<em id="rw4ev"></em>

      <tr id="rw4ev"></tr>

      <nav id="rw4ev"></nav>
      <strike id="rw4ev"><pre id="rw4ev"></pre></strike>
      合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

      代寫Computer Security and Networks編程

      時間:2024-02-08  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



      Computer Security and Networks: Exercise 1
      Deadline: 1 February 2024, 4pm
      1 Getting the VM working
      You first need to download the VM image and install it, as per canvas page.
      There are many user accounts on the VM; you begin the module with access to just
      one:
      Username: employee427, password: employee427
      You must use your own copy of the VM for this (and every other) exercise.
      You must not share your VM with other students.
      In the home directory you will find a token split into two files theFirstTokenPart1
      and theFirstTokenPart2. The token is the concatention of these two files. Submit this
      token on the website:
      https://www.cs.bham.ac.uk/internal/courses/comp-sec/token
      This token system is not yet operational. A canvas annoucement will be made when
      this system has been set up.
      [1 mark]
      2 Access Control
      For this exercise you need to explore the other home directories on the VM and find out
      more about what is going on at the company, in particular you need to find two tokens, get
      the shadow file and then crack some passwords to find two more tokens. The VM contains
      a number of access control vulnerabilities and you need to find and exploit these to access
      files that are protected.
      1. Look in the directories /home/carolmiller , /home/charlegarcia /home/jakkinkade
      and /home/nikadler, somewhere in there are two files that contain tokens; these files
      are protected by the access control system. Search the home directories for these files
      and find access control flaws that allow you to read the files. Submit the two tokens
      you find to the token submission website.
      1
      [3 marks each]
      2. By exploiting mistakes in the access control settings of the VM, find a way to read
      the /etc/shadow password hash file.
      Once you have the shadow file, install a password cracker and try to crack the passwords for the staff accounts aarushsanders and alayahpritchard. You may use
      any password cracker you like – “John the Ripper” is probably easiest. (N.B. you
      will need the “jumbo” version of john the ripper if you want to crack SHA hashes).
      This program is already installed on the VM. The canvas page for the assignments
      also contains a link to a suitable wordlist.
      The staff accounts aarushsanders and alayahpritchard each contain a token.
      Cracking the passwords to these accounts will allow you to log in as these users
      and read the tokens. Find these tokens and submit them to the token submission
      如有需要,請加QQ:99515681 或WX:codehelp

      掃一掃在手機打開當前頁
    1. 上一篇:CS 61程序代做、代寫C/C++編程設計
    2. 下一篇:代寫CM3035 Advanced Web Development
    3. 無相關信息
      合肥生活資訊

      合肥圖文信息
      出評 開團工具
      出評 開團工具
      挖掘機濾芯提升發動機性能
      挖掘機濾芯提升發動機性能
      戴納斯帝壁掛爐全國售后服務電話24小時官網400(全國服務熱線)
      戴納斯帝壁掛爐全國售后服務電話24小時官網
      菲斯曼壁掛爐全國統一400售后維修服務電話24小時服務熱線
      菲斯曼壁掛爐全國統一400售后維修服務電話2
      美的熱水器售后服務技術咨詢電話全國24小時客服熱線
      美的熱水器售后服務技術咨詢電話全國24小時
      海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
      海信羅馬假日洗衣機亮相AWE 復古美學與現代
      合肥機場巴士4號線
      合肥機場巴士4號線
      合肥機場巴士3號線
      合肥機場巴士3號線
    4. 上海廠房出租 短信驗證碼 酒店vi設計

      成人久久18免费网站入口