• 12) Copy Directories
  • 13) chmod to Change Permissions
  • 14) Find Files
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet158/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   154   155   156   157   158   159   160   161   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    10) Make a directory 
    We have already described a directory as a file system that hierarchically
    stores files. This mkdir command can be used to create a new directory on
    Ur preferred location .
    vulnerhost @ example: mkdir songs
    11) Delete directories
    Normally hackers delete a lot of directories just for fun. Or sometimes they
    do it to keep their traces off. By using rmdir you can easily delete the
    directory you prefer.
    Below is an example that explains the command in detail:
    vulnerhost @ example: rmdir songs
    12) Copy Directories
    Replication is one of the important concepts that hackers need to learn and
    should be perfect at. When you attack and get access to the system you will
    look for sensitive information such as usernames, credit card names that lie
    in the system. System administrators would get alert if any of the data is


    deleted or moved. So obviously a lot of hackers replicate the data into their
    servers or physical devices using the cp command. 
    Below we give an example for cp command in detail:
    vulnerhost @ example: cp songs to movie s
    13) chmod to Change Permissions 
    Linux uses permissions to make things work in a better way. Usually, only
    root users can modify any file or directory that is present. Sometimes
    hackers will get access to the system but will get unsuccessful in
    performing system tasks due to no valid permissions. 
    However, Linux provides a command called as chmod that can be used to
    change permissions or give access to your files to other users. However,
    remember the fact that the root user can have access to all of your
    information.
    Below we explain with commands about this functionality in detail:
    vulnerhost @ example: chmod +x songsdir to movies
    14) Find Files
    It's usually difficult to find files in Linux than in Windows because it uses a
    separate file system, unlike windows that sort out files easily. Certain
    commands can be used to find the file you are looking for easily.

    Download 6,34 Mb.
    1   ...   154   155   156   157   158   159   160   161   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish