linux

now browsing by tag

 
 

The release of Fedora Core 30

Fedora Core 30

Recently, I was asked this question on Twitter:

@telecon
How many ports open on a default install?

https://twitter.com/telecon/status/1123786543527809026

That was in response to a tweet about enjoying the install, and the first day of use of Fedora Core 30.

All things being said, this should be a relatively quick/easy test. I’ll start it off by installing a fresh install of Fedora Core 30 on my virtual-system (kvm).

After the install, I took the time, to create a new user, and reboot the system, then tests will begin.

Doing an nmap post install, and post user-creation:

$] <> nmap -p- 192.168.122.224 -Pn
Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 12:45 MDT
Nmap scan report for 192.168.122.224
Host is up (0.00020s latency).
All 65535 scanned ports on 192.168.122.224 are closed (64512) or filtered (1023)

Nmap done: 1 IP address (1 host up) scanned in 14.14 seconds

Then, seen from the localhost:

[testuser@localhost-live ~]$ ss -tua
Netid           State            Recv-Q           Send-Q                       Local Address:Port                                  Peer Address:Port            
udp             UNCONN           0                0                                  0.0.0.0:bootpc                                     0.0.0.0:*               
udp             UNCONN           0                0                                  0.0.0.0:mdns                                       0.0.0.0:*               
udp             UNCONN           0                0                                127.0.0.1:323                                        0.0.0.0:*               
udp             UNCONN           0                0                                  0.0.0.0:49042                                      0.0.0.0:*               
udp             UNCONN           0                0                                     [::]:mdns                                          [::]:*               
udp             UNCONN           0                0                                    [::1]:323                                           [::]:*               
udp             UNCONN           0                0                                     [::]:37380                                         [::]:*               
tcp             LISTEN           0                128                                127.0.0.1:ipp                                        0.0.0.0:*               
tcp             LISTEN           0                128                              ]192.168.122.1:40588           
tcp             LISTEN           0                128                                   [::1]:ipp                                           [::]:*               
Fedora Core 30
Fedora Core 30

After that was completed, I logged into the system, once again, and enabled sshd.service

[testuser@localhost-live ~]$ sudo systemctl start sshd.service 

We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:

    #1) Respect the privacy of others.
    #2) Think before you type.
    #3) With great power comes great responsibility.

[sudo] password for testuser: 
[testuser@localhost-live ~]$ sudo systemctl status sshd.service
● sshd.service - OpenSSH server daemon
   Loaded: loaded (/usr/lib/systemd/system/sshd.service; disabled; vendor prese>
   Active: active (running) since Thu 2019-05-02 13:18:50 MDT; 5s ago
     Docs: man:sshd(8)
           man:sshd_config(5)
 Main PID: 2609 (sshd)
    Tasks: 1 (limit: 2352)
   Memory: 1.9M
   CGroup: /system.slice/sshd.service
           └─2609 /usr/sbin/sshd -D -oCiphers=aes256-gcm@openssh.com,chacha20-p>
[testuser@localhost-live ~]$ ss -tua
Netid           State            Recv-Q           Send-Q                       Local Address:Port                                  Peer Address:Port            
udp             UNCONN           0                0                                  0.0.0.0:bootpc                                     0.0.0.0:*               
udp             UNCONN           0                0                                  0.0.0.0:mdns                                       0.0.0.0:*               
udp             UNCONN           0                0                                127.0.0.1:323                                        0.0.0.0:*               
udp             UNCONN           0                0                                  0.0.0.0:49042                                      0.0.0.0:*               
udp             UNCONN           0                0                                     [::]:mdns                                          [::]:*               
udp             UNCONN           0                0                                    [::1]:323                                           [::]:*               
udp             UNCONN           0                0                                     [::]:37380                                         [::]:*               
tcp             LISTEN           0                128                                0.0.0.0:ssh                                        0.0.0.0:*               
tcp             LISTEN           0                5                                127.0.0.1:ipp                                        0.0.0.0:*               
tcp             LISTEN           0                128                              127.0.0.1:x11-ssh-offset                             0.0.0.0:*               
tcp             ESTAB            0                0                          192.168.122.224:ssh                                  192.168.122.1:40588           
tcp             LISTEN           0                128                                   [::]:ssh                                           [::]:*               
tcp             LISTEN           0                5                                    [::1]:ipp                                           [::]:*               
tcp             LISTEN           0                128                                  [::1]:x11-ssh-offset                                [::]:*    .

The default iptables load-out on Fedora 30:

[testuser@localhost-live ~]$ sudo iptables -nL
[sudo] password for testuser: 
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
LIBVIRT_INP  all  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           
INPUT_direct  all  --  0.0.0.0/0            0.0.0.0/0           
INPUT_ZONES_SOURCE  all  --  0.0.0.0/0            0.0.0.0/0           
INPUT_ZONES  all  --  0.0.0.0/0            0.0.0.0/0           
DROP       all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
REJECT     all  --  0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
LIBVIRT_FWX  all  --  0.0.0.0/0            0.0.0.0/0           
LIBVIRT_FWI  all  --  0.0.0.0/0            0.0.0.0/0           
LIBVIRT_FWO  all  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           
FORWARD_direct  all  --  0.0.0.0/0            0.0.0.0/0           
FORWARD_IN_ZONES_SOURCE  all  --  0.0.0.0/0            0.0.0.0/0           
FORWARD_IN_ZONES  all  --  0.0.0.0/0            0.0.0.0/0           
FORWARD_OUT_ZONES_SOURCE  all  --  0.0.0.0/0            0.0.0.0/0           
FORWARD_OUT_ZONES  all  --  0.0.0.0/0            0.0.0.0/0           
DROP       all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
REJECT     all  --  0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
LIBVIRT_OUT  all  --  0.0.0.0/0            0.0.0.0/0           
OUTPUT_direct  all  --  0.0.0.0/0            0.0.0.0/0           

Chain FORWARD_IN_ZONES (1 references)
target     prot opt source               destination         
FWDI_FedoraWorkstation  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 
FWDI_FedoraWorkstation  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 

Chain FORWARD_IN_ZONES_SOURCE (1 references)
target     prot opt source               destination         

Chain FORWARD_OUT_ZONES (1 references)
target     prot opt source               destination         
FWDO_FedoraWorkstation  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 
FWDO_FedoraWorkstation  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 

Chain FORWARD_OUT_ZONES_SOURCE (1 references)
target     prot opt source               destination         

Chain FORWARD_direct (1 references)
target     prot opt source               destination         

Chain FWDI_FedoraWorkstation (2 references)
target     prot opt source               destination         
FWDI_FedoraWorkstation_log  all  --  0.0.0.0/0            0.0.0.0/0           
FWDI_FedoraWorkstation_deny  all  --  0.0.0.0/0            0.0.0.0/0           
FWDI_FedoraWorkstation_allow  all  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           

Chain FWDI_FedoraWorkstation_allow (1 references)
target     prot opt source               destination         

Chain FWDI_FedoraWorkstation_deny (1 references)
target     prot opt source               destination         

Chain FWDI_FedoraWorkstation_log (1 references)
target     prot opt source               destination         

Chain FWDO_FedoraWorkstation (2 references)
target     prot opt source               destination         
FWDO_FedoraWorkstation_log  all  --  0.0.0.0/0            0.0.0.0/0           
FWDO_FedoraWorkstation_deny  all  --  0.0.0.0/0            0.0.0.0/0           
FWDO_FedoraWorkstation_allow  all  --  0.0.0.0/0            0.0.0.0/0           

Chain FWDO_FedoraWorkstation_allow (1 references)
target     prot opt source               destination         

Chain FWDO_FedoraWorkstation_deny (1 references)
target     prot opt source               destination         

Chain FWDO_FedoraWorkstation_log (1 references)
target     prot opt source               destination         

Chain INPUT_ZONES (1 references)
target     prot opt source               destination         
IN_FedoraWorkstation  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 
IN_FedoraWorkstation  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 

Chain INPUT_ZONES_SOURCE (1 references)
target     prot opt source               destination         

Chain INPUT_direct (1 references)
target     prot opt source               destination         

Chain IN_FedoraWorkstation (2 references)
target     prot opt source               destination         
IN_FedoraWorkstation_log  all  --  0.0.0.0/0            0.0.0.0/0           
IN_FedoraWorkstation_deny  all  --  0.0.0.0/0            0.0.0.0/0           
IN_FedoraWorkstation_allow  all  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           

Chain IN_FedoraWorkstation_allow (1 references)
target     prot opt source               destination         
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:137 ctstate NEW,UNTRACKED
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:138 ctstate NEW,UNTRACKED
ACCEPT     udp  --  0.0.0.0/0            224.0.0.251          udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpts:1025:65535 ctstate NEW,UNTRACKED
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpts:1025:65535 ctstate NEW,UNTRACKED

Chain IN_FedoraWorkstation_deny (1 references)
target     prot opt source               destination         

Chain IN_FedoraWorkstation_log (1 references)
target     prot opt source               destination         

Chain LIBVIRT_FWI (1 references)
target     prot opt source               destination         

Chain LIBVIRT_FWO (1 references)
target     prot opt source               destination         

Chain LIBVIRT_FWX (1 references)
target     prot opt source               destination         

Chain LIBVIRT_INP (1 references)
target     prot opt source               destination         

Chain LIBVIRT_OUT (1 references)
target     prot opt source               destination         

Chain OUTPUT_direct (1 references)
target     prot opt source               destination      

. . . And finally, the last NMAP scan:

$] <> nmap -p- 192.168.122.224 -Pn
Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 13:19 MDT
Nmap scan report for 192.168.122.224
Host is up (0.00020s latency).
Not shown: 64511 closed ports, 1023 filtered ports
PORT   STATE SERVICE
22/tcp open  ssh

Nmap done: 1 IP address (1 host up) scanned in 14.17 seconds

So, to conclude, the default, and @Basic install of Fedora 30, leaves no open ports.

TrueAbility: Linux Showdown 9 – Arena Challenge

Source: Linux Showdown 9: Arena Challenge | TrueAbility

So, admittedly, I did terribly awful at the Linux Showdown 8 at TrueAbility. It wasn’t an area, where my linux expertise has taken me in the past; so I simply gave up after 10 minutes of staring at my screen, with the challenge, looking so lonely up there, without me adding any text to it. This next installment of the linux showdown begins on Monday, April 27, 2015; so make sure you sign up at TrueAbility, and participate, so the world can see your linux skills. TrueAbility Linux Showdown 9 is upon us.

I’m expecting Linux Showdown 9 will be a much needed return to their roots challenge, as Showdown 8 seemed very specific, and very “DevOps-y.” I’m excited for this Showdown, and I expect to do much, much better at this Linux Showdown, than I did on the eighth installment.

From the TrueAbility Linux Showdown 9 page:

Backstory.

Begins 2015-04-27

FragmasterX needs your help.

His competitive quake3arena team, DramaForUrLlama, has just had something of a minor civil war, which has caused the former server admin to rage /quit and shutdown all access to their private quake3 server, voip communications, and the team’s website.

The problem? The Llamas have a playoff match scheduled to start in the next 30 minutes that was supposed to be running on their server. If they don’t have something online by then, they’ll have to forfeit and if they can’t get voice communications setup they’ll get trounced in the match. They need this win to stay alive in the tournament.

FragmasterX’s brother said they could use one of his servers to run everything off of, but his brother doesn’t have the time to get it all set up. He’s ok with giving you the root password, but just wants you to be careful not to interfere with any of the sites already running on the server.

Save the DramaForUrLlamas!

 

Review: Cyborg Hawk Linux 1.1

I downloaded a copy of Cyborg Hawk Linux 1.1 several weeks ago, and unfortunately didn’t get around to actually installing it, and using it until today.

My very first impressions were about how “beautiful” the desktop; but that is about where the beauty ends.

So, on to my use of it:

There are a bunch of tools on there, a bunch of tools that I’m not familiar with, and that aren’t in Kali Linux. I visit Cyborg Hawk Linux’s homepage, to read what documentation and tutorials they have on their website, and the pages they link to, are down (see here). There are several pages up in their “Documentation” section, so I peruse through there for a bit, not really finding the info I needed. I will come back later, to the tools I’m unfamiliar with, and put in the manual research time for those.

Launching tools that I’ve either used before, or actually have a pressing need to examine (I’ve got some malware samples, that I really want to take a look at), I try and launch Cuckoo, and it fails. I’m not extremely familiar with any of the other tools, but again, I will return to those, once I can read up on them, and learn how to use them.

Now headed off to tools, that I’m extremely familiar with, including metasploit. Launch the metasploit service, then attempt to update the modules, and it fails. Attempt to register the service, and it fails, and I’m therefore unable to update/use metasploit.

So far, in a couple hours of using, all this distro has going for it, is a pretty interface, and a lot of tools. As I mentioned earlier, I will dig into those tools, as soon as I have time to search, and lookup what each of them does. Overall, not very impressed with Cyborg Hawk Linux 1.1.

Testing a theory – Attempting to troubleshoot a Fedora 21 install

Nothing is more frustrating, than a researcher, programmer, tester, or any other similar position attempting to document a bug, and when attempting to re-create the situation, you are unable to replicate. Testing a theory about a bad installer in Fedora 21 today, and just my luck, I was unable to reproduce the problem I was encountering on my desktop, in my virtual environment.

I spent this last weekend, attempting to install/re-install the latest Fedora Linux release. I have already backed up all my data, and done everything I need to do, in order to prep for the re-install. I figure my situation is not super unique, but probably a little more complicated than the average users’ install.

Read the rest of this page »

Linux Showdown 8

Source: TrueAbility

I’ve always had fun competing in the Linux Showdown’s at TrueAbility. It is time for this year’s Linux Showdown, beginning on March 16, 2015! I really recommend this linux showdown if you have any interest in linux at all. First, there is the simple benefit of being able to compete, to see how your linux skills stack up, against everyone else’s (who doesn’t like some friendly competition every once in a while), and secondly, TrueAbility can and will get you a linux related job, if you are on the market.

It will challenge your linux ability, to determine where you stand among every other linux user in the world. So, if you’re up for a challenge, or up to learning more about linux, I definitely recommend that you check out the TrueAbility Linux Showdown #8, and make sure you sign up for the competition that begins on March 16, 2015!

From TrueAbility’s website:

The Challenge

Round One

Begins March 16th

For this challenge, you’re going to be using your scripting skills to implement a “sub par assembler” dubbed:  spasm

Instead of using memory, we’re going to use the filesystem to store and manipulate our data. Your task will be to create a program (in the language of your choice) called /usr/local/bin/spasm  that can handle some basic operations.

Those of you in the top 50 will be invited to the next round, the rest are.. 0xDEADBEEF. Round 2 we make things a little more advanced… so save your script!

Round Two

Begins April 1st

Welcome to the next phase of  spasm  development! You gained an invite to this round by successfully completing the last challenge, and hopefully you saved a copy of it because we’re going to add some functionality to it in this round.