Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 5 additions & 1 deletion docs/labs/security/lab3-auditing_the_system.md
Original file line number Diff line number Diff line change
Expand Up @@ -532,7 +532,11 @@ Running Tripwire in this mode (integrity check mode) compares the current file s

Tripwire’s report files, are a collection of rule violations discovered during an integrity check.

There are several methods of viewing the Tripwire report file. You could have been viewing it while the integrity check was running, you could view it in the form of an e-mail automatically sent to you, or you could view it using the “twprint” command provided with the Tripwire package.
There are several ways to view a Tripwire report file:

- during integrity check
- in the form of an email automatically sent to you
- using the `twprint` command provided with the Tripwire package

!!! note

Expand Down
8 changes: 4 additions & 4 deletions docs/labs/security/lab9-cryptography.md
Original file line number Diff line number Diff line change
Expand Up @@ -702,7 +702,7 @@ Most Linux systems out of the box already have the OpenSSH server configured and

### Creating host keys

Your SSH server already has host keys that it uses. Those keys were generated when your system was first installed. In this exercise you will learn how to create host-type keys for your server, but you wont use the keys.
Your SSH server already has host keys that it uses. Those keys were generated when your system was first installed. In this exercise, you will learn how to create host-type keys for your server, but you wont use the keys.

#### To generate host keys for your server

Expand All @@ -727,7 +727,7 @@ Your SSH server already has host keys that it uses. Those keys were generated wh

!!! Question

What do you need to do to make the sshd daemon use the host key that you just generated?
What must you do to make the sshd daemon use the host key that you just generated?

3. View the fingerprint of the key you created above. Type:

Expand Down Expand Up @@ -838,7 +838,7 @@ usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface]

!!! Question "Questions"

Was the user ying able to remotely reboot serverPR? Why can't ying remotely reboot serverPR?
Was user ying able to reboot serverPR remotely? Why can't ying remotely reboot serverPR?

7. From serverXY, try remotely viewing the status of the `sshd` service running on serverPR as the user `ying`. Type:

Expand Down Expand Up @@ -928,7 +928,7 @@ usage: scp [-346BCpqrTv] [-c cipher] [-F ssh_config] [-i identity_file]

!!! Question "Questions"

What is the slight but very important difference between the variations of the 2 previous commands? And what is the result of each command?
What is the slight but significant difference between the variations of the 2 previous commands? And what is the result of each command?

- `scp -r ying@localhost:/home/ying/ ying_home_directory_on_serverPR`

Expand Down