/l3/users/abear/nt-bsdnet/fbsd3.unix.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 |
|
#ipfw add 1100 deny icmp from any to any
01100 deny icmp from any to any |
#ipfw list
00010 allow ip from any to any via lo0 00020 deny ip from 127.0.0.0/8 to any 00030 deny ip from any to 127.0.0.0/8 00100 allow tcp from any to me dst-port 22 via em0 00210 reset tcp from any to me setup 01000 allow icmp from me to any keep-state 01100 deny icmp from any to any 65000 allow ip from any to any 65535 deny ip from any to any |
#shutdown -r +60
Shutdown at Tue Nov 28 14:00:18 2006. shutdown: [pid 44144] |
#date
Tue Nov 28 13:00:43 UTC 2006 |
#ntpdate ntp.psn.ru
28 Nov 13:00:48 ntpdate[44163]: adjust time server 194.149.67.130 offset -0.022407 sec |
#pkill shutdown
|
#ipfw list
00010 allow ip from any to any via lo0 00020 deny ip from 127.0.0.0/8 to any 00030 deny ip from any to 127.0.0.0/8 00100 allow tcp from any to me dst-port 22 via em0 00210 reset tcp from any to me setup 01000 allow icmp from me to any keep-state 01100 deny icmp from any to any 65000 allow ip from any to any 65535 deny ip from any to any |
#ping ya.ru
PING ya.ru (213.180.204.8): 56 data bytes 64 bytes from 213.180.204.8: icmp_seq=0 ttl=55 time=146.713 ms ^C --- ya.ru ping statistics --- 1 packets transmitted, 1 packets received, 0% packet loss round-trip min/avg/max/stddev = 146.713/146.713/146.713/0.000 ms |
#ipfw -d list
00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00100 3479 218276 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 2 168 allow icmp from me to any keep-state 01100 0 0 deny icmp from any to any 65000 24368 1783164 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 1 84 (2s) STATE icmp 192.168.15.23 0 <-> 213.180.204.8 0 |
#ping 192.168.15.24
PING 192.168.15.24 (192.168.15.24): 56 data bytes 64 bytes from 192.168.15.24: icmp_seq=0 ttl=64 time=0.477 ms 64 bytes from 192.168.15.24: icmp_seq=1 ttl=64 time=0.386 ms 64 bytes from 192.168.15.24: icmp_seq=2 ttl=64 time=0.269 ms 64 bytes from 192.168.15.24: icmp_seq=3 ttl=64 time=0.652 ms ^C --- 192.168.15.24 ping statistics --- 4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.269/0.446/0.652/0.140 ms |
#ipfw -d list
00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00100 3619 226720 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 34 2856 allow icmp from me to any keep-state 01100 18 1456 deny icmp from any to any 65000 27941 1939190 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 31 2604 (5s) STATE icmp 192.168.15.23 0 <-> 192.168.15.24 0 |
#ipfw -d list
00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00100 3633 227544 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 46 3864 allow icmp from me to any keep-state 01100 21 1708 deny icmp from any to any 65000 27960 1943586 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 43 3612 (5s) STATE icmp 192.168.15.23 0 <-> 192.168.15.24 0 |
#ipfw -d list
![]() 00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00100 3650 228524 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 46 3864 allow icmp from me to any keep-state 01100 21 1708 deny icmp from any to any 65000 27980 1948082 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 43 3612 (5s) STATE icmp 192.168.15.23 0 <-> 192.168.15.24 0 |
#ipfw -d list
00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00100 3668 229556 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 48 4032 allow icmp from me to any keep-state 01100 21 1708 deny icmp from any to any 65000 27999 1952414 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 45 3780 (5s) STATE icmp 192.168.15.23 0 <-> 192.168.15.24 0 |
#ipfw -d list
00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00100 3685 230536 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 48 4032 allow icmp from me to any keep-state 01100 21 1708 deny icmp from any to any 65000 28023 1957246 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 45 3780 (5s) STATE icmp 192.168.15.23 0 <-> 192.168.15.24 0 |
#sysctl -a | grep fw.*short
net.inet.ip.fw.dyn_short_lifetime: 5 |
#sysctl net.inet.ip.fw.dyn_short_lifetime=500
net.inet.ip.fw.dyn_short_lifetime: 5 -> 500 |
#ping 192.168.15.24
PING 192.168.15.24 (192.168.15.24): 56 data bytes 64 bytes from 192.168.15.24: icmp_seq=0 ttl=64 time=0.307 ms ^C --- 192.168.15.24 ping statistics --- 1 packets transmitted, 1 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.307/0.307/0.307/0.000 ms |
#ipfw -d list
00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00100 3953 247384 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 298 25032 allow icmp from me to any keep-state 01100 21 1708 deny icmp from any to any 65000 28309 1991482 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 295 24780 (499s) STATE icmp 192.168.15.23 0 <-> 192.168.15.24 0 |
#display -1 'ipfw -d list'
4 259036 8 20218692 Loop count = 10 Tue Nov 28 13:07:32 8 259244 22 20225891 Loop count = 11 Tue Nov 28 13:07:33 6 20233090 Loop count = 12 Tue Nov 28 13:07:34 89 Loop count = 13 Tue Nov 28 13:07:35 Loop count = 14 Tue Nov 28 13:07:36 Loop count = 15 Tue Nov 28 13:07:37 Loop count = 16 Tue Nov 28 13:07:38 Loop count = 17 Tue Nov 28 13:07:39 Loop count = 18 Tue Nov 28 13:07:40 Loop count = 19 Tue Nov 28 13:07:41 |
#ipfw list
00010 allow ip from any to any via lo0 00020 deny ip from 127.0.0.0/8 to any 00030 deny ip from any to 127.0.0.0/8 00100 allow tcp from any to me dst-port 22 via em0 00210 reset tcp from any to me setup 01000 allow icmp from me to any keep-state 01100 deny icmp from any to any 65000 allow ip from any to any 65535 deny ip from any to any |
#ipfw add 50 deny icmp from 192.168.15.24 to me
00050 deny icmp from 192.168.15.24 to me |
#ping 192.168.15.24
![]() PING 192.168.15.24 (192.168.15.24): 56 data bytes ^C --- 192.168.15.24 ping statistics --- 9 packets transmitted, 0 packets received, 100% packet loss |
#ipfw -d show
00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00050 9 756 deny icmp from 192.168.15.24 to me 00100 4685 292792 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 349 29316 allow icmp from me to any keep-state 01100 21 1708 deny icmp from any to any 65000 29085 2084298 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 346 29064 (489s) STATE icmp 192.168.15.23 0 <-> 192.168.15.24 0 |
#ipfw add 1 check-state
00001 check-state |
#ping 192.168.15.24
PING 192.168.15.24 (192.168.15.24): 56 data bytes 64 bytes from 192.168.15.24: icmp_seq=0 ttl=64 time=0.377 ms 64 bytes from 192.168.15.24: icmp_seq=1 ttl=64 time=0.203 ms ^C --- 192.168.15.24 ping statistics --- 2 packets transmitted, 2 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.203/0.290/0.377/0.087 ms |
#ipfw -d show
00001 0 0 check-state 00010 14288 571552 allow ip from any to any via lo0 00020 0 0 deny ip from 127.0.0.0/8 to any 00030 0 0 deny ip from any to 127.0.0.0/8 00050 9 756 deny icmp from 192.168.15.24 to me 00100 4839 302336 allow tcp from any to me dst-port 22 via em0 00210 4986 199440 reset tcp from any to me setup 01000 353 29652 allow icmp from me to any keep-state 01100 21 1708 deny icmp from any to any 65000 29249 2106074 allow ip from any to any 65535 0 0 deny ip from any to any ## Dynamic rules (1): 01000 350 29400 (496s) STATE icmp 192.168.15.23 0 <-> 192.168.15.24 0 |
#ipfw add 2100 unreach port udp from any to any
02100 unreach port udp from any to any |
#host ya.ru
ya.ru has address 213.180.204.8 ya.ru mail is handled by 0 mx1.yandex.ru. ya.ru mail is handled by 10 mx2.yandex.ru. |
#sockstat -4
USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root nmbd 43552 7 udp4 *:137 *:* root nmbd 43552 8 udp4 *:138 *:* root nmbd 43552 9 udp4 192.168.15.23:137 *:* root nmbd 43552 10 udp4 192.168.15.23:138 *:* root smbd 43544 21 tcp4 *:445 *:* root smbd 43544 22 tcp4 *:139 *:* root bc 43005 0 tcp4 127.0.0.1:30021 127.0.0.1:59483 root bc 43005 1 tcp4 127.0.0.1:30021 127.0.0.1:59483 root bc 43005 2 tcp4 127.0.0.1:30021 127.0.0.1:59483 ... root xinetd 42206 7 tcp4 *:7 *:* root xinetd 42206 8 tcp4 *:30021 *:* root sshd 37745 3 tcp4 192.168.15.23:22 192.168.15.26:64310 root sshd 26124 3 tcp4 192.168.15.23:22 192.168.15.25:60594 root sshd 26060 3 tcp4 192.168.15.23:22 192.168.15.24:52430 root perl5.8.7 25920 3 tcp4 192.168.15.23:53735 217.27.159.217:18030 root sshd 25855 3 tcp4 192.168.15.23:22 192.168.15.254:41665 root sendmail 451 4 tcp4 127.0.0.1:25 *:* root sshd 445 4 tcp4 *:22 *:* root syslogd 319 6 udp4 *:514 *:* |
#sockstat -4 | grep udp
root nmbd 43552 7 udp4 *:137 *:* root nmbd 43552 8 udp4 *:138 *:* root nmbd 43552 9 udp4 192.168.15.23:137 *:* root nmbd 43552 10 udp4 192.168.15.23:138 *:* root syslogd 319 6 udp4 *:514 *:* |
#/usr/local/bin/nc -u 192.168.15.23 513
d |
#d
![]() bash: d: command not found |
#d
![]() bash: d: command not found |
#/usr/local/bin/nc -u 192.168.15.23 513
sdf |
#ipfw list
00001 check-state 00010 allow ip from any to any via lo0 00020 deny ip from 127.0.0.0/8 to any 00030 deny ip from any to 127.0.0.0/8 00050 deny icmp from 192.168.15.24 to me 00100 allow tcp from any to me dst-port 22 via em0 00210 reset tcp from any to me setup 01000 allow icmp from me to any keep-state 01100 deny icmp from any to any 02000 allow udp from me to 192.168.15.254 dst-port 53 keep-state 02100 unreach port udp from any to any 65000 allow ip from any to any 65535 deny ip from any to any |
#ipfw list
00001 check-state 00010 allow ip from any to any via lo0 00020 deny ip from 127.0.0.0/8 to any 00030 deny ip from any to 127.0.0.0/8 00050 deny icmp from 192.168.15.24 to me 00100 allow tcp from any to me dst-port 22 via em0 00210 reset tcp from any to me setup 01000 allow icmp from me to any keep-state 01100 deny icmp from any to any 02000 allow udp from me to 192.168.15.254 dst-port 53 keep-state 02100 unreach port udp from any to any 65000 allow ip from any to any 65535 deny ip from any to any |
#sockstat -4l
USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root nmbd 43552 7 udp4 *:137 *:* root nmbd 43552 8 udp4 *:138 *:* root nmbd 43552 9 udp4 192.168.15.23:137 *:* root nmbd 43552 10 udp4 192.168.15.23:138 *:* root smbd 43544 21 tcp4 *:445 *:* root smbd 43544 22 tcp4 *:139 *:* root xinetd 42206 5 tcp4 *:23 *:* root xinetd 42206 7 tcp4 *:7 *:* root xinetd 42206 8 tcp4 *:30021 *:* root sendmail 451 4 tcp4 127.0.0.1:25 *:* root sshd 445 4 tcp4 *:22 *:* root syslogd 319 6 udp4 *:514 *:* |
#nmap 127.0.0.1
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2006-11-28 13:29 UTC Interesting ports on localhost.unix.nt (127.0.0.1): (The 1657 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 7/tcp open echo 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 139/tcp open netbios-ssn 445/tcp open microsoft-ds Nmap finished: 1 IP address (1 host up) scanned in 10.358 seconds |
#nmap
![]() Nmap 3.81 Usage: nmap [Scan Type(s)] [Options] <host or net list> Some Common Scan Types ('*' options require root privileges) * -sS TCP SYN stealth port scan (default if privileged (root)) -sT TCP connect() port scan (default for unprivileged users) * -sU UDP port scan -sP ping scan (Find any reachable machines) * -sF,-sX,-sN Stealth FIN, Xmas, or Null scan (experts only) -sV Version scan probes open ports determining service & app names/versions -sR RPC scan (use with other scan types) Some Common Options (none are required, most can be combined): ... * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys -6 scans via IPv6 rather than IPv4 -T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy -n/-R Never do DNS resolution/Always resolve [default: sometimes resolve] -oN/-oX/-oG <logfile> Output normal/XML/grepable scan logs to <logfile> -iL <inputfile> Get targets from file; Use '-' for stdin * -S <your_IP>/-e <devicename> Specify source address or network interface --interactive Go into interactive mode (then press h for help) Example: nmap -v -sS -O www.my.com 192.168.0.0/16 '192.88-90.*.*' SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES |
#nmap -F
![]() Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2006-11-28 13:31 UTC No target machines/networks specified! QUITTING! |
#nmap -F 127.0.0.1
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2006-11-28 13:32 UTC Interesting ports on localhost.unix.nt (127.0.0.1): (The 1215 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 7/tcp open echo 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 139/tcp open netbios-ssn 445/tcp open microsoft-ds Nmap finished: 1 IP address (1 host up) scanned in 7.698 seconds |
#vi /usr/local/etc/smb.conf
224a225,230 > comment = Public Wheel > path = /temp > public = yes > writable = yes > printable = no > write list = @wheel |
#ls -aGl /
total 63 drwxr-xr-x 22 root wheel 512 Nov 28 12:11 . drwxr-xr-x 22 root wheel 512 Nov 28 12:11 .. -rw-r--r-- 2 root wheel 801 Nov 3 2005 .cshrc drwx------ 2 root wheel 512 Nov 26 13:45 .mozilla -rw-r--r-- 2 root wheel 251 Nov 3 2005 .profile drwxrwxr-x 2 root operator 512 Nov 26 13:25 .snap -r--r--r-- 1 root wheel 6188 Nov 3 2005 COPYRIGHT drwxr-xr-x 2 root wheel 1024 Nov 26 13:26 bin drwxr-xr-x 5 root wheel 512 Nov 26 13:30 boot ... drwxr-xr-x 2 root wheel 512 Nov 3 2005 mnt dr-xr-xr-x 2 root wheel 512 Nov 3 2005 proc drwxr-xr-x 2 root wheel 2560 Nov 26 13:26 rescue drwxr-xr-x 10 root wheel 512 Nov 27 12:09 root drwxr-xr-x 2 root wheel 2560 Nov 26 13:26 sbin lrwxrwxrwx 1 root wheel 11 Nov 26 13:26 sys -> usr/src/sys drwxr-xr-x 2 root wheel 512 Nov 28 12:11 temp drwxrwxrwt 14 root wheel 512 Nov 28 13:39 tmp drwxr-xr-x 17 root wheel 512 Nov 26 13:30 usr drwxr-xr-x 23 root wheel 512 Nov 28 06:57 var |
#cd /home/
|
#ls
.snap alex user zlo |
#nmap 127.0.0.1
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2006-11-28 13:48 UTC Interesting ports on localhost.unix.nt (127.0.0.1): (The 1657 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 7/tcp open echo 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 139/tcp open netbios-ssn 445/tcp open microsoft-ds Nmap finished: 1 IP address (1 host up) scanned in 10.361 seconds |
#/usr/local/etc/rc.d/samba.sh start
: # Network services, Internet style # # Note that it is presently the policy of IANA to assign a single well-known # port number for both TCP and UDP; hence, most entries here have two entries # even if the protocol doesn't support UDP operations. # # The latest IANA port assignments can be gotten from # # http://www.iana.org/assignments/port-numbers ... # # Kerberos services are for Kerberos v4, and are unofficial. Sites running # v5 should uncomment v5 entries and comment v4 entries. # # $FreeBSD: src/etc/services,v 1.102 2004/08/16 11:52:22 cperciva Exp $ # From: @(#)services 5.8 (Berkeley) 5/9/91 # # WELL KNOWN PORT NUMBERS # rtmp 1/ddp #Routing Table Maintenance Protocol |
#nmap 127.0.0.1
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2006-11-28 13:48 UTC Interesting ports on localhost.unix.nt (127.0.0.1): (The 1657 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 7/tcp open echo 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 139/tcp open netbios-ssn 445/tcp open microsoft-ds Nmap finished: 1 IP address (1 host up) scanned in 10.357 seconds |
#ls
Muttrc ksysguarddrc screenrc Muttrc.dist lynx.cfg smb.conf a2ps-site.cfg lynx.cfg.default smb.conf.default a2ps.cfg mime.types snmp bonobo-activation openldap sudoers cdrecord openslp sudoers.sample cdrecord.sample orbit2rc wgetrc cups orbit2rc.default xdg esd.conf pam.d xinetd.conf esd.conf.default popd.conf.default xml2Conf.sh etter.conf rc.d xsltConf.sh etter.conf.sample rsyncd.conf fam.conf rsyncd.conf.sample |
#ls -G
Muttrc etter.conf orbit2rc.default sudoers Muttrc.dist etter.conf.sample pam.d sudoers.sample a2ps-site.cfg fam.conf popd.conf.default wgetrc a2ps.cfg ksysguarddrc rc.d xdg bonobo-activation lynx.cfg rsyncd.conf xinetd.conf cdrecord lynx.cfg.default rsyncd.conf.sample xml2Conf.sh cdrecord.sample mime.types screenrc xsltConf.sh cups openldap smb.conf esd.conf openslp smb.conf.default esd.conf.default orbit2rc snmp |
#cd ..
|
#pwd
/usr/local |
#cd ..
|
#cd ports/
|
#make search name=swat
Port: swatch-3.1.1_1 Path: /usr/ports/security/swatch Info: The Simple WATCHer and filter Maint: joseph@randomnetworks.com B-deps: p5-Bit-Vector-6.4 p5-Date-Calc-5.4 p5-Date-Manip-5.44 p5-TimeDate-1.16,1 perl-5.8.7 R-deps: p5-Bit-Vector-6.4 p5-Date-Calc-5.4 p5-Date-Manip-5.44 p5-TimeDate-1.16,1 perl-5.8.7 WWW: http://swatch.sourceforge.net/ Port: swisswatch-0.06 Path: /usr/ports/x11-clocks/swisswatch Info: A Swiss railway clock emulation, and a fancy default appearance Maint: sanpei@FreeBSD.org B-deps: expat-1.95.8_3 fontconfig-2.2.3,1 freetype2-2.1.10_1 imake-6.8.2 perl-5.8.7 pkgconfig-0.17.2 xorg-libraries-6.8.2 R-deps: expat-1.95.8_3 fontconfig-2.2.3,1 freetype2-2.1.10_1 pkgconfig-0.17.2 xorg-libraries-6.8.2 WWW: |
#ls -G /usr/local/etc/rc.d/
000.compat4x.sh cups.sh.sample mdnsresponder.sh snmptrapd.sh 000.compat5x.sh genkdmconf.sh rsyncd.sh xinetd.sh 000.mysql-client.sh kdelibs.sh samba.sh 001slpd.sh mdnsd.sh snmpd.sh |
#ipfw add 100 allow tcp from any to me 22 via em0 keep-state
![]() |
#ipfw add 100 allow tcp from any to me 22 via em0 keep-stat
![]() |
#ipfw add 100 allow tcp from any to me 22 via em0
00100 allow tcp from any to me dst-port 22 via em0 |
#ipfw list | grep -v ^65535 | sed s/^/add\ /
add 00001 check-state add 00010 allow ip from any to any via lo0 add 00020 deny ip from 127.0.0.0/8 to any add 00030 deny ip from any to 127.0.0.0/8 add 00050 deny icmp from 192.168.15.24 to me add 00100 allow tcp from any to me dst-port 22 via em0 add 00210 reset tcp from any to me setup add 01000 allow icmp from me to any keep-state add 01100 deny icmp from any to any add 02000 allow udp from me to 192.168.15.254 dst-port 53 keep-state add 02100 unreach port udp from any to any add 65000 allow ip from any to any |
#vi /etc/rc.conf
6a7,8 > firewall_enable="YES" > firewall_type="/etc/myfirewall" |
#/etc/rc.d/ipfw restart
net.inet.ip.fw.enable: 1 -> 0 Starting divert daemons:Flushed all rules. Firewall rules loaded. net.inet.ip.fw.enable: 0 -> 1 |
#/etc/rc.d/ipfw restart
net.inet.ip.fw.enable: 1 -> 0 Starting divert daemons:Flushed all rules. Firewall rules loaded. net.inet.ip.fw.enable: 0 -> 1 |
#ipfw list
65535 deny ip from any to any |
#vi /etc/rc.conf
|
#vi /etc/rc.conf
8c8 < firewall_type="/etc/myfirewall" --- > firewall_type="/etc/my.firewall" |
#/etc/rc.d/ipfw restart
net.inet.ip.fw.enable: 1 -> 0 Starting divert daemons:Flushed all rules. 00001 check-state 00010 allow ip from any to any via lo0 00020 deny ip from 127.0.0.0/8 to any 00030 deny ip from any to 127.0.0.0/8 00050 deny icmp from 192.168.15.24 to me 00100 allow tcp from any to me dst-port 22 via em0 00210 reset tcp from any to me setup 01000 allow icmp from me to any keep-state 01100 deny icmp from any to any 02000 allow udp from me to 192.168.15.254 dst-port 53 keep-state 02100 unreach port udp from any to any 65000 allow ip from any to any Firewall rules loaded. net.inet.ip.fw.enable: 0 -> 1 |
#ipfw list | grep -v ^65535 | sed s/^/add\ /
![]() |
#ipfw list | grep -v ^65535 | sed s/^/add\ /
![]() |
#ipfw list | grep -v ^65535 | sed s/^/add\ /
|
#ipfw flush ; ipfw add 65000 allow ip from any to any
Are you sure? [yn] y Flushed all rules. 65000 allow ip from any to any |
#ipfw list | grep -v ^65535 | sed s/^/add\ /
![]() enabled or disabled, so this mechanism permits an easy way to store mul- tiple configurations of the firewall and quickly (and atomically) switch between them. The command to enable/disable sets is ipfw set [disable number ...] [enable number ...] where multiple enable or disable sections can be specified. Command exe- cution is atomic on all the sets specified in the command. By default, all sets are enabled. When you disable a set, its rules behave as if they do not exist in the firewall configuration, with only one exception: dynamic rules created from a rule before it had been disabled will ... a different dynamic pipe or queue. A flow identifier is con- structed by masking the IP addresses, ports and protocol types as specified with the mask options in the configuration of the pipe or queue. For each different flow identifier, a new pipe or queue is created with the same parameters as the original object, and match- ing packets are sent to it. Thus, when dynamic pipes are used, each flow will get the same bandwidth as defined by the pipe, whereas when dynamic queues are used, each flow will share the parent's pipe bandwidth evenly with other flows generated by the same queue (note that other queues |
#ipfw list | grep -v ^65535 | sed s/^/add\ /
structed by putting the patterns in lists enclosed between parentheses ( ) or braces { }, and using the or operator as follows: add 00050 pipe 1 tcp from 192.168.15.254 to me in ipfw add 100 allow ip from { x or not y or z } to any add 00100 allow ip from me to any keep-state Only one level of parentheses is allowed. Beware that most shells have add 00200 allow tcp from any to me dst-port 22 keep-state advisable to put a backslash \ in front of them to prevent such interpretations. add 00300 deny tcp from any to any The body of a rule must in general include a source and destination add 65000 allow ip from any to anyrd any can be used in various places to specify that the content of a required field is irrelevant. The rule body has the following format: [proto from src to dst] [options] The first part (proto from src to dst) is for backward compatibility with ipfw1. In ipfw2 any match pattern (including MAC headers, IP protocols, addresses and ports) can be specified in the options section. Rule fields have the following meaning: The { protocol or ... } format (an or-block) is provided for con- venience only but its use is deprecated. |
#cat /etc/my.firewall
add 00001 check-state add 00010 allow ip from any to any via lo0 add 00020 deny ip from 127.0.0.0/8 to any add 00030 deny ip from any to 127.0.0.0/8 add 00050 deny icmp from 192.168.15.24 to me add 00100 allow tcp from any to me dst-port 22 via em0 add 00210 reset tcp from any to me setup add 01000 allow icmp from me to any keep-state add 01100 deny icmp from any to any add 02000 allow udp from me to 192.168.15.254 dst-port 53 keep-state add 02100 unreach port udp from any to any add 65000 allow ip from any to any |
#ipfw list
00100 allow tcp from any to me dst-port 22 via em0 65000 allow ip from any to any 65535 deny ip from any to any |
#ipfw delete 100
|
#ipfw add 100 allow tcp from any to me 22 via em0 keep-state
00100 allow tcp from any to me dst-port 22 via em0 keep-state |
#ipfw add 100 allow tcp from any to me 22 via em0 keep-state
![]() |
#ipfw add 100 allow tcp from any to me 22 via em0 keep-stat
![]() |
#ipfw add 100 allow tcp from any to me 22 via em0 keep-stat
![]() |
#ipfw add 200 add allow icmp from me to any keep-state
![]() ipfw: invalid action add |
#ipfw add 200 allow icmp from me to any keep-state
00200 allow icmp from me to any keep-state |
#ipfw add 300 deny tcp from any to me setup
00300 deny tcp from any to me setup |
#ipfw list
00100 allow tcp from any to me dst-port 22 via em0 keep-state 00200 allow icmp from me to any keep-state 00300 deny tcp from any to me setup 65000 allow ip from any to any 65535 deny ip from any to any |
#ping ya.ru
PING ya.ru (213.180.204.8): 56 data bytes 64 bytes from 213.180.204.8: icmp_seq=0 ttl=55 time=127.234 ms 64 bytes from 213.180.204.8: icmp_seq=1 ttl=55 time=123.516 ms ^C --- ya.ru ping statistics --- 2 packets transmitted, 2 packets received, 0% packet loss round-trip min/avg/max/stddev = 123.516/125.375/127.234/1.859 ms |
#nmap 127.0.0.1
![]() sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied ... sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied sendto in send_ip_packet: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Permission denied |
#ipfw list
00100 allow tcp from any to me dst-port 22 via em0 keep-state 00200 allow icmp from me to any keep-state 00300 deny tcp from any to me setup 65000 allow ip from any to any 65535 deny ip from any to any |
#ipfw delete 100
|
#ipfw delete 200
|
#ipfw delete 300
|
#ipfw add 100 allow ip from me to any keep-state
00100 allow ip from me to any keep-state |
#ipfw add 200 allow tcp from any to me dst-port 22 keep-stat
![]() |
#ipfw add 200 allow tcp from any to me dst-port 22keep-state
|
add 00001 check-state add 00010 allow ip from any to any via lo0 add 00020 deny ip from 127.0.0.0/8 to any add 00030 deny ip from any to 127.0.0.0/8 add 00050 deny icmp from 192.168.15.24 to me add 00100 allow tcp from any to me dst-port 22 via em0 add 00210 reset tcp from any to me setup add 01000 allow icmp from me to any keep-state add 01100 deny icmp from any to any add 02000 allow udp from me to 192.168.15.254 dst-port 53 keep-state add 02100 unreach port udp from any to any add 65000 allow ip from any to any
Время первой команды журнала | 14:58:37 2006-11-28 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Время последней команды журнала | 16:17:41 2006-11-28 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в журнале | 101 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 5.94 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 1.98 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 1.32 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 1.28 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008