2) Change password
The password is the single pathway to access all the directories and files in
the user system. You can use the following command to give a password to
the user.
linuxexample @ host : pw UID 2435 to strange
It should be remembered that ordinary users cannot use their username as
the password. However, root users do not apply to this condition.
3) Modify the user
Modifying is always a preferable option for hackers. Hackers usually insert
an exploit or trojan in the directories and try to spread them into the whole
system. For this reason, hackers should be aware of modifying a system.
user mod command is one of the most important
commands that can be
used to modify the home directories that are present. You can also use grep
command to display the content that is present in the system directory .
- m option can be used to change the default directory of the user so that
everything present in this directory has advanced privileges.
4) Delete the user
Sometimes hackers after getting what they want from the system will try to
delete the user system to delete any log files that may be used to detect the
attacker's identity. This is one of the most important commands to learn if
you are looking to attack systems with huge security.
By using the user del command as shown below you can delete the normal
user and if it is performed by the root user he
can delete any user that is
present in the system.
linuxexample @ host : UID del 239844
5) Add group
User Groups are created to make things easy for the administrators to make
the mess clear away. In Linux, there is a separate directory called /etc/group
that will store all the information related to user groups.
Below we give the command that can be used to add the new group. Follow
along:
linuxexample @ host : add GID 378 3
After
entering the command, you can cross-check in the /etc/group to
confirm whether a group is created or not.