Security Flashcards
/var/run/utmp
File that allows setting that would deny or allow permission to useful commands for regular users such as “who and w”.
/etc/nologin
If file exists then no user other than root can log in.
xinetd
Super security daemon
/etc/xinetd.d/*
Every server that runs via xinetd is configured in a file located here.
/etc/hosts.allow
All hosts defined are allowed access to the system. All other hosts are denied
Configuration file for xinetd
/etc/xinetd.conf
/etc/hosts.deny
All hosts defined are denied all others are allowed
/etc/inetd.d/*
Location of individual server config files for inetd
ssh-add
Adds your RSA key that is managed by ssh-agent
Location of DSA key
~/.ssh/id_dsa
~/.ssh/authorized_keys
Contents of a .pub key on a remote server that wants to connect to origin server here
User’s location for GPG keys
~/.gnupg/*
ssh-keygen
Generate new OpenSSH keys
Location of RSA key
~/.ssh/id_rsa
Public side of your DSA key
id_dsa.pub
Location of the host key created when using ssh-keygen
/etc/ssh/ssh_host_dsa_key
Where info is on machines the system administrator trusts users to connect to
/etc/ssh_known_hosts
ssh-agent
Adds configured keys to the password ring for use in the current session
Config file for SSH
/etc/ssh/ssh_config
gpg
Allows you to digitally sign messages as encrypted
gpg –gen-key
Generate a GPG key
gpg –export keyname > gpg.pub
Users with gpg.pub can decrypt your message and view it
gpg –import keyname.pub
Import someone’s pub file to your key ring so you can read their encrypted messages
gpg –list-keys
List the GPG keys in your key ring
gpg –edit-key
Brings up an interactive menu to manage keys
First two characters of an MD5 hashed password (salt)
$1