example@ linuxwar : export example.sh to /etc/di r
12) Kill
Killing processes is an important skill to learn for hackers. Processes have
three distinct distinctions. One of them is an interaction that is a usual shell
interface. The second one is a batch process where everything that needs to
be applied is done in a sequential process. And the last one is monitoring
the process where everything that is being done is monitored. For example,
a task management system.
When you are running a bunch of these processes you may get distracted
with signals that they come with. For this reason, killing processes is a good
process if you find that they are unnecessary. When you are trying to
exploit a system you need to kill the antivirus process that is running in the
background. You can even use the killing process to stop the logging files
that record your every move.
Below is the simple demonstration of kill command:
example@ linuxwar :
kill process
example@ linuxwar : killall
13) Read
Read command can be used to read the
bash scripts when you are
performing the tasks. Or it can be even used to perform a thorough check of
the shellcode that has been written. Read statement is a basic shell
command and can help hackers interpret and cross-check things easily.
Here is the command with an example:
example@ linuxwar : read bash.sh
14) ulimit
Priority is one of the most underused functionalities of the shellcode.
Priority can be both incremental and decrement also. By using ulimit the
hacker can increase or decrease the priority of the process.