You are on page 1of 3

Name:_______________________ COMP-2103

Objectives Get to know linux security Basic network connectivity (linux+windows) Common tools to defend systems Firewall basic understanding Requirements Two virtual machines in lab manager !indows "# and $inux %ou must be able to &ing from one virtual machine to at least one other 'emember to use (i&tables )hel&* if you need to find i&tables commands +,- should be in each screenshot Lab

1.

Flush the rules and delete any existing rules a. b. Clear the iptables rule (screenshot) Turn off the windows firewall

2.

Show that you can ping/reply from both virtual machines. a. b. This means you can ping from the linux vm to the windows vm and vice versa (Screenshot)

3.

Create firewall rules specifically to allow PING on both computers a. On the windows vm just make sure icmp is allowed (screenshot), DROPPING everything else (firewall is now on) On the linux system create an actual firewall rule allowing icmp (ping requests) The linux firewall rule should be specific to the source of the windows ip address (as source) (screenshot) (on the INPUT there should be a drop after ping)

b. c.

4.

Create a windows firewall rule allowing windows file sharing(port 445 tcp). a. Make the rule specific, allow only the linux vms ip address as the source.

(screenshot with ip address of source)

5.

Create a linux firewall rule allowing http traffic and ssh traffic a. Create an inbound rule allowing http and ssh traffic i. The http rule should only allow the address 192.168.1.1 b. c. Create another rule below the 3 rules already created This rule will drop everything else (Screenshot)

6.

Create a rule allowing DNS (udp protocol) into the linux system. (screenshot)

7.

Create an ESTABLISHED rule for a port/protocol of your choosing (screenshot)

Lab Review Questions .) ,n your own words/ describe what you learned by com&leting this lab0 ,f you learned nothing state that0

1) 2ention two big differences between the linux firewall and the !indows "# firewall3

4) !hat are some of the most common windows &orts that are attacked5ex&loited3

6) 7x&lain what a remote ex&loit is and mention three ways to sto& an attack from being successfull

Evaluation (.8 2arks) Com&letion of #ro9ects -iscussion :uestions

8M 2M

References: https://help ubuntu com/communit!/"ptables#ow$o

You might also like