CS代考 # Lab: Working with the Command Line

# Lab: Working with the Command Line

## Part 1, The Basics

Copyright By PowCoder代写 加微信 powcoder

Because this is largely a hands-on course, it is essential that you learn many of the fundamental Linux commands, an important skill for any good security practitioner.

If you are using macOS, you can also use the Terminal app. If you are using Windows 10, you can use the Linux subsystem. See instructions at https://docs.microsoft.com/en-us/windows/wsl/install-win10. You are encouraged to use the virtual machine for this lab (https://comp116.org/kalivm.html).

Please learn and tinker with the commands below and answer the questions below. Many commands will require flags.

Commands: `ls, rm, mkdir, rmdir, cd, wget, pwd, ln, sudo, chmod, umask, ping, cut, sort, which, grep, whereis, finger, w, who, whoami, last, file, strings, top, ps, nice, nohup, kill, signal, more, less, ifconfig, arp, nslookup, cat, uname, history, netstat, curl, ifconfig, traceroute, shred, dig, man, lsof, whois, crontab, nc, uniq, id, groups, df, du, dd, openssl, tar, clear, touch`

In addition, please read “The command-line, for cybersec” by : https://blog.erratasec.com/2017/01/the-command-line-for-cybersec.html

### Answer the questions below. Answers may vary depending on operating system used.

1. How would you find the path to the python command?

2. How would you download a file from the Internet?

3. What command can you use to find out your IP address and MAC address?

4. What command can you use to show all the processes that are running on the system?

5. What command can you use to get more details about running processes listening on ports?

6. What command with flag could you use to list every file, including hidden files, on the entire system, showing their owner, location, and access time? Please also note the flags that you used with command.

7. Assume you found a file named `warrent.pdf`. What command could you use to find out what type of file this was?

8. So you discovered that `warrent.pdf` is a binary executable. What command could you use to extract any readable information from the file without running it? Also, try this on a compressed file such a ZIP or JAR

9. What command can you use to find the IP address-to-MAC address mappings for systems on the local network?

10. Consider the following IP address: 5[dot]188[dot]86[dot]172. Where is the computer with that IP address located –in what country?

11. For the previous question, what command did you use to determine the location of the computer?

12. What command can you use to securely delete a file?

13. What command can you use to see if you are a computer administrator or superuser?

14. What command can you use to see list of previous commands you have entered on command line?

15. What command can you use to see list of scheduled tasks running on your computer?

## Part 2, Wargames

Let’s further hone your basic security skills by playing wargames. This set of wargames is offered by OverTheWire (http://overthewire.org/wargames/).

Play the Bandit wargame at http://overthewire.org/wargames/bandit/, beginning with level 0. Play as many levels as you can. To get credit, show proof that you have played the Bandit wargames by submitting a screenshot of your terminal screen that shows the highest level you have completed (e.g., via Canvas).

_This part is dedicated to Dougal, Class of 2018_

## Submitting This Lab

For students officially enrolled in the course, submit lab on Canvas.

程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com