<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Derekaubin</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Derekaubin"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Derekaubin"/>
	<updated>2026-05-02T07:46:25Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20546</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20546"/>
		<updated>2016-01-18T20:41:11Z</updated>

		<summary type="html">&lt;p&gt;Derekaubin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Topics &amp;amp; Readings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Trent Jaeger&#039;s Operating Systems Security is the textbook we are currently using (Reading it Helps)&lt;br /&gt;
* Notes&lt;br /&gt;
* Chat&lt;br /&gt;
* Names&lt;br /&gt;
* Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
** Grading&lt;br /&gt;
** Brainstorming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class Notes:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
* Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
* Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
* End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
* Journal outline&lt;br /&gt;
* Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started (getting familiar with hacking and defense against hacking).&lt;br /&gt;
	&lt;br /&gt;
* Hacking opportunities (Breadth/Depth)&lt;br /&gt;
* Class exercises/tutorials&lt;br /&gt;
* Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
* Not just tutorials, more so playing&lt;br /&gt;
* Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
* Not just one project all semester&lt;br /&gt;
* You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
* Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
* The set up can be documented in your hacking journal&lt;br /&gt;
* Making systems do what they are not supposed to do&lt;br /&gt;
* Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
* Many system specific exploits&lt;br /&gt;
* Hackthissite.org is a good place to start for web security&lt;br /&gt;
* We are allowed to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
* Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
* Expected to be submitted on time&lt;br /&gt;
* Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
* Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
* Bug bounties (You keep the money!)&lt;br /&gt;
* Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
* Do not work on non-authorized systems&lt;br /&gt;
* Teams are allowed but don’t be a freeloader&lt;br /&gt;
* Go off the rails and collaborate!&lt;br /&gt;
* Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
* Protection domains&lt;br /&gt;
* separating O/S into boundaries so things don’t mess with other things unless they are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
* Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                   | A | B | C |		&lt;br /&gt;
 1   |             | r | rw| w |&lt;br /&gt;
 2   |             | r | r | w |&lt;br /&gt;
 3   |             |   | rw| r |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
* Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
* But why do this at all?&lt;br /&gt;
** Rules and restrictions but why?&lt;br /&gt;
** Done so programs don’t leak info of one user to another.&lt;br /&gt;
** i.e. Top secret info&lt;br /&gt;
** How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
** Permissions are set and stone&lt;br /&gt;
** Cannot be changed at run time&lt;br /&gt;
** Must boot into special mode with password&lt;br /&gt;
** Rigid system&lt;br /&gt;
** SELINUX&lt;br /&gt;
** Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
** Most of us use these systems&lt;br /&gt;
** Users have the ability to change things&lt;br /&gt;
** Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
** Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
*** Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
*** You cannot by pass or mess with it&lt;br /&gt;
*** There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
*** Forbid inter communications between processes&lt;br /&gt;
*** What about covert channels?&lt;br /&gt;
&lt;br /&gt;
** MULTICS&lt;/div&gt;</summary>
		<author><name>Derekaubin</name></author>
	</entry>
</feed>