Instructions
The "outsider" on the left represents an attacker outside of the network you are administering. The "insider" on the right represents a computer inside the network you are tasked with protecting. Both terminals will respond to a subset of the commands associated with
iptables
,
nmap
, and
ipconfig
. For more details about the project please see the
Thesis.
Starter Commands
Below are a small set of commands to get you started:
- Insider: Type
ipconfig
into the insider's terminal to learn what its IP address is.
- Outsider: In the outsider terminal run
nmap -p 80 [Insider IP address]
to find out if port 80, which is commonly used by internet connections, is open.
- Insider: Close port 80 by typing
iptables -A INPUT -dport 80 -j DROP
- Outsider: Run
nmap -p 80 [Insider IP address]
again to see if you have successfully closed the port.
- Outsider: Change the outsider's IP so they can test from a different location.
set ip 166.155.72.10
, this is not a standard linux command, but is very handy for our WebApp.