There is also another feature that will let you run the script with additional
permissions. As we discussed earlier Linux has a set of permissions and if
you don't provide with necessary permissions the script may not run
perfectly. So, to provide permission use the following command
In the next section, we will start discussing the debugging of the shell
scripts. Debugging is one of the most important programming tasks. Even
hackers need to be perfect at this because wrong debugging of code may
result in bad adaptation of the task.
Debugging the shell scripts
Normally when you enter a wrong default command in the script such as
shown below in the code.
vulnerhost @ example: ech 7898
This code will not run and show an error as shown below
the ech command is not found
This is exactly what debugging is. Debugging features informs the user
about the errors in the script.
There are also a lot of shell debugging tools that perform the tasks we do in
a command-line interface. Tools like bashdb are famous for this. In the next
section, we will learn in detail about a handful number of important bash
built-in commands. This section will help hackers understand the basics of
shell programming effectively. Let's go !