CCP2 DVOP1 Praktikum

Task1 Task2 https://helm.sh/docs/intro/quickstart/ $ helm repo add bitnami https://charts.bitnami.com/bitnami ubuntu@ccp2-2022-lab-zh-26:~/CCP2-DVOP1-Lab$ helm repo update Hang tight while we grab the latest from your chart repositories... ...Unable to get an update from the "svc-cat" chart repository (https://kubernetes-sigs.github.io/service-catalog): failed to fetch https://kubernetes-sigs.github.io/service-catalog/index.yaml : 404 Not Found ...Successfully got an update from the "minibroker" chart repository ...Successfully got an update from the "bitnami" chart repository Update Complete. ⎈Happy Helming!⎈ ubuntu@ccp2-2022-lab-zh-26:~/CCP2-DVOP1-Lab$ helm install bitnami/mysql --generate-name NAME: mysql-1652450223 LAST DEPLOYED: Fri May 13 13:57:06 2022 NAMESPACE: default STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: CHART NAME: mysql CHART VERSION: 9.

SWS2 Penetration Testing 1

Penetration Testing Goals name six different testing methods and discuss which method is best when given the task of doing a security test be able to explain penetration testing name at least two standards providing guidance on how to do penetration testing explain the role and important parameters (scope, rules of engagement, test method) of the pre-engagement phase Reasons Why do we want to test? What’s our goal? Find and fix vulnerabilities?

SWS2 Exploits

Exploits Definition Is a piece of software, chunk of data, sequence of commands that take advantage of a vulnerability in an system Classification Often classified by their action Unauthorized data access arbitrary code execution denial of service privilege escalation Characterization local exploit remote exploit client-side exploit often requires some user action drive by attacks trigger fore example by malicious website server side exploit 0-day exploit Stack Layout CPU Registers esp stack pointer

SWS2 Introduciton

Introduction ISMS information security management system Security Controls safeguards or countermeasures Type of controls preventiv detective corrective ISO 27K -> 93 security controls ISO 27002:2022 implementation guidance CIS controls (Critical Security Controls) 18 controls dealing with the most relevant threats

PSPP Python Praktikum 1

Phython Praktikum 1 Lisp vs. Python Listen Lisp Python (apfel banane zitrone) [‘apfel’, ‘banane’, ‘zitrone’] (car ‘(eins zwei drei)) [‘apfel’, ‘banane’, ‘zitrone’][0] (cdr ‘(eins zwei drei)) [‘apfel’, ‘banane’, ‘zitrone’][1:] (lenght ‘(1 2 3)) len([1,2,3]) (append ‘(1 2 3 4) ‘(4 5)) [1,2,3] + [4, 5] liste[n:m] Teilsequenz vom n-ten bis zum (m-1)-ten Element liste[n:] Teilsequenz vom n-ten bis zum Ende der Liste liste[:m] Teilsequenz vom Anfang bis zum (m-1)-ten Element

Funktional Praktikum 1

Funktional Teil 1 ;;load lisp files (load "more-functional.lisp") 1. Iteration (defun range (a &optional (b nil) (c 1)) (cond ((null b) (funcall 'range 0 a c)) (t (cond ((< (* a c) (* b c)) ;;mit c multiplizieren um Bedingung umzukehren wenn c negativ (cons a (funcall 'range (+ a c) b c))) (t nil))))) (defun repeat (times value) (mapcar (lambda (n) value) (range times))) * (repeat 5 'hello) (HELLO HELLO HELLO HELLO HELLO) (defun repeatedly (times fun) (mapcar fun (range times))) Lösung

Lisp Praktikum 2

Praktikum 2 Aufgabe 1 (defun reduce-list (f init seq) (cond ((null seq) init) (t(funcall f (car seq) (reduce-list f init (cdr seq)))))) (reduce-list #'+ 0 '(1 2 3 4)) 10 ;; Filter a sequence by the function f ;;if f(list-entry) == true then add to list (defun filter (f seq) (cond ((null seq) nil) ((funcall f (car seq)) (cons (car seq) (filter f (cdr seq)))) (t (filter f (cdr seq))))) Aufgabe 2 Erstelle eine Funktion “Range”:

Lisp Cheat Sheet

Lisp Cheat Sheet * (car '(A B (C))) A * (cdr '(A (C))) ((C)) #‘fun ist eine Abkürzung von (function fun) Reihenfolge: (- 5 2) -> 3 (>= 5 2) -> T (defmacro setfun (symb fun) `(prog1 ',symb (setf (symbol-function ',symb) ,fun))) ;; Makro um einen Lambda-Ausdruck als Funktion an ein Symbol zu binden. (apply #'+ 1 2 3 '(4 5 6)) ;; => 21 (let (a b (c 3) (d (+ 1 2))) (list a b c d)) ;; (NIL NIL 3 3) ;;LET is special form for variable binding.

Lisp Praktikum 1

Lisp Praktikum 1 1. First Steps a. ;; 10 * (4 + 3 + 3 + 1) - 20 = 90 * (- (* 10 (+ 4 3 3 1)) 20) 90 * 42 42 ;;evalueates to itself * pi 3.141592653589793d0 * (/4 3) 4/3 * (/ 12 3) 4 * (/ 4 3.0) 1.3333334 * (+ 0.5 1/2) 1.0 * (+ 0.5 1/4) 0.75 * (+ 1/2 1/4) 3/4 * (* 35 1.

PSPP Python

Python For Loops really comfortable with range function: for n in range(2,10): for x in range(2, n): if n% x == 0: print(n, 'equals', x, '*', n//x) break else: #Loop fell through without finding a factor print(n, 'is a prime number') Scope Rules different Scopes local inside function(method,…) global in the surrounding modul built-in pre defined names(open, len,…) function call creates a local scope search order when reading local > global > built-in