Instructions
Fill out the worksheet as you progress through the lab and discussions. Hold your worksheets until the end to turn them in as a final submission packet.
Resources / Important Links
Downloads
The worksheet has been provided below. The document(s) can be transposed to
the desired format so long as the content is preserved. For example, the .txt
could be transposed to a .md
file.
Unit 5 Recording
Discussion Post #1
Review the page: https://attack.mitre.org/
-
What terms and concepts are new to you?
-
Why, as a system administrator and not directly in security, do you think it’s so important to understand how your systems can be attacked? Isn’t it someone else’s problem to think about that?
-
What impact to the organization is data exfiltration? Even if you’re not a data owner or data custodian, why is it so important to understand the data on your systems?
Discussion Post #2
Find a blog or article on the web that discusses the user environment in Linux. You may want to search for .bashrc or (dot) environment files in Linux.
-
What types of customizations might you setup for your environment? Why?
-
What problems can you anticipate around helping users with their dot files?
The discussion posts are done in Discord threads. Click the 'Threads' icon on the top right and search for the discussion post.
Definitions
Footprinting:
Scanning:
Enumeration:
System Hacking:
Escalation of Privilege:
Rule of least privilege:
Covering Tracks:
Planting Backdoors:
Digging Deeper
-
Read this page: https://owasp.org/www-project-top-ten/
- What is the OWASP Top Ten?
- Why is this important to know as a system administrator?
-
Read this article: https://www.cobalt.io/blog/defending-against-23-common-attack-vectors
- What is an attack vector?
- Why might it be a good idea to keep up to date with these?
Reflection Questions
- What questions do you still have about this week?
- How are you going to use what you’ve learned in your current role?