Born2beroot
? How a virtual machine works?
A VM is?a virtualized instance of a computer that can perform almost all of the same functions as a computer, including running applications and operating systems . Virtual machines run on a physical machine and access computing resources from software called a hypervisor.
? The basic differences between Rocky and Debian, and the choice of operating system?
Rocky
Debian
? The purpose of virtual machines?
The main purpose of VMs is to operate multiple operating systems at the same time, from the same piece of hardware. Without virtualization, operating multiple systems — like Windows and Linux — would require two separate physical units.
? The difference between aptitude and apt?
Apt and Aptitude are both package managers but aptitude is more upgraded than apt, Aptitude is like a graphical interface of apt, also apt is a low level package manager that is good for digging deeper in this field.
? What APPArmor is?
AppArmor provides?Mandatory Access Control (MAC) security. For example, if an installed application can take photos by accessing the camera application, but the administrator denies this privilege, the application will not be able to access the camera application. If a vulnerability occurs (some of the restricted tasks are performed), AppArmor blocks the application so that the damage does not spread to the rest of the system.
? Check that the UFW service is started?
UFW?is a software application responsible for ensuring that the system administrator can?manage iptables in a simple way . UFW provides us with an interface to modify the firewall of our device ****without compromising security. Once we have UFW installed, we can choose which ports we want to allow connections. Check UFW status via?sudo ufw status.
? Check that the SSH service is started?
SSH, also known as Secure Shell , is?a network protocol that gives users a secure way to access a computer over an unsecured network. Check SSH status via?sudo service ssh status.
? Check that the chosen operating system is Debian?
uname -a.
? Check that a user with the login of the student is present on the virtual machine: users
领英推荐
? Check that the user has been added and that it belongs to the
"sudo" and "user42" groups.getent group user42 getent group sudo
User
1-Create new user via?sudo adduser <username>
2-Create a group named "evaluating”:sudo addgroup evaluating
3-Assign it to this user:sudo adduser <username> evaluating or usermod -aG group <username>.
4-Check that this user belongs to the "evaluating" group: getent group evaluating.
5-How I was able to set up the strong password rules requested in the subject on my virtual machine? sudo vim /etc/login.defs and I changed PASS_MAX_DAYS, PASS_MIN_DAYS, PASS_WARN_AGE
6-Advantages and disadvantages of using strong password policy :
Hostname and partitions
SUDO
UFW / Firewalld
SSH
Web Developer
2 年you might want to see this -> https://github.com/amaitou/Born2beRoot/blob/master/README.md
SEARCH ENGINE AGENT! @bowsdream
2 年#IMAD??♀?#MI?OUNI Thanks #great #connecting ??BOW??
Security Researcher @ WePwn | Penetration Tester
2 年Great job Imad Mimouni ??