Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 30

Lab 2 - Authentication, Authorization, and Accounting

Student ID 21521717
Full name Pham Trong Khanh
Total completion time
Self-assessment grade
Feedback (if any)

Lab 2.1 – Install a Virtual Machine on a Personal Computer


Objectives
Part 1: Prepare a Computer for Virtualization
Part 2: Import a Virtual Machine into VirtualBox Inventory

Background / Scenario
Computing power and resources have increased tremendously over the last 10 years. A benefit of having
multicore processors and large amounts of RAM is the ability to use virtualization. With virtualization, one or
more virtual computers can operate inside a single physical computer. Virtual computers that run within
physical computers are called virtual machines. Virtual machines are often called guests, and physical
computers are often called hosts. Anyone with a modern computer and operating system can run virtual
machines.
A virtual machine image file has been created for you to install on your computer. In this lab, you will
download and import this image file using a desktop virtualization application, such as VirtualBox.

Required Resources
 Computer with a minimum of 2 GB of RAM and 8 GB of free disk space
 High speed Internet access to download Oracle VirtualBox and the virtual machine image file
Note: The image file is about 2.5 GB, and can grow up to 5 GB after the virtual machine is in operation. While
you can delete the image file after the virtual machine is imported, the 8 GB free disk space requirement is for
users who decide to keep the image file.
Note: To install and run 64bit virtual machines on a host physical computer, the computer needs to be a 64bit
system and have hardware virtualization technology enabled in BIOS. If you are unable to install the virtual
machine image you may need to reboot your computer and enter setup mode in BIOS to enable hardware
virtualization technology under advanced system settings.

Part 1: Prepare a Host Computer for Virtualization


In Part 1, you will download and install desktop virtualization software, and also download an image file that
can be used to complete labs throughout the course. For this lab, the virtual machine is running Linux.

Step 1: Download and install VirtualBox


VMware Workstation Player and Oracle VirtualBox are two virtualization programs that you can download and
install to support the image file. In this lab, you will use VirtualBox.

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

a. Navigate to http://www.oracle.com/technetwork/server-storage/virtualbox/downloads/index.html.
b. Choose and download the appropriate installation file based on your operating system.
c. When you have downloaded the VirtualBox installation file, run the installer and accept the default
installation settings.

Step 2: Download the Virtual Machine image file


The image file was created in accordance with the Open Virtualization Format (OVF). OVF is an open
standard for packaging and distributing virtual appliances. An OVF package has several files placed into one
directory. This directory is then distributed as an OVA package. This package contains all of the OVF files
necessary for the deployment of the virtual machine. The virtual machine used in this lab was exported in
accordance with the OVF standard.
Click here to download the virtual machine image file.
https://dlhzub60.linuxvmimages.com/VirtualBox/U/20.04/Ubuntu_20.04.4_VB.7z
Note: This file is 2.5 GB in size, and it may take over an hour to download, depending on the speed of your
Internet connection.

Part 2: Import the Virtual Machine into the VirtualBox Inventory


In Part 2, you will import the virtual machine image into VirtualBox and start the virtual machine.

Step 1: Import the virtual machine file into VirtualBox


a. Open VirtualBox. Click File > Import Appliance... to import the virtual machine image.
b. A new window will appear. Specify the location of the .OVA file.
c. The appliance settings appear. Check the Reinitialize the MAC address of all network cards box at
bottom of the window. Leave all other settings as default. Click Import.
d. When the import process is complete, you will see the new Virtual Machine added to the VirtualBox
inventory in the left panel. The virtual machine is now ready to use.

Step 2: Start the virtual machine and log in


a. In the inventory shown on the left, select the virtual machine you wish to use.
b. Click the Start button. It is the green arrow located at the top portion of the VirtualBox application window.
A new window will appear, and the virtual machine boot process will start.
Note: If the virtual machine fails to start, either disable the USB Controller by going into the virtual
machine’s settings and unchecking the USB controller setting under USB or go to the VirtualBox
download webpage and download and install the Oracle VM VirtualBox Extension Pack.
c. When the boot process is complete, the virtual machine will ask for a username and password. Use the
following credentials to log into the virtual machine:
Username: ubuntu
Password: ubuntu
You will be presented with a desktop environment: there is a launcher bar at the bottom, icons on the
desktop, and an application menu at the top.
Note: The window running the virtual machine is a completely different computer than your host. Functions
such as copy and paste will not work between the two without special software tools installed. Notice the
keyboard and mouse focus. When you click inside the virtual machine window, your mouse and keyboard will

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

operate the guest operating system. Your host operating system will no longer detect keystrokes or mouse
movements. Press the right CTRL key to return keyboard and mouse focus to the host operating system.

Step 3: Familiarize yourself with the Virtual Machine


Use the Ubuntu_CyberEss virtual machine you just installed to complete the labs that require Ubuntu in this
course. Familiarize yourself with the icons in the list below:
The launcher icons are on the left (from top to bottom):
 Search Tool
 File manager application
 Firefox Web Browser
 LibreOffice Writer, LibreOffice Calc, LibreOffice Impress
 Ubuntu Software Center
 Amazon
 System Settings
 Terminal
 Trash
a. Open the terminal application. Type the command ip address at the prompt to determine the IP address
of your virtual machine.
What are the IP addresses assigned to your virtual machine?
The loopback interface is assigned 127.0.0.1/8
The Ethernet interface is assigned an IP address in the 10.0.2.15/24 network.
____________________________________________________________________________________
b. Locate and launch the web browser application. Can you navigate to your favorite search engine? _Yes
c. ____
d. Press the right ctrl key to release the cursor from the virtual machine. Now go to the menu at the top of
the virtual machine window and choose File > Close to close the virtual machine. What options are
available?
Save the machine's state, send a shutdown signal, and turn it off.
____________________________________________________________________________________
____________________________________________________________________________________
e. Click the Save the machine state radio button and click OK. The next time you start the virtual machine,
you will be able to resume working in the operating system in its current state.

Reflection
What are the advantages and disadvantages of using a virtual machine?
You can test new programs or operating systems on a virtual computer without compromising your host PC.
When you close a virtual machine, you can also save the current machine state. If you run into any problems,
you can restore the virtual machine to a previously stored state. A virtual machine, on the other hand, requires
the host system's hardware resources, such as hard drive space, RAM, and processor power.
______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

_______________________________________________________________________________________

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Lab 2.2 – Authentication, Authorization, and Accounting


Objectives
 Given a scenario, select the appropriate authentication, authorization, or access control
 Install and configure security controls when performing account management, based on best practices
Part 1: Adding Groups, Users, and Passwords on a Linux System
Part 2: Verify Users, Groups, and Passwords
Part 3: Using Symbolic Permissions
Part 4: Absolute Permissions

Background / Scenario
You will be conducting host security practices using the Linux command line by performing the following
tasks:
 Adding Groups, Users, and Passwords
 Verifying Groups, Users, and Passwords
 Setting Symbolic Permissions
 Setting Absolute Permissions

Required Resources
 PC with Ubuntu 16.0.4 LTS installed in a VirtualBox or VMware virtual machine.

Part 3: Adding Groups, Users,


and Passwords on a
Linux System
In this part, you will add users, groups, and passwords to the local host machine.

Step 1: Open a terminal window in Ubuntu.


a. Log in to Ubuntu using the following credentials:
User: cisco
Password: password

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

b. Click on the terminal icon to open a terminal.

Step 2: Escalate privileges to the root level by entering the sudo su command. Enter the
password password when prompted.
cisco@ubuntu:~$ sudo su

Step 3: Add a new group named HR by entering the command groupadd HR.
root@ubuntu:/home/cisco# groupadd HR

Part 4: Verify Users, Groups,


and Passwords
Step 1: Verify the new group has been added to the group file list by entering cat /etc/group.
root@ubuntu:/home/cisco# cat /etc/group
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

The new group HR will be added to the bottom of the /etc/group file with a group ID = __1001__________

Step 2: Add a new user (user A) named [your_last_name]


root@ubuntu:/home/cisco# adduser [your_last_name]
Example: root@ubuntu:/home/cisco# adduser jenny
a. When prompted for a new password, type [your student ID]. Press Enter.
b. When prompted again, type [your student ID]. Press Enter.
c. When prompted for a full name, type your full name. Press Enter.
d. For the rest of the configurations, press Enter until when asked is the information correct.
e. Type Y for yes and press Enter.

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

[Screenshot]

Step 3: Place the user A in the HR group.


root@ubuntu:/home/cisco# usermod –G HR [your_last_name]
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Step 4: Add another new user (user B) named joe.


root@ubuntu:/home/cisco# adduser joe
a. When prompted for a new password, type tooth. Press Enter.
b. When prompted again, type tooth. Press Enter.
c. When prompted for a full name, type Joe. Press Enter.
d. For the rest of the configurations, press Enter until when asked is the information correct.
e. Type Y for yes and press Enter.
f. Place the user joe in the HR group.
root@ubuntu:/home/cisco# usermod –G HR joe
[Screenshot]

Step 5: Verify the newly created users in the passwd file.


root@ubuntu:/home/cisco# cat /etc/passwd
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

- Explain the meaning of each field in the user A’s line (All fields are separated by a colon (:) symbol).
khanhh: user name
x: Holding place for the user’s “encrypted password.” Traditionally, this field actually stored the user’s
encrypted password. Modern Unix systems store encrypted passwords in a separate file (the shadow
password file) that can be accessed only by privileged users.
1001: User’s user identification number (UID).
1002: User’s group identification number (GID).
pham trong khanh: user’s full name
/home/khanh: user directory
/bin/blash: user’s shell
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

Step 6: View the created users in the shadow file.


root@ubuntu:/home/cisco# cat /etc/shadow
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

- Explain the meaning of each field in the user joe’s line (All fields are separated by a colon (:) symbol).
- How the password was stored in Ubuntu OS? Could you find the password of joe using these fields in
the shadow file?
Joe: username
$6$jrWmjYOm18nPWgl3$Z/XpmSkLK5hbyDSVsiV.S5FPKdo9FbxxeE/
qmJ9ciq440GKZVMind9JHF66Gd1lN/wNJn103WrRNyIPmgts3Z/: encrypted password. The
password should be minimum 8-12 characters long including special characters, digits, lower case
alphabetic and more
19077: Last password change (lastchanged): Days since Jan 1 1970, that password was
last changed
0: The minimum number of days required between password changes i.e., the number of days left
before the user is allowed to change his/her password
99999: The maximum number of days the password is valid (after that user is forced to change
his/her password)
7: The number of days before password is to expire that user is warned that his/her password must
be changed______________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Part 5: Using Symbolic


Permissions
Step 1: While on the Ubuntu system, press and hold the keys CTRL+ALT+F1 until the screen
changes to the tty1 Terminal.

Note: If you are unable to use tty1 terminal, return to graphical user interface (GUI) of the host by using
CTRL+ALT+F7 and open a terminal window in the GUI Ubuntu OS. At the prompt, enter su –l [user A] at the
prompt and enter the password. Proceed to Step 4.
Example: cisco@ubuntu:~$ su –l jenny

Note: If CTRL+ALT+F7 did not work, try CTRL+ALT+F8.

Step 2: Once on the Terminal login screen, type [user A] and press Enter.

Step 3: When prompted for the password, type the password and press Enter.

Step 4: After a successful login, you will see the [user A]@ubuntu:~$ prompt.
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

- What is the difference between $ and # signs (in the previous part) on the left of the blinking cursor?
$ means you are normal user
# means you are system adminstator__________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

Step 5: View your present directory.


jenny@ubuntu:~$ pwd
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Step 6: Go back one directory level to the /home directory.


jenny@ubuntu:~$ cd ..
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Step 7: List all directories and their permissions.


jenny@ubuntu:/home$ ls -l
[Screenshot]

The Linux operating system has a total of 10 letters or dashes in the permissions fields:
o The first field is a dash for a file an a d for a directory
nd th
o The 2 through 4 fields are for the user
th th
o The 5 through 7 fields are for the group
th th
o The 8 through 10 fields are for others (accounts other than those in the group)

Step 8: Enter Joe’s folder as [user A] by typing the command cd joe.


For example, user A is jenny

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

jenny@ubuntu:/home$ cd joe

Notice that we are able to go into Joe’s home folder.


jenny@ubuntu:/home/joe$ cd ..

Step 9: Press and hold CTRL+ALT+F2 to switch to another Terminal session (tty2).

Step 10: Login as the user root with the password secretpassword.

Note: If you are unable to use tty2 terminal, return to graphical user interface (GUI) of the host by using
CTRL+ALT+F7 and open a terminal window in the GUI Ubuntu OS. At the prompt, enter sudo -i at the
prompt and enter the password password.

Step 11: Change to the /home directory.


root@ubuntu:~# cd /home

Step 12: Change the “other” permission on joe’s folder by making it non-executable.
root@ubuntu:/home# chmod o-x joe

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Step 13: List the directories once more with their respective permissions.
root@ubuntu:/home# ls -l
[Screenshot]

Notice now that there are two dashes in the “others” field for joe’s folder.

Step 14: Press and hold CTRL+ALT+F1 to switch back to the other Terminal session (tty1).
Make sure you are viewing the following command prompt: jenny@ubuntu:/home$.

Step 15: Attempt to go into Joe’s folder once more.


jenny@ubuntu:/home$ cd joe

Notice that we do not have the permissions to do so.

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

The chart below shows examples of other ways the chmod command can be used:

chmod command Results

chmod u+rwx Adds read, write, and execute permissions for the user
chmod u+rw Adds read and write permission for the user

chmod o+r Adds read permission for others


chmod g-rwx Removes read, write, and execute permissions for the group

Step 16: Type exit followed by pressing Enter to logout of the Terminal session.

Part 6: Absolute Permissions


Step 1: Login as the user joe with the password tooth while on tty1.

Note: If you are unable to use tty1 terminal, return to graphical user interface (GUI) of the host by using
CTRL+ALT+F7 and open a terminal window in the GUI Ubuntu OS. At the prompt, enter sudo –l joe at
the prompt and enter the password tooth.

Step 2: Print your current working directory.


joe@ubuntu:~$ pwd
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Step 3: Go back one directory level to the /home directory.


joe@ubuntu:~$ cd ..

Step 4: List all directories and their permissions in the current working directory.
joe@ubuntu:/home~$ ls -l
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Notice that Joe’s folder is set so that “others” are not able to access the folder.
The other way of assigning permissions besides using symbolic permissions is the use of absolute
permissions. Absolute permissions use a three digit octal number to represent the permissions for owner,
group and other.
The table below outlines each absolute value and its corresponding permissions:

Number Permissions

7 Read, Write, and Execute


6 Read and Write

5 Read and Execute


4 Read

3 Write and Execute


2 Write

1 Execute
0 None

By typing the command chmod 764 examplefile, the examplefile will be assigned the follow permissions:
o The user will get read, write and execute permissions
o The group will get read and write permissions
o Others will get read access

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 20 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Breakdown of how 764 represents these permissions:

Digit Binary Equivalent Permission

1-Read 1-Write
7 (user) 111
1-Execute

1-Read 1-Write
6 (group) 110
0-No Execute

1-Read
4 (others) 100 0-No Write
0-No Execute

Step 5: Modify the “others” field for Joe’s folder so that others will be able read and execute
but not write while still maintaining the “user” field to read, write, and execute.
- Which command can be used? joe@ubuntu:/home$ chmod 705 joe__________________________
[Screenshot]

Step 6: List the file permissions of the current directory to see that the absolute changes were
made.
joe@ubuntu:/home$ ls -l
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 21 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Step 7: Change to the /home/joe directory.


joe@ubuntu:/home$ cd joe

Step 8: Create a simple text file named test.txt using touch.


joe@ubuntu:~$ touch test.txt

a. Type exit followed by pressing Enter to log out of Joe’s session.


b. While on the tty1 Terminal, log back in as [user A] and enter the corresponding password.
Press Enter.

Note: If you are unable to use tty1 terminal, return to graphical user interface (GUI) of the host by using
CTRL+ALT+F7 and open a terminal window in the GUI Ubuntu OS. At the prompt, enter su –l [user A] at the
prompt and enter the password.
Example: User A is jenny

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 22 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

cisco@ubuntu:~$ su –l jenny

Step 9: Change to the /home directory.


jenny@ubuntu:~$ cd /home

Step 10: List all directories with their respective permissions.


jenny@ubuntu:/home$ ls -l
[Screenshot]

Step 11: Change to the /home/joe directory and list the content of the directory.
jenny@ubuntu:/home$ cd joe
jenny@ubuntu:/home/joe$ ls -l
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 23 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Notice that we are able to enter Joe’s folder and read the files within the directory. We are able to see the
test.txt file.

Step 12: Attempt to create a file.


jenny@ubuntu:/home/joe$ touch jenny.txt
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 24 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

- What happens? Why?


Can’t open because we do not have permission to create the file_____________________________
_______________________________________________________________________________

Step 13: Close all remaining windows.

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 25 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Lab 2.3 - Detecting Threats and Vulnerabilities


Objectives
Use Nmap, a port scanner and network mapping tool to detect threats and vulnerabilities on a system.

Background / Scenario
Network Mapper, or Nmap, is an open-source utility used for network discovery and security auditing.
Administrators also use Nmap for monitoring hosts or managing service upgrade schedules. Nmap
determines what hosts are available on a network, what services are running, what operating systems are
running, and what packet filters or firewalls are running.

Required Resources
 PC with Ubuntu 16.0.4 LTS installed in a virtual machine - you can use the VM from labs completed in lab
2.1

Step 14: Open a terminal window in Ubuntu.


a. Log in to Ubuntu using the following credentials:
User: cisco
Password: password

b. Click on the terminal icon to open a terminal.

Step 15: Run Nmap.


At the command prompt, enter the following command to run a basic scan against this Ubuntu system:

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 26 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

cisco@ubuntu:~$ nmap localhost


[Screenshot]

The results are a scan of the first 1024 TCP ports.


What TCP ports are open?
Port 22 and 631 are open
____________________________________________________________________________________

Step 16: Use administrative privileges with Nmap.


a. Type the following command in the terminal to scan the computer’s UDP ports (remember, Ubuntu is
case sensitive) and enter the password password when prompted:
cisco@ubuntu:~$ sudo nmap –sU localhost
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 27 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

What UDP ports are open?


Port 631 and 5353 are open
____________________________________________________________________________________
b. Type the following command in the terminal:
cisco@ubuntu:~$ nmap –sV localhost
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 28 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

Using the –sV switch with the nmap command performs a version detection which you can use to
research vulnerabilities.

Step 17: Capture SSH keys.


Type the following command in the terminal to initiate a script scan:
cisco@ubuntu:~$ nmap –A localhost
[Screenshot]

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 29 of 30
Lab – Authentication, Authorization, and Accounting and Detecting Threats and Vulnerabilities

You captured the SSH keys for the host system. The command runs a set of scripts built into Nmap to test
specific vulnerabilities.

References
Nmap: https://nmap.org/

Lab 2.4 – Setup Bastion host for software firewall


Objectives
Setup pfSense and some other trusted os for software firewall

© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 30 of 30

You might also like