Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet168/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   164   165   166   167   168   169   170   171   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

10) Exit
A shell window is complex and deals with a lot of tasks. However, when
you complete the task it is a good practice to exit the shell. If not, the
processes would still be running and may result in unnecessary system
power consumption. For this, a quick command called exit has been
introduced in the shell language for this exact reason. 
Exit command also clears all the tasks that are present. So, make sure that
everything is fine before making this happen. You can also exit individual
processes or programs with a shell script.
Below is a simple command example for exit:
example@ linuxwar : exit shell.sh
11) Export
Usually when the system boots up the first shell command is created in the
kernel system. This is called a parent shell. And the next ones that followed
are called child shells unless the parent shell is exited or killed. 
So, while working with the different numbers of shells we will deal with a
lot of variables. And sometimes we may need the same variables that we
used in the other shell environments. For this exporting of variables, the
shell provides us with an export option. 
After using the export command all the child shells can use the parent
variables. However, remember that the child shells cannot use their sibling's
variables that are the other child shells that are present. 
Here is an example that demonstrates this process:


example@ linuxwar : export example.sh to /etc/di r
12) Kill
Killing processes is an important skill to learn for hackers. Processes have
three distinct distinctions. One of them is an interaction that is a usual shell
interface. The second one is a batch process where everything that needs to
be applied is done in a sequential process. And the last one is monitoring
the process where everything that is being done is monitored. For example,
a task management system. 
When you are running a bunch of these processes you may get distracted
with signals that they come with. For this reason, killing processes is a good
process if you find that they are unnecessary. When you are trying to
exploit a system you need to kill the antivirus process that is running in the
background. You can even use the killing process to stop the logging files
that record your every move. 
Below is the simple demonstration of kill command: 
example@ linuxwar : kill process
example@ linuxwar : killall
13) Read
Read command can be used to read the bash scripts when you are
performing the tasks. Or it can be even used to perform a thorough check of
the shellcode that has been written. Read statement is a basic shell
command and can help hackers interpret and cross-check things easily. 
Here is the command with an example:
example@ linuxwar : read bash.sh
14) ulimit
Priority is one of the most underused functionalities of the shellcode.
Priority can be both incremental and decrement also. By using ulimit the


hacker can increase or decrease the priority of the process. 

Download 6,34 Mb.
1   ...   164   165   166   167   168   169   170   171   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish