Linux Basics for Hackers Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

flashcard set

Earn XP

Description and Tags

Flashcards from the book 'Linux Basics for Hackers'

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Binaries

Files that can be executed, similar to executables in Windows.

2
New cards

Case sensitivity

Unlike Windows, Linux is case sensitive.

3
New cards

Directory

Same as a folder in Windows.

4
New cards

Home

Each user has their own directory, which is generally where files you create will be saved by default.

5
New cards

Kali Linux

A distribution of Linux specifically designed for penetration testing, with hundreds of tools preinstalled.

6
New cards

root

An administrator or superuser account that can do nearly anything on the system.

7
New cards

Script

A series of commands run in an interpretive environment that converts each line to source code.

8
New cards

Shell

An environment and interpreter for running commands in Linux.

9
New cards

Terminal

A command line interface (CLI).

10
New cards

pwd

Returns your location within the directory structure.

11
New cards

whoami

Displays which user you're logged in as.

12
New cards

cd

Changes directories from the terminal.

13
New cards

ls

Lists the contents of a directory.

14
New cards

--help

Displays available help for a command, application, or utility.

15
New cards

man

Displays a manual page for a command, utility, or application.

16
New cards

locate

Searches the entire filesystem and locate every occurrence of a specified keyword.

17
New cards

whereis

Locates a binary file, also returning its source and man page if available.

18
New cards

which

Returns the location of binaries in the PATH variable in Linux.

19
New cards

find

Most powerful and flexible of the searching utilities, capable of searching for a number of different parameters.

20
New cards

grep

Filter searches for particular keywords.

21
New cards

cat

Used for displaying the contents of a file, can also create small files.

22
New cards

touch

Was originally developed so a user could simply touch a file to change details, such as the date created/modified, will also create files by default.

23
New cards

mkdir

Command for creating a directory in Linux.

24
New cards

Cp

Creates a duplicate of the file in the new location and leaves the old one in place.

25
New cards

Mv

Command intended solely for renaming a file.

26
New cards

Rm

Removes a file.

27
New cards

Rmdir

Removes a directory.

28
New cards

head

Displays the beginning of a file.

29
New cards

tail

Displays the last lines of a file.

30
New cards

nl

Displays a file with line numbers.

31
New cards

Sed

Lets you search for occurences of a word or text pattern and then perform some action on it.

32
New cards

Cat

Displays files and creates small files, has limitations when displaying large files.

33
New cards

More

Displays a page of a file at a time and lets you page down through it with the ENTER key.

34
New cards

Less

Command same as more, but with additional functionality. Can scroll through a file at your leisure, as well as filter it for terms.

35
New cards

ifconfig

Tools for examining and interacting with active network interfaces.

36
New cards

Iwconfig

Gathers crucial information for wireless hacking (IP address, MAC address, mode, and more).

37
New cards

Permissions

Assigns a particular level of permission for the different identities using it.

38
New cards

Granting the Root User’s Group Permissions SGID

With, an SGID bit set, someone without execute permission can execute a file if the owner belongs to the group that has permission to execute that file.

39
New cards

The Outmoded Sticky Bit

This allows a user to delete or rename files within that directory.

40
New cards

Special Permissions, Privilege Escalation, and the Hacker

Here, a regular user gains root or sysadmin privileges and the associated permissions.

41
New cards

Updating Packages

Software repositories will be periodically updated with new software or new versions of existing software.

42
New cards

Upgrading Packages

Upgrades the existing packages on your system.

43
New cards

Software download methods

Software package managers (like apt), GUI-based installers, and git clones are the most common and crucial methods for an aspiring hacker to know.

44
New cards

Rsyslog logging rules

Each line is a separate logging rule that says what messages are logged and where they're logged to.

45
New cards

change nameserver DNS

This command echoes the string nameserver 8.8.8.8 and redirects it (>) to the file /etc/resolv.conf, replacing the current content.

46
New cards

zombie process

A process that exhibits this type of behavior is often referred to as a zombie process.

47
New cards

dd

It creates file name physical copies of storage devices without the filesystem or other logical structures, allowing you to recover such artifacts as deleted files.

48
New cards

what in this world is Variable?

The way it works is that the variable name points to data stored in a memory location, which may contain any kind of value, such as an integer, real number, string, floating-point number, Boolean (true or false statement), list, or dictionary.