Lab 4 : CEG 3400 Intro to Cyber Security
Name:
Task 1: A Shell Game
Answer the following:
- What port does the provided command open?
- What is a Bind Shell and a Reverse Shell (include the links you used in your research!)
- Which type of shell does this command open?
- What/whose permissions does this shell provide?
- Give evidence of your malicious shell running a command:
evidence
Task 2: Iptables
Reminder Deliverable: Your iptables file created with iptables-save
Please name your file task2.rules
- Would this iptables firewall configuration (
task2.rules
) be considered a whitelist or blacklist? Explain. - How did you verify that this worked? Be verbose!
Task 3: Any Port in a Storm
Reminder Deliverable: Your iptables file created with iptables-save
Please name your file task3.rules
Answer the following:
- Would this iptables firewall configuration (
task3.rules
) be considered a whitelist or blacklist? Explain. - Did you lock yourself out?
- If no: How did you verify that this worked?
- If yes: triage, what did you do wrong? How would you fix it (paste a
new attempt at your
task3.rules
right here and try to fix your error)
Extra Credit
Packet.show()
-
What scapy sniff options did you use to JUST show needed packets for this task?
-
What are the contents of the packet (what command or response did you capture)?