Solutions to some of the lab assignments from Security of Computer Systems Class, MIM UW 2018-19.
Tasks' descriptions (in polish)
Solution consists of python script located in lab1 directory + an attachment
that can be pasted to /etc/rsyslog.conf which consists of following rules:
# BSK LAB 1 (task #2)
# 1
*.=debug /var/log/debug.log
*.=debug ~
# 2
*.*;auth.none;authpriv.none;cron.none;lpr.none /var/log/syslog
# 3
:msg,contains,"solutions" /var/log/students.log
# 4
kern.emerg;daemon.emerg *
lpr.warn;mail.warn;daemon.warn |/dev/xconsole
# END BSK LAB 1
TODO
Tasks' description (in polish)
Solution consists of:
palindomeexecutable that can be compiled fromsrc/palindrome.cusingMakefilepam.d/palindrome,security/limits.conf, andsecurity/time.confconfiguration changespalindrome.dconfiguration folder which contains config for palindrome pam rules
Solution is deployable to a virtual machine and requires a user with root access.
Deployment process is split to 3 steps:
./deploy-helper.shis used to copy files to a vm, compile the program and set up pam configuration necessary for the program to be executed (tasks 1 & 2)./user-helper.shis a script that is copied to vm and has to be executed as root in order to perform user-related configuration tasks (tasks 3-6)- Some of the configuration has to be done manually,
user-helper.shwill print the list of these tasks after its successful execution
Supplied deployment configuration is just an example and has to be configured for your own domain in order to work correctly - all configuration is made through variables defined at the top of both bash scripts.
TODO
TODO