Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet162/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   158   159   160   161   162   163   164   165   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

Commands for process management 
Usually, the Linux system runs an abundant number of processes. When
you start and boot up into the system tens of programs get initiated. It may
be an antivirus or backup system software. To look at all of the processes
that are running in the system you may enter ps command with parameters.
vulnerhost @ example: ps PID 34534
Some of the parameters that are present are listing, displaying process id
and CPU percentage used. You can even make processes sleep, pause and
give priorities. We will discuss some of them in detail here:


a) When we enter ps command we will get total processes that are running.
The first line describes the names of the process and the PID that is
assigned to them. 
What is PID?
Like User I'd (UID) we have discussed before PID is a number that is
assigned to a particular process. These are not permanent and will get
collapsed when the process ends, unlike permanent UID. 
b) The second line describes the initiation time of the process and the
percentage of the system power it is consuming. This is important for
hackers because whenever a process is taking a lot of system power one can
end it easily using the kill command which we will describe in the next
section.
c) The third line can be used to declare priorities for the processes. For
example, when you are performing exploitation and backup at the same
time you can give priority to one of them as you wish to give more system
resources. This will help hackers when they are doing injections to a lot of
databases or networks. 
And at last, we will learn about the termination of processes. A lot of
processes can decrease the system efficiency and will make Linux buggy.
So, for a certain interval of time, you need to kill some processes by using
the kill command. Kill command will stop all the processes at once by
using killall or will just end the process you want to. 
Below is a command that explains how kill works: 
vulnerhost @ example: kill example process
d) You can even restart the killed processes for once using the same
command. This just acts like a recycle bin for the processes. 
vulnerhost @ example : restart exampleprocess
With this, we have completed our brief explanation about process
management and for hackers, this is important and can help them use their


resources efficiently. 
In this chapter, we have given a brief introduction to important building
structures of Linux that are user management, file management, and process
management. In the next chapter, we will learn about scripting and in
Download 6,34 Mb.
1   ...   158   159   160   161   162   163   164   165   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish