command
- With the netstat command
- With the telnet or ftp utilities
- Examine network traffic with the tcpdump utility
Chapter 9
- Try viewing some of the predefined environment variables
- Try setting an environment variable of your own and then viewing it
- Create an alias for a command and they try using it
- Explore the global and per-user shell configuration files
- Write a basic shell script, make it executable and test it out
- Try writing a shell script using conditionals, loops or functions and then test it out
- Setup one of the email server programs such as Postfix on your system for local mail delivery
- Try sending messages between users of your system using the command line as well as a graphical client
- Create an e-mail alias which directs mail to one or more users on your system and test it out
- Install the MySQL server on your system and work through all the MySQL commands from p.456 to p.465
Chapter 10
- Install the xinetd super server and explore the configuration files
- Use the netstat and lsof commands to check open ports on your system
- Install the nmap scanner and try running a scan on your own system (127.0.0.1)
- Setup the sudo program to allow limited access to run commands as root for various users on your system and try this out
- Search your system for all SUID/SGID files
- Install the SSH server on your systems and try SSHing from one system to another
- Try copying files between systems with SCP
- Try to setup SSH to use authorized_keys instead of passwords for one of your users
- Install GPG and create a key for your user
- Try encrypting and decrypting a text file using GPG