Course Hero Logo

mod4Lab_JBUBA.docx - Lab 4 – SSH Server Hardening Commands...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 2 out of 9 pages.

Lab 4 – SSH Server HardeningCommands to know/use for reference:ps -ef | grep ‘sshd’ --this command looks for the ssh server running on the Linux machine. Thiscommand also works for looking for pretty much anything in the active process list. Just replacethe sshd with the name of the software or service you are looking for.sshd -t --this command test runs the ssh software’s configuration file.sshd -T --this command shows the current configuration variables for the ssh softwareping1.2.3.4 --- this command tests connectivity between the machine you run this from and thedestination IP address you use (in place of 1.2.3.4)systemctl reload ssh.service -This command reloads to sshd config file (like a reboot of theSSH server)sudo lsb_release -a -This checks the version and codename of the OSsudo apt-get –-purge remove sshd --this removes the sshd software. I wouldn’t type this as is…it may break the lab. But using this command with a different service name may just be what youneed to do.Dpkg –-list | grep ‘ssh’ - this command lists the software packages installed on the system andthe 2nd command “grep” filters for anything you want to look for. This is very useful in showingproof that certain services/software are no longer installed.Sudo apt-get updateSudo apt-get upgrade – both commands are a part of patch management. They will even tellyou when there are packages that are no longer needed, but you still need to run the command toremove those packages.nmap -sS x.x.x.a,b,c this command is for port scansls – directory listingcp - to copy a file from one place to anotherlocation of key pairs: /home/midterm/.ssh/id*ssh x.x.x.x is the format of the command to connect to the serverTask – Harden SSH ServerNetwork defense requires a deep tool set of both network and system administration.Understanding remote login protocols, their strengths and weaknesses is important. In this lab weare going to look at ssh or secure shell. Ssh is a secure remote protocol which is used to workremotely on other machines or transfer data between computers using SCP (secure copy)command.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture