Chapter 5 - Controlling File and Directory Permissions
:::info
檔案跟資料夾有可能需要一定的權限才能看
Finally, you will see how a hacker’s understanding of permissions might help them exploit a system.
:::
Different Types of Users
root 最全能,它可以做所有事情
JH0-09 changed 10 months agoView mode Like 1 Bookmark
Chapter 3 - Analyzing and Managing Networks
In many situations, you'll be hacking something over a network, and a good hacker needs to know how to connect to and interact with that network.
分析網路資訊
下載工具指令 net-tools
sudo apt install net-tools
ifconfig
ifconfig 命令是檢查和與活動網絡接口互動的最基本工具之一。
您可以通過在終端中輸入 ifconfig 來查詢您的活動網絡連接。
Chapter 2 - Text Manipulation
In Linux, nearly everything you deal with directly is a file, and most often these will be text files.
安裝 Snort
Snort - from NIDS (Network Intrusion Detection System)
Snort是一套開放原始碼的網路入侵預防軟體與網路入侵檢測軟體,而本章會以此作為例子
使用 Ubuntu 下載
確保系統軟體套件清單是最新的。輸入以下命令: