¡Esta es una revisión vieja del documento!
Topic 212: System Security
Recomendaciones
De cara al examen, habría que tener claro:
- Activar el enrutamiento en un servidor Linux.
- Añadir y quitar rutas estáticas.
- Configurar el filtrado con iptables.
- Configurar NAT para iptables.
- Conocer los modos de funcionamiento FTP.
- Configurar un servidor FTP.
- Gestionar las autentificaciones SSH.
- Abrir sesiones remotas con SSH y reenvío de sesiones X11.
- Establecer túneles para aplicaciones con SSH.
- Conocer los principales organismos de seguridad.
- Conocer el IDS Snort y el software de seguridad OpenVAS.
- Conocer los modos de funcionamiento OpenVPN.
- Establecer un túnel punto a punto OpenVPN.
When the default policy for the iptables INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?
- All traffic to localhost must always be allowed.
- It doesn't matter; iptables never affects packets addressed to localhost.
- Sendmail delivers emails to localhost.
- Some applications use the localhost interface to communicate with other applications. (Solución)
syslogdreceives messages on localhost.
El interfaz loopback es un interfaz virtual de red que hace una autoreferencia para que determinadas aplicaciones puedan comunicarse por red a nivel local.
To be able to access the server with the IP address 10.12.34.56 using HTTPS, a rule for iptables has to be written. Given that the client host's IP address is 192.168.43.12, which of the following commands is correct?
iptables -A FORWARD -p tcp -s 0/0 -d 10.12.34.56 –dport 80 -j ACCEPTiptables -A FORWARD -p tcp -s 192.168.43.12 d 10.12.34.56:443 -j ACCEPTiptables -A FORWARD -p tcp -s 192.168.43.12 -d 10.12.34.56 –dport 443 -j ACCEPT(Solución)iptables -A INPUT -p tcp -s 192.168.43.12 - d 10.12.34.56:80 -j ACCEPTiptables -A FORWARD -p tcp -s 0/0 -d 10.12.34.56 –dport 443 -j ACCEPT
La regla INPUT se debería descartar porque hace referencia a paquetes que entran en el firewall y no entre dos máquinas de dos redes dentro de nuestra red interna.
What security precautions must be taken when creating a directory into which files can be uploaded anonymously using FTP?
- The directory must not have the execute permission set.
- The directory must not have the read permission set. (Solución)
- The directory must not have the read or execute permission set.
- The directory must not have the write permission set.
- The directory must not contain other directories.
Si no tiene permisos de lectura, el usuario “anónimo” no podría consultar qué más archivos hay en el directorio.
Which THREE of the following actions should be considered when a FTP chroot jail is created?
- Create
/dev/and/etc/in the chroot enviroment. (Solución) - Create
/etc/passwdin the chroot enviroment. (Solución) - Create
/var/cache/ftpin the chroot enviroment. - Create the user
ftpin the chroot enviroment. (Solución) - Create
/usr/sbin/in the chroot enviroment.
A security-conscious administrator would change which TWO of the following lines found in an SSH configuration file?
Protocol 2,1(Solución)PermitEmptyPasswords noPort 22PermitRootLogin yes(Solución)IgnoreRhosts yes
El protocolo 1 de SSH no es seguro. Tampoco es seguro permitir el acceso de root por SSH.
When connecting to an SSH server for the first time, its fingerprint is received and stored in a file, which is located at:
~/.ssh/fingerprints~/.ssh/id_dsa~/.ssh/known_hosts(Solución)~/.ssh/id_dsa.pub~/.ssh/gpg.txt
Guardamos la huella del servidor en el equipo del cliente.
What tool scans log files for unsuccessful login attempts and blocks the offending IP addresses with firewall rules?
nessusnmapncwatchlogsfail2ban(Solución)
What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests (NVTs)?
- nmap
- OpenVAS (Solución)
- Snort
- wireshark
Which directive in the OpenVPN client.conf specifies the remote server and port that the client should connect to? (Provide only the directive, without any options or parameters)
remote
What types of virtual network devices does OpenVPN use for connections? (Choose TWO corrects answers.)
ethtap(Solución)lotun(Solución)ppp
Los modos point-to-point y site-to-site utilizan los dispositivos tun. tap se utiliza en bridge.
