1. Use find as described in Chapter 22 to locate SUID files. Is the list larger than you expected? Are the entries on your list justifiably SUID programs?

  2. Create an entry in /etc/sudoers that lets your user account run any command as root. Run some commands through sudo and watch the file /var/log/messages. What entries do you see? How would this be useful in a multiadministrator environment?

  3. Look at the file /etc/shadow. What user accounts do not have passwords? Why don’t they?

  4. Experiment with the chage command to set the password age for your account.

  5. Run ulimit –a. What default limits are set? What would be some useful limits to place on users?

  6. Run netstat --tcp –anp | grep LISTEN. What processes on your system are listening on TCP ports? If you were to harden this system, how would you change this configuration?

  7. Run nmap localhost. Does this output match what you saw from the previous netstat command? Why or why not?

  8. If you have xinetd installed, go to the /etc/xinetd.d directory and determine what services are enabled.

  9. Run ssh-keygen –t dsa. What files were created in ~/.ssh? What are the permissions on those files?

Get LPI Linux Certification in a Nutshell, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.