123k views
1 vote
Step 1: Create a better ping command

Use ping -h to look up the options that you can use with the ping command. Create an alias so that when you execute ping it stops after 5 tries and shows hostnames if they are available.
Create an alias so that when you execute slowping it does the same thing as your new ping command and it also waits for 3 seconds between each attempt.
If you are unhappy with an alias and want to re-create it, use unalias to remove the existing alias first.
Answer the following questions
What is the exact command you used to create the ping alias?
What is the exact command you used to create the slowping alias?
What do you think the advantages are of making these aliases? Why not just stick to the regular ping command?
Step 2: Which servers are down?
Using your slowping command, check the servers listed below. Take a screenshot of ONE of the successful attempts. Name the screenshot slowping.xxx where xxx is the appropriate file extension.
Servers to check:
iti201s[X].comminfo.rutgers.edu (replace [X] with numbers 1-10)
iti201app.comminfo.rutgers.edu
iti201db.comminfo.rutgers.edu
Answer the following questions
Which servers (if any) appear to be down?
You should have seen some different hostnames than what you were expecting. Take a shot at explaining why this is not an issue. I mean, two names for the same server? Should that cause some kind of conflict?
Step 3: Check the remote servers
Run traceoute against one of the servers in step 2 that are responsive and take a screenshot.
Run traceoute against www.example.org take a screenshot and name it traceroute.xxx where xxx is the appropriate file extension.
Step 4: Network tools or hacking tools?
The Fox textbook says that these tools are "often considered insecure programs" and that "hackers might use either or both to investigate the computers on a LAN." Let’s stipulate for now that this is true.
In an earlier module we learned about a tool that could be used to give access to these commands to only certain people. What is that tool, and how would it reduce the risk that Fox is referring to? (hint: think about "system permissions" and recall how you could and could not use apt in an earlier lab.)
Based on what these tools do, do you think "regular users" should have access to them? Defend your answer.

User LVR
by
7.9k points

1 Answer

4 votes

Final answer:

Aliases for ping and slowping improve efficiency in network diagnostics. Multiple DNS names for a single server do not cause conflicts. The sudo tool can manage access to network tools like ping and traceoute, balancing user needs and security.

Step-by-step explanation:

To create an alias for the ping command that stops after 5 tries and shows hostnames, the command is:

alias ping='ping -c 5 -n'

To create an alias for the slowping command that waits 3 seconds between each attempt and includes the features of the new ping alias, the command is:

alias slowping='ping -c 5 -n -i 3'

If you are unsatisfied with an alias, you can remove it with the following command:

unalias [ALIAS_NAME]

One of the advantages of making aliases is to save time and increase productivity by not having to type out the full set of options each time you want to use a modified command. This customization can make repetitive tasks more efficient.

Regarding the servers, using slowping will show which servers are down by not responding to the ping requests. Multiple hostnames for the same server is not an issue because this is an aspect of Domain Name System (DNS), where a single server can be reached through multiple addresses known as CNAME records or aliases, to serve different functions or to provide redundancy.

To manage access to network tools and address the concerns regarding security, the tool referred to that could grant or restrict access is sudo, which stands for "superuser do." By managing system permissions through sudo, only users who are granted privileges can execute certain commands, reducing the risk of misuse.

Regarding whether regular users should have access to network tools, opinions might vary. While it can be argued that tools like ping or traceoute are useful for troubleshooting, granting full access to all users could pose a security risk. It's important to strike a balance between necessary access for problem-solving and the potential for misuse.

User Weijen
by
7.9k points