0% found this document useful (0 votes)
17 views23 pages

File 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views23 pages

File 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Operating Systems

Assessment Report
2024

Student Number
Assessment Guidelines

To understand the requirements, what you must provide, and the


marking criteria, please carefully read the Assessment Brief.

There are three Activities which each may include two or more questions.
Please answer all questions and complete all the tasks in all Activities.

When you run a command or configure a system, take all relevant and
essential screenshots to use as proof for your responses. Provide a
succinct explanation that explains your response, the instructions you
followed, and the result.

Please name your report using this format: Your Student Number_OSP.

Advice Regarding Screenshots: Use Windows + Shift + S to choose a region


for a screenshot by clicking and dragging the cursor over it.

In case you require assistance with taking screenshots or any other


actions, do get in touch with me right away.

Complete all the tasks


assigned in the
deliverable section.
2. Take all necessary
and appropriate
screenshots.
3. Past those new
screenshots to a MS-
Word file with the step
number.
4. Write a brief
description bellow or
above each screenshot
for each step to make a
good
report related to this
lab.
5. Submit your report
to the D2L “LAB-07”
drop-box by only one
member of each group
within one week from
the assigned date.
Complete all the tasks
assigned in the
deliverable section.
2. Take all necessary
and appropriate
screenshots.
3. Past those new
screenshots to a MS-
Word file with the step
number.
4. Write a brief
description bellow or
above each screenshot
for each step to make a
good
report related to this
lab.
5. Submit your report
to the D2L “LAB-07”
drop-box by only one
member of each group
within one week from
the assigned date.
Activity
1.1 Display the current IP address (es) of your computer.
1
Comman - Ip add show
d: - ifconfig
Screenshot:
Place here the screenshot you captured from your computer.
Descripti The Ip add show is used to display the IP addresses and other
on: network interface information of all network interfaces on the
system. Similarly, the Ipconfig command is used to Display the
current IP address(es) of your computer

Activity 1.2. Display the status of the currently running processes in the
1. system.
Comman
- ps aux
d:
Screenshot:

Descripti In Kali Linux we can utilize the “ps aux” to Display the status of
on: the currently running processes in the system. It display all the
currently running processes in the system like as above figure

Activity
1.3. Display how much memory space is taking each directory.
1.
Comman
du -h –max-depth=1
d:
Screenshot:
Place here the screenshot you captured from your computer.
Descripti The du order on Unix-like frameworks (like Kali Linux) can be
on: utilized to perceive how much memory the registry is utilizing. The
order utilized in this case shows the ongoing catalog's registries'
plate consumption. The result can be perused by people thanks to
the - h option, and it can incorporate the high level organizers
when - - max-depth=1 is utilized. The - - max-depth option can be
changed to show registry progressive system at more profound
levels

Activity 1.4. Display how many times word “root” is repeated in


1. /etc/passwd file.
Comman
- grep -o 'root'/etc/passwd | wc-l
d:
Screenshot:
Descripti We can use grep to find an occurrence of the word "root" in
on: /etc/passwd
and then use wc (word count) to count the number of
occurrences.
Here, grep -o 'root' searches /etc/passwd for the word "root"
in /etc/passwd and
prints each occurrence of the word on a separate line (-o option).
wc -l counts the number of lines produced by grep corresponding
to the number of occurrences of the word
"root".

Activity
1.5. Show all the PCI devices of your computer system.
1.
Comman
lspci
d:
Screenshot:
Descripti To see all the Peripheral Component Interconnect (PCI) devices
on: on our computer system using the Linux utility "lspci". You can
use this command to get a detailed list of all PCI buses and
devices currently connected to the system.
Running this command through the terminal displays a
comprehensive list of all PCI devices detected by our system,
including vendor information, device IDs, and more.

Activity 1.6. Create a new compressed tar file of your Document


1. directory.
Comman
- tar -czvf documents.tar.gz Documents
d:
Screenshot:
Place here the screenshot you captured from your computer.

Descripti We can use the "tar -czvf" command in the compression options
on: to create a new compressed tar file (sometimes called a tarball)
from our documents directory.
Executing the command creates a newly compressed tar file
document.tar.gz in the active working directory. All files and
folders in our directory will be included in this file.

2.1. Write a shell script that prompts the user for a name
Activity 2. of a file or directory and reports if it is a regular file, a
directory, or another type of file.
Screenshot:
Place here the screenshot you captured from your code and results.
Description: This piece of code contains a set of n kaboodles denoted by
#!/bin/bash that specify that the contents should be
executed by the bash shell. The "row - p" command
prompts the client to enter a document or index name,
which is then left in the "input" variable. The sequence "se
[ - e "$input" ]" is used to determine the presence of a given
record or index of client input. The -e option confirms the
existence of an entry or index. case [ - f "$input" ]; is set to
previous if the declaration and tests assume that the
information is a standard document. The -f option checks
whether the default mode corresponds to a normal
document. elif [-d "$input"]; then decide if the data is a
directory. The -d option decides whether to compare the
default mode with the registry. else: The code block is
executed if the data is definitely not a regular record or
index. If they provided an entry or the list doesn't exist, it
will repeat "Error: $entry does not exist." appears In the last
step, the content asks for the name of the client's document
or record. Next, it checks if the data exists, and if so,
determines if it is a standard record, registry, or some other
document structure, and issues an important message.
There is no information, it gives an error message.

2.2. Write a shell script to find the number of files in a


Activity 2.
directory

Screenshot:
Place here the screenshot you captured from your code and results.
Description: #! /bin/bash is a set of n kaboodle lines indicating that the
contents should be executed using Slam-shell. To begin
with, let's say briefly to give a list in a certain way. Our
comments are left in the "index" variable. Content then
uses the animated queue to list all the documents in the
predefined folder, except for subfolders. The number of
records found is then determined using the wc - l sequence,
and the next addition is left in the "count" variable. Once
the count is obtained, a list of the absolute number of
documents found in the index is displayed along with the
comparison method. In general, this content repeats the
following functions: it prompts the client for input into the
index, checks the existence of the directory, counts the
number of entries in the list and displays the final list. There
is no error message and content ending when a given index
is displayed.

Activity
3.1. Installing and configuring DHCP services.
3.
The command that were used to install and configuring the
DHCP services are given bellow
1. sudo apt update
Comman 2. sudo apt upgrade
d: 3. sudo apt install isc-dhcp-server
4. sudo nano /etc/dhcp/dhcpd.conf
5. sudo systemctl restart isc-dhcp-server
6. sudo systemctl status isc-dhcp-server
Screenshot:
Place here the screenshots you captured from your computers.

Descripti The command "sudo apt upgrade" is used to to check for the
on: latest implementations of all deployed packages. This limits
dependency conflicts and ensures that our framework is up to
date. Every time we are in our framework, we can continue to use
the latest DHCP by introducing the server package by running the
command "sudo apt install isc-dhcp-server" This command
introduces the important package for our server.
After introducing the package, we actually want to add a selection
of locations to the server. We can do this by running "sudo vi
/etc/dhcp/dhcpd.conf". This order opens an installation record to
which we can add important nuances. Every time we added
important nuances, we really want to restart the DHCP server for
the changes to take effect. You can do this by running "sudo
systemctl restart isc-dhcp-server". . This command shows the
current state of the server and helps us ensure that everything is
completed as expected.
3.2. Configuring a client machine to receive IP address
Activity 3.
from the DHCP server.

1. sudo nano /etc/network/interfaces


Command: 2. sudo systemctl restart networking
3. ifconfig
Screenshot:
Place here the screenshots you captured from your computers.
Description: First we use sudo nano to change the settings of
/etc/network/interfaces from static to dhcp. The network is
then restarted with the command sudo systemctl restart
networking. Now we can verify that our network is
configured correctly using the ifconfig command. After
running the command, we can see that it is connected to
the server specified in step 3.1. We can confirm this by
looking at the server status of our Kali client request.

.
Activity
3.3. Installing and configuring DNS service on the server.
3.

The command that used installing and configuring DNS sercice on


the server are give bellow
1. sudo apt install bind9
2. hostname -i
3. sudo vi /etc/bind/named.conf.options
4. sudo vi /etc/bind/named.conf
5. touch db.babita
6. touch db.rev
Comman 7. cp db.local db.babita
d: 8. cp db.127 db.rev
9. sudo vi /etc/bind/db.babita
10. sudo vi /etc/bind/db.rev
11. sudo vi /etc/resolv.conf
12. sudo systemctl restart bind9
13. sudo systemctl status bind9
14. nslookup babita.com
15. nslookup 192.168.1.77
16. nslookup ns1

Screenshot:
Place here the screenshots you captured from your computers.
Descripti We can use command "sudo apt install bind9" to introduce DNS
on: server package BIND9 in our Ubuntu server. Once configured, we
can use the sequence "hostname - I" to display the IP address
associated with the hostname of our server. This sequence is
useful for distinguishing the IP address to which BIND9 should
configure.
To configure server settings such as listening IP locations and
forwarders, we can modify the BIND9 option with the "sudo vi
/etc/bind/named.conf.options" command. We can also modify
the main BIND9 configuration entry to specify the forward and
reverse zones of the request using the "sudo vi
/etc/bind/named.conf" command. The next step is to build zone
documents for forward and reverse query using the provided
commands: "touch db.babita" and "touch db.rev". We can then
make these zone entries according to the given arrangements
using the commands "cp db.local db.babita" and "cp db.127
db.rev".

Activity 3. 3.4. Installing and configuring a web service on the server

The command that are used to installing and configuring a


web services on the server are given bellow
1. sudo apt update
2. sudo apt install apache2
3. sudo ufw allow 'Apache'
4. sudo systemctl status apache2
Command: 5. sudo nano /etc/apache2/sites-available/babita.com.conf
6. sudo a2ensite babita.com.conf
7. sudo systemctl reload apache2
8. sudo mkdir -p /var/www/html/babita.com
9. sudo chown -R www-data:www-data
/var/www/html/babita.com
10. sudo nano /var/www/html/babita.com/index.html
Screenshot:
Description:

Activity
3.5. Installing and configuring Firewall service on the server.
3.
the command that used to installing and configuring firewall
service on the server are given bellow
1. sudo apt install ufw
Comman 2. sudo ufw enable
d: 3. ping ip address
4. sudo nano /etc/ufw/before.rules
5. sudo ufw reload
6. ping ip address
Screenshot:
Descripti If the Straightforward Firewall (ufw) package is not already
on: installed on our Ubuntu server, we can introduce it with the
command sudo apt install ufw. To make the UFW firewall more
powerful, we use sudo ufw enable. The UFW will enforce the
restrictions we set when authorized. Currently, we have not
disabled the icmp policy, so when we ping the server's IP address,
we see that the request is answered with packets. We can change
the ufw contract rules by running sudo nano
/etc/ufw/before.rules. We can stop the ICMP contract by
changing the ICMP codes of the message from Acknowledge to
Drop. You can reload the UFW firewall settings by running sudo
ufw reload. After reloading, all changes made to the UFW design
documents will take effect - including before.rules. When we
finally ping the IP address of the client's server, we do not receive
any packets because the firewall restricts the ICMP policy.

You might also like