Cisco Cybersecurity Essentials 2.5.2.5 Authentication, Authorization and Accounting | Linux demo

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
in this video i'll demonstrate how to do the laboratory exercise authentication authorization and accounting of the cyber security essentials course from cisco the objectives of this exercise is to add groups users and passwords on a linux system then verify the user's groups and passwords and manage permissions using symbolic characters and absolute values but before i start the demonstration subscribe to the channel not to miss more videos about exercises linux systems and networking hit the like button if this video helped you and leave a comment if you have any questions about this exercise or linux systems we'll begin by opening the terminal and we'll start by escalating privileges to the root level by entering the command sudo space s u for super user and press enter and enter the password password and now we are using the root on the system meaning that you have root privileges let's add a new group named hr by entering the command group add space hr and press enter to verify that the new group was being added with success let's write the command cat space slash etc group and press enter and we can see that we have a new group called hr with the id 1005. now let's say the new user so write the comment add user space and the username will be jenny and enter the new user was created a new group was created then the user was added to the group jenny and the system created a directory for jenny and copied some files now let's enter the password for jenny the password will be la social and enter and retype the password so l a social now we are prompt for the full name so we can just type jenny then the room number you can type a 35 word phone 555123 home phone 222 555 but you can skip this information by pressing enter then we'll be asked if this information is correct you type y for yes and enter in the user was created with this information associated to the user now we'll place the user jenny in the agr group so write a comment user mod space dash g space the name of the group h r space in the name of the user so jenny and press enter jenny was added to the group hr let's say the second user named joe so the comment is user space joe the password will be tooth and retype the password tooth the name will be joe and we'll skip this information by pressing enter and is this information correct type y for yes and enter and also add joe to the hr group so user mod space dash g space hr and username joe enter so now we have two new users in both users were added to the hr group let's verify the created users in the passw file so write a comment get space dash etc dash pass wd and enter on the bottom you can see the two new users we created jenny with this id all this information in the respective directory and then joe with this id no information because we didn't wrote any information and his directory to view new users on the shadow file write cat space dash etc dash shadow and this is the shadow file with the two new users created we're going to manage the permissions to enter a new terminal so we can use user accounts press ctrl alt f1 and now you are on a special terminal that allows you to log in with a user account we are going to use jenny's account so the login will be jenny and the password is la social and we are using the account of jenny in the system let's view the present directory so write pwd we are at home jenny let's go back a directory so cd space dot dot and now we are at home and let's list all the directories in their permissions so write ls space dash l we can see that we have three directories because we have three accounts on the end is the username the name of the directory and here we have 10 letters or dashes that are the permissions for this directory so the first field will be a d or a dash meaning a directory or a file the second two fourth field is for the user the fifth to seventh field is for the group in the eighth to the tenth field is for others now let's enter joe's folder as jenny by typing the command cd in joe so we have access to jos folder let's exit the folder cd space dash and let's open a second terminal to access as root press ctrl alt f2 and we've opened a second terminal a tty2 now we are going to login as the user root so login will be root in the password is secret password and we are using root in the system let's open the ohm directory so cd space slash ohm let's view the permissions to the directories so ls space dash l and we can see to joe's directory for the others permission is read and execute the last three characters of the permissions so we are going to change the other permissions by making it not executable so write the comment shmoth space o minus x in the directory is joe and enter let's list it again and now we can see that the permissions for job directory for others is r dash so now the permissions for joe directory the last character we can see there is a dash so others cannot execute this directory let's go back to terminal 1 ctrl alt f1 that we are using jenny let's again attempt to go into joe's folder so cd space joe and enter and we get a message saying permission denied if we list with permissions ls dash l we can see that the directory for joe the other's permission can't execute this folder so this is why we cannot access the folder because in this terminal we are not joe we are using jenny what we did to the directory was to the others remove execute but we also can do for the user or the group and we can add or remove read write or execute let's exit the terminal as jenny so type exit and we are going to login as joe so login will be joe and password is tooth we are now using the terminal one as joe let's check the path so pwd let's go back one directory so cd space dot list with the permissions ls l and now we are going to assign permissions using absolute values as you can see on the table the absolute value represents the permission for the owner the group and other in that order so if you choose 0 will be none no permissions the number 1 is only execute two is right three write and execute four read five read and execute six read and write and seven full permissions read write and execute so if you write the comment smart space 705 space in the name of the directory so joe and press enter what we did was for the user we assigned the number seven so the permissions read write and execute for the group the number zero so none no permissions and for others the number five so read and execute but no permissions to write let's list to see now others can read and execute the directory of joe but before they could not execute so they could not enter joe's folder using gel let's enter joe's directory so cd joe and let's create a file using the comment touch space test dot txt and enter let's list you can see that we have a new file called text.txt inside joe's folder let's try to access joe's folder with jenny account so let's exit first so login will be jenny and the password la social as jenny let's try again to access joe's folder so write cd slash own list directory and now in the jos directory we can see others can execute in read so let's enter jaws folder cd joe and we got in if we list the contents of the directory we can see the test file joe created if i attempt to create a new file so touch in the name jenny dot txt and enter we get the message saying permission denied because on the jaws folder we can execute in read so we enter the folder but we don't have permissions to write on the folder so we cannot create modify or delete anything inside the folder we can only execute and enter the directory and this was everything you need to do to this exercise so we learned how to add groups users and passwords and manage the permissions and now subscribe to the channel not to miss more videos about demonstrations of linux operating systems hit the like button if this video helped you and you can leave a comment if you have any questions about this exercise linux systems or networking and i will see you on the next video you
Info
Channel: 100% informática
Views: 1,347
Rating: undefined out of 5
Keywords: administrator, wifi, cisco, local area network, terminal, course, technology, business, vpn, how to, help, solve, lan, cybersecurity, operating system, hardware, configure, cybersecurity essentials, computer, class, firewall, exercise, cloud, jomirife, deploy, configuration, tutorial, demonstration, software, ccna, networks, wan, wireless, engineer, security, linux, hacker, devices, onesource, permissions, add users, add groups, passwords, Symbolic Permissions, Absolute Permissions, user access
Id: ciSIUwrc8mg
Channel Id: undefined
Length: 13min 33sec (813 seconds)
Published: Thu Feb 11 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.