GNU/Linux - Securing access

Note: this was converted from PDF to Markdown using pdftotext and manual formatting. The original PDF can be found here along with the bibliography. GNU/Linux - Securing access Laboratory Protocol GNU/Linux - Securing access Figure: Grouplogo Subject: ITSI|ZIVK Class: 3AHITN Name: Stefan Fürst, Marcel Raichle Group Name/Number: Dumm und Dümmer/7 Supervisor: ZIVK Exercise dates: 22.11.2024, 26.11.2024, 29.11.2024 Submission date: 1.12.2024 Table of Contents Task Definition Summary Exercise Execution Privileged rights Explanation of the sudo command Granting and restricting users’ sudo access Password policies Setting up a password policy sed Basics Harden SSH Changing the ssh port Adding OTP authentication Logging in as the users References List of Figures Attachments Task Definition This exercise focuses on enhancing security and user management in GNU/Linux. Participants configure SSH authentication using public keys, manage user privileges with sudo (e.g., granting specific permissions to edit files or create users), and set up password policies requiring strong, unique passwords. Additional tasks include changing the SSH port to secure the system, identifying open ports, and implementing two-factor authentication with Google Authenticator. Each step is documented and tested to ensure proper configuration and security. ...

December 1, 2024 · 10 min · veya