Particiones Ultra I 0 / 120 disck1 1 swap 160 disck1 3 /usr 806 disck2 4 /var 180 disck2 5 /opt 721 disck1 6 /export/home 15 disck2 |
Particiones Ultra 5 0 / 500 1 swap 500 3 /usr 1900 4 /var 600 5 /opt 4250 6 /export/home 250 |
Configuración para Network |
hosts defaultdomain defaultrouter resolv.conf nsswitch.conf inetd.conf |
Son 6 archivos de los cuales crear defaultdomain, defaultrouter, resolv.conf en /etc/ los demas se encuentran en el mismo directorio.Las modificaciones se muestran en negritas. |
hosts root@iztapalapa# cat /etc/hosts # # Internet host table # 127.0.0.1 localhost 192.168.27.22 iztapalapa iztapalapa.pshoes.local loghost 192.168.27.252:9100 hp2550 192.168.27.21 iztapalapa-www root@iztapalapa# |
defaultdomain root@iztapalapa# cat /etc/defaultdomain pshoes.local. root@iztapalapa# |
defaultrouter root@iztapalapa# cat /etc/defaultrouter 192.168.27.10 root@iztapalapa# |
resolv.conf root@iztapalapa# cat /etc/resolv.conf domain pshoes.local nameserver 200.33.146.193 nameserver 200.33.146.201 root@iztapalapa# |
nsswitch.conf root@iztapalapa# cat /etc/nsswitch.conf # # /etc/nsswitch.files: # # An example file that could be copied over to /etc/nsswitch.conf; it # does not use any naming service. # # "hosts:" and "services:" in this file are used only if the # /etc/netconfig file has a "-" for nametoaddr_libs of "inet" transports. passwd: files group: files hosts: files dns ipnodes: files networks: files protocols: files rpc: files ethers: files netmasks: files bootparams: files publickey: files # At present there isn't a 'files' backend for netgroup; the system wi # figure it out pretty quickly, and won't use netgroups at all. netgroup: files automount: files aliases: files services: files printers: user files auth_attr: files prof_attr: files project: files root@iztapalapa# |
inetd.conf root@iztapalapa# cat /etc/inetd.conf Comentamos talk, finger, rlogin, rsh, telnet y ftp si tenemos ssh por seguridad. |
Reiniciar el equipo para actualizar los cambios # init 6 |
Regresar |
VULNERABILITIES IN UNIX
Information provided by the Sans Institute:
http://www.sans.org
The ten most commonly exploited UNIX vulnerabilities?
Poor system administration practices
Reusable/poor passwords
Flawed SUID programs (e.g., rdist, binmail)
HTTP servers and CGI application vulnerabilities
Default "+" entries in the /etc/hosts.equiv file
NFS/NIS vulverabilities sendmail program bugs
Buffer overruns (e.g., gets(), syslog())
SUID shell scripts