• 2) Change password
  • 3) Modify the user
  • 4) Delete the user
  • 5) Add group
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet154/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   150   151   152   153   154   155   156   157   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    1) New user
    In Linux, if you are willing to add a new user to the system you need to
    enter the following command 
    linuxexample @ host : new UID 5363
    Whenever you tried to create a user using the following command with a
    name you would be opted to choose a password which is then stored in both
    /etc/password and /etc/shadow. After the successful addition of a user, a
    separate UID will be given to that particular account.
    Apart from that, a new home directory will be created for the user. It should
    be remembered that a default user group will be created on the user name.
    There is also a special directory called /etc/skel where all of the
    configurational files of the user will be stored.
    This is all you have to know about creating a new user in the Linux
    systems 


    2) Change password
    The password is the single pathway to access all the directories and files in
    the user system. You can use the following command to give a password to
    the user. 
    linuxexample @ host : pw UID 2435 to strange
    It should be remembered that ordinary users cannot use their username as
    the password. However, root users do not apply to this condition. 
    3) Modify the user
    Modifying is always a preferable option for hackers. Hackers usually insert
    an exploit or trojan in the directories and try to spread them into the whole
    system. For this reason, hackers should be aware of modifying a system. 
    user mod command is one of the most important commands that can be
    used to modify the home directories that are present. You can also use grep
    command to display the content that is present in the system directory .
    - m option can be used to change the default directory of the user so that
    everything present in this directory has advanced privileges.
    4) Delete the user 
    Sometimes hackers after getting what they want from the system will try to
    delete the user system to delete any log files that may be used to detect the
    attacker's identity. This is one of the most important commands to learn if
    you are looking to attack systems with huge security.
    By using the user del command as shown below you can delete the normal
    user and if it is performed by the root user he can delete any user that is
    present in the system.
    linuxexample @ host : UID del 239844
    5) Add group


    User Groups are created to make things easy for the administrators to make
    the mess clear away. In Linux, there is a separate directory called /etc/group
    that will store all the information related to user groups. 
    Below we give the command that can be used to add the new group. Follow
    along: 
    linuxexample @ host : add GID 378 3
    After entering the command, you can cross-check in the /etc/group to
    confirm whether a group is created or not.

    Download 6,34 Mb.
    1   ...   150   151   152   153   154   155   156   157   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish