- Mastering Linux Security and Hardening
- Donald A. Tevault
- 223字
- 2021-07-02 19:19:24
Hands-on lab for setting password complexity criteria
For this lab, you can use either the CentOS or Ubuntu virtual machine, as desired. The only difference is that you won't perform Step 1 for CentOS:
- For Ubuntu only, install the libpam-pwquality package:
sudo apt install libpam-pwquality
- Open the /etc/security/pwquality.conf file in your preferred text editor. Remove the comment symbol from in front of the minlen line and change the value to 19. It should now look like this:
minlen = 19
Save the file and exit the editor.
- Create a user account for Goldie and attempt to assign her the passwords, turkeylips, TurkeyLips, and Turkey93Lips. Note the change in each warning message.
- In the pwquality.conf file, comment out the minlen line. Uncomment the minclass line and the maxclassrepeat line. Change the maxclassrepeat value to 5. The lines should now look like:
minclass = 3
maxclassrepeat = 5
Save the file and exit the text editor.
- Try assigning various passwords that don't meet the complexity criteria that you've set to Goldie's account and view the results.
In the /etc/login.defs file on your CentOS machine, you'll see the line:
PASS_MIN_LEN 5
Supposedly, this is to set the minimum password length, but in reality, pwquality overrides it. So, you could set this value to anything at all, and it would have no effect.
推薦閱讀
- Android應(yīng)用安全實戰(zhàn):Frida協(xié)議分析
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- INSTANT Windows PowerShell
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- 反黑命令與攻防從新手到高手(微課超值版)
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計技術(shù)揭秘
- Kali Linux Wireless Penetration Testing Cookbook
- 模糊測試:強制發(fā)掘安全漏洞的利器
- ARM匯編與逆向工程:藍(lán)狐卷·基礎(chǔ)知識
- 學(xué)電腦安全與病毒防范
- 安全防御入門手冊
- SQL Injection Strategies
- 實用黑客攻防技術(shù)
- Mastering Python for Networking and Security
- Mastering Metasploit