a) When we enter ps command we will get total processes that are running.
The first line describes the names of the
process and the PID that is
assigned to them.
What is PID?
Like User I'd (UID) we have discussed before PID is a number that is
assigned to a particular process. These are not permanent and will get
collapsed
when the process ends, unlike permanent UID.
b) The second line describes the initiation time of the process and the
percentage of the system power it is consuming. This is important for
hackers because whenever a process is taking a lot of system power one can
end it easily using the kill command which
we will describe in the next
section.
c) The third line can be used to declare priorities for the processes. For
example, when you are performing exploitation and backup at the same
time you can give priority to one of them as you wish to give more system
resources. This will help hackers when they are doing injections to a lot of
databases or networks.
And at last, we will learn about the termination of processes. A lot of
processes can decrease the system efficiency and will make Linux buggy.
So, for a certain interval of time, you need to kill some processes by using
the kill command. Kill command will stop
all the processes at once by
using killall or will just end the process you want to.
Below is a command that explains how kill works:
vulnerhost @ example: kill example process
d) You can even restart the killed processes for once using the same
command. This just acts like a recycle bin for the processes.
vulnerhost @ example :
restart exampleprocess
With this, we have completed our brief explanation about process
management and for hackers, this is important and can help them use their
resources efficiently.
In this chapter, we have given a brief introduction
to important building
structures of Linux that are user management, file management,
and process
management. In the next chapter, we will learn about scripting and in