ess / file that is creating the DDOS-type of attack. Note: do not hard-code anything within your program. Deliverables: Please create a 1-page writeup on what you found as it relates to the system. Please attach any cron entries along with the scripts used to actually solve the puzzle.
Q: This is for operating systems in cmputer science. I got stuck on few questions. Let me know if you…
A:
Q: Starting from the Linux default permissions for file and directories, what umask wouldyou use to…
A: Note: - As per the guidelines we can only answer a maximum of three subparts. Please resubmit the…
Q: When the shell launches a new process to execute a command, how does it assess whether or not a file…
A: INTRODUCTION: The access permissions associated with a file aid in determining whether or not the…
Q: Write a script which will find all of the processes running on your domain computers,…
A: ANSWER:- FOR SOLUTION SEE STEP NO 2
Q: 1.Suppose you want to execute a shell script? Which of the permissions is NOT necessary for it to…
A: A file comes with permission too provide security. It could be read, write and execute . A process…
Q: When an operating system requires a lot of input/output from a user, what type/kind of scheduler…
A: I have provided solution in step2
Q: Using the "at" @ command, schedule the commands below to run at 11:30pm, three days from when you…
A: at command in linux is used to schedule a job to execute on perticular time.at command to run a…
Q: Explain what each of the following commands are attempting to accomplish. Assume that you have…
A: Since you have asked multiple questions, according to the company's policy we will solve the first…
Q: 11. What is one troubleshooting method of using the suspend option while stepping through a script?
A: Answer 11 At the point when the code has been suspended, it should be executed physically from the…
Q: user whose ID is beilish is working in a typical Linux system. She issues the command "pwd" and the…
A: Dear Student, You can use the command 1) cd ../../beta/test This command will take you two…
Q: Clients are reporting slowness when attempting to access a series of load-balanced APIs that do not…
A: To use OAuth 2.0 to protect an API so that an application can access it on behalf of a user The flow…
Q: How does the shell determine whether a file is executable before spawning a new process to carry out…
A: 1. The executable files are marked in a special way for the system to recognize them. However, a…
Q: A company has implemented a discretionary access control system for important documents and programs…
A: Discretionary Access Control (DAC) Discretionary Access Control (DAC) is a sort of access control…
Q: To analyse daemon processes, you must use the –e option in conjunction with the ps command. This is…
A: INTRODUCTION: Why is it referred to as a daemon? A daemon is an older form of the term "devil,"…
Q: Write code that when executed in PowerShell, will satisfy the following requirements: • List all of…
A: PowerShell commands List all of the processes on a remote computer. use invoke command with script…
Q: ensure a functioning backup for production data and server configuration files is running…
A: After installing Windows Server Backup, you can open it by clicking the Start menu, selecting Server…
Q: On your Ubuntu Server Linux virtual machine, perform the same steps that you performed in Project…
A: Hey there, I am writing the required solution of the questin mentioned above. Please do find the…
Q: a. Unix Named pipe: i. ii. iii. Can be used over the network. Can be full duplex. All of the above.…
A:
Q: 1. Write the command(s) needed to list all processes running on your system, showing a full set of…
A: Ans 1 The ps command can be used to display a list of currently running processes (ps means process…
Q: Question 3 25 Marks Compose the required Linux commands for implementing the following file…
A: Answer Linux: It is a command based multi-user operating system which can be accessed by many users…
Q: A company has implemented a discretionary access control system for important documents and programs…
A: Discretionary Access Control (DAC) Discretionary Access Control (DAC) is a sort of access control…
Q: Write a single Linux pipeline command to display the last 20 filenames in your home directory
A: Linux: Linux is a operating system or kernel. Linux is introduced by Linus Torvalds. It is based on…
Q: (a) Discuss file systems used on Unix or Linux systems. There may be many different Unix vendors…
A: File system: A file system is a data structure where the files are stored and retrieved easily. It…
Q: Can you issue cd command without argument? What is its effect? Group of answer choices No, Shell…
A: The commands in Linux are basically used to carry out operations associated with data. Linux itself…
Q: Under Linux, ps and top are two prominent process management commands. Top just displays…
A: Linux is one of the operating system that works on the linux commands. Every command has different…
Q: Your organization has installed a new application that fetches project details from a database…
A: As stated in the scenario, An Application is installed that fetches the project details. The details…
Q: You wish to configure the runlevels that a particular upstart daemon is started in. Whatshould you…
A: /etc/init is the directory that contains configuration files used by upstart to start, stop, reload,…
Q: Write a Linux shell script to perform the following tasks: a. Display current date and time b.…
A: (a) How to Format Display Date or Application in the Shell Script:- You need to use a standard date…
Q: what would the new umask value be? Files: rw-rw---- Directories: rwxrwx--x
A: UMASK in Linux or Unix systems is known as User Mask or it is also called as User file creation…
Q: Winona has set up AppLocker rules to protect computers on the company network from being infected by…
A: Lets discuss the solution in the next steps
Q: To analyse daemon processes, you must use the -e option in conjunction with the ps command. This is…
A: Answer the above questions are as follows:
Q: You have a Linux system that has a 1000GB hard disk drive, which has a 90GB partition containing an…
A: The Linux system has a hard disk of 1000GB in which 90 GB partition containing an ext4 filesystem…
Q: _________is an important component of OS without which OS can't work. a. Despatcher b. Shell c.…
A: A kernel is the center of any PC system which has full power over the system's exhibition. This…
Q: using Linux/Unix, please Suppose that you want to block everyone (except you) at the main door…
A: Actually, given information: Suppose that you want to block everyone (except you) at the main door…
Q: Please write down the Linux command for each question. 17.1 What command should be used to change…
A: 17.1 What command should be used to change the read, write and execute permission of a file?…
Q: Use the Internet to research the installation and configuration process for the tripwire IDS on your…
A: For installing tripwire IDS run the following command: sudo apt install tripwire While installation…
Q: Write a shell script named “myscript.sh” to accomplish the following tasks • List all group IDs on…
A: Lets see the solution.
Q: Q1 Answer the questions in detail 1.1)What MS-DoS command is used to remove or delete a directory?…
A: deltree command or rmdir command are used to delete or remove a directory.
Q: Which tool lets you view running tasks and current memory use? How does Msconfig differ from…
A: NOTE :- As per our company guidelines we are supposed to answer only first 3sub-parts. Kindly…
Q: n process management are ps and top. With top you can only see processes, but with ps you can…
A: Step 1: Two popular commands used in process management are ps and top. With top you can only see…
Q: Use the $ps aux command one of your own running process pid, and use $kill -9 pid to kill the…
A: The ps aux command is used to monitor the processes running on the system. The command "kill -9 pid"…
Q: You have a Linux system that has a 1000GB SSD, which has a 90GB partition containing an ext4…
A: The Linux system has a harddisk of 1000GB in which 90 GB partition containing an ext4 filesystem and…
Q: Must be done in Ubuntu linux commands: 1) Demonstrate how to start a job in the background and then…
A: “Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: Check out the Unix/Linux commands ps and kill and their various options. a) Use the ps command to…
A: Answer: Our instruction is answer the first three part from the first part and I have given answer…
Q: Sam is a Windows system administrator responsible for setting up client workstations for different…
A: The answer has given below:
Q: Situation due to the current power outages in Ghana; It have result 32 windows server shutdown.…
A: Hey there, I am writing the required solution based on the above given question. Please do find the…
Q: Nearly all of the concepts presented in this chapter apply to all Linux distributions.However,…
A: Most generally, in the home directory, secret files and directories contain settings or data…
Q: The parent process creates: i) a first child that reads lines from the stdin and writes them to a…
A: The solution for the above given question is given below:
You will need write a shell program that creates a ‘slow drip’ which will mimic a process that has not closed properly which his slowly filling up a directory of useless information rendering the system without resources to combat the attack.
Please create a process that finds the offending process / file that is creating the DDOS-type of attack.
Note: do not hard-code anything within your program.
Deliverables:
Please create a 1-page writeup on what you found as it relates to the system. Please attach any cron entries along with the scripts used to actually solve the puzzle.
Step by step
Solved in 2 steps with 1 images
- Last Stage of Delirium, a security study organisation, created some clean portbinding shellcode for Linux. Shellcode that is clean is shellcode without any NULL symbols. As was already stated, NULL characters prevent the majority of buffer overflow vulnerabilities from being exploited properly because the function stops copying when a NULL byte is encountered. EA company has implemented a discretionary access control system for important documents and programs on a shared Linux server. Figure 1 shows the current implementation of the DAC system. It only applies to the directory /opt/company (you can ignore all files/directories that are not within this directory). The list of users is shown in the output from the firstls command; the members of each group is shown in the output of the tail command; the permissions are shown in the output of the second ls command. Assume the files are the objects, the subjects are the five users and there are four access rights: own, read, write and execute. Refer to Figure 4.2 and Table 2 in the textbook and complete the following subquestions I. Draw the Access Control Lists that illustrate the implementation on the Linux server; II. Draw the Capability Lists that illustrate the implementation on the Linux server; III. Build the Authorization Table that illustrate the implementation on the Linux server.1. Write the command(s) needed to list all processes running on your system, showing a full set of columns and pipe that output to the less command so that you can page through the list of processes. 2. Write the command(s) needed to list all processes running on your system, sorted according to memory utilization. 3. Assume that the process gedit is running. Explain the steps and commands needed to kill this process. 4. Write the command(s) needed to start Firefox with a nice value of 5. 5. Write the command(s) needed to change the niceness of Firefox to 7. 6. Write the command(s) needed to start the service sshd.
- Write a script that: Deletes all previously created directories from C:\bkp\Firefox\ Writes the amount of memory used by Firefox to a file C:\bkp\Firefox\%DATE% %TIME%\firefox.txt (%DATE% and %TIME% are current date and time) (if Firefox is running) Kills Firefox process (if it is running) Archives content of the Firefox profile directory to C:\bkp\Firefox\%DATE% %TIME%\firefox.zip Deletes the original Firefox profiles directory Shuts down the computerStarting from the Linux default permissions for file and directories, what umask wouldyou use to ensure that for all new_______________?a. directories, the owner would have read, write, and execute; members of the groupwould have read and execute; and others would have readb. files, the owner would have read and execute; the group would have read, write,and execute; and others would have executec. files, the owner would have write; the group would have read, write, and execute;and others would have read and writed. directories, the owner would have read, write, and execute; the group would haveread, write, and execute; and others would have read, write, and executee. directories, the owner would have execute; the group would have read, write, andexecute; and others would have no permissionsf. files, the owner would have read and write; the group would have no permissions;and others would have writeg. directories, the owner would have read, write, and execute; the group would haveread;…Write a shell script named “myscript.sh” to accomplish the following tasks • List all group IDs on Linux. • To monitor process and system load average on Linux.
- Given the following ls -l output: drw-r-xr-x. 2 root accounting_grp 4096 Jan 28 19:0 accounting/ What is the access permission for the ‘accounting’ folder (directory)? Write the command to change the access permission of the accounting folder (directory), so that the owner can read and execute, and the group and everybody else (world) can only read the file.This question relates to auditing command(s) that are ran on the MS2 VM.Use the auditing commands you have learned in class thus far to explore the MS2 VM.You should be currently logged into MS2 via SSH from the previous question to be able to answer this question. The process that is running on port 5900 is ONLY writing to which directory and/or file?Clients are reporting slowness when attempting to access a series of load-balanced APIs that do not require authentication. The servers that host the APIs are showing heavy CPU utilization. No alerts are found on the WAFs sitting in front of the APIs. Which of the following should a security engineer recommend to BEST remedy the performance issues in a timely manner? Options: A Implement rate limiting on the API. B Implement geoblocking on the WAF. C Implement OAuth 2.0 on the API. D Implement input validation on the API. if you could explain why you chose that correct choice, Id appreciate it. Thank you!
- Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file. Which of the following prevented the AppLocker rules from being evaluated? a. A Path rule does not allow software to run from C:\Program Files\. b. The Windows Installer rules are not configured. c. The Executable rules are enforced and not audited. d. The Application Identity service is configured for Manual startup.Classify each of the following vulnerabilities using the PA model. Assume that the classification isfor the implementation level. Remember to justify your answers.(a) The presence of the “wiz” command in the sendmail program (see Section 24.2.9).(b) The failure to handle the IFS shell variable by loadmodule (see Section 24.2.9).(c) The failure to select an Administrator password that was difficult to guess (see Section 24.2.10).(d) The failure of the Burroughs system to detect offline changes to files (see Section 24.2.7) PA : Improper protection domain initialization and enforcement Improper choice of initial protection domain (domain) Improper isolation of implementation detail (exposed representations) Improper change (consistency of data over time) Improper naming (naming) Improper deallocation or deletion (residuals) Improper validation (validation of operands, queue management dependencies) Improper synchronization Improper indivisibility (interrupted atomic…Write any bash script that will automate some routine operating system tasks related to processmanagement, users and groups management, memory management, etc.