deleted or moved. So obviously a lot of hackers replicate the data into their
servers or physical devices using the cp command.
Below we give an example for cp command in detail:
vulnerhost @ example: cp songs to movie s
13) chmod to Change Permissions
Linux uses permissions to make things work in a better way. Usually, only
root users can modify any file or directory that is present. Sometimes
hackers will get access to the system but will get unsuccessful in
performing system tasks due to no valid permissions.
However, Linux provides a command called as chmod that can be used to
change permissions or give access to your files to other users. However,
remember the fact that the root user can have access to all of your
information.
Below we explain with commands about this functionality in detail:
vulnerhost @ example: chmod +x songsdir to movies
14) Find Files
It's usually difficult to find files in Linux than in Windows because it uses a
separate file system, unlike windows that sort out files easily. Certain
commands can be used to find the file you are looking for easily.