Changes

Jump to: navigation, search

SRT210 Assignment1

605 bytes added, 31 May
Part 2: Multiple WebServer Setup (10 marks)
# Ensure you start your firewall setup on each VM from the default iptables-services rules. You'll lose marks if you don't have a functional firewall on lin1a1 and on lin2a1.
== Part 2: SSH brute-force attack Multiple WebServer Setup (10 marks) ==
# Create at least 5 users (2 Marks) Install NGINX on lin1a1 and Caddy on lin2, give some lin2a2. Confirm that each works locally with thier VM and from c7host. Do the testing of them simpleNGINX and Caddy in two stages.# (3 Marks) From a browser running on c7host confirm connections using IP addresses:#: * http://common names 192.168.210.11 connects to Apache (like "john"from the earlier lab) and simple or relatively-simple passwords#: * http://192.168.210.22 connects to NGINX running on lin1a1#: * http://192.168.X.33 connects to Caddy running on lin2a2. If you have # (3 Marks) From a complex root password - you might want browser running on c7host confirm connections using hostnames:#: * http://lin1.yourmysenecaid.ops connects to change that Apache (from the earlier lab)#: * http://lin1a1.yourmysenecaid.ops connects to something simpler tooNGINX running on lin1a1#: * http://lin1a2.yourmysenecaid.ops connects to Caddy running on lin2a2.# Find some software to perform (1 Mark) From a brute-force SSH login attack browser running on lin2 from lin2a2show you can connect to all 3 webservers using their IP addresses and their hostnames.# Run (1 Mark) From a browser running on Windows show you can connect to each of the attack3 webservers using the c7host IP address. Record how long it tookNOTE: when doing this test, and what you will want to turn off the results were. If it fails to find usable credentials for you - make sure you have an explanation for why that wasother two VMs.
== Part 3: Report (10 marks) ==
217
edits

Navigation menu