1 00:00:00,060 --> 00:00:03,550 All right, folks, I hope you're enjoying the cause so far. 2 00:00:04,200 --> 00:00:12,480 Now, this is something where you would be going a bit more on the higher level reason you would be 3 00:00:12,480 --> 00:00:20,300 understanding more about the potions and how granting the permissions to any file really works. 4 00:00:20,850 --> 00:00:28,140 So it's a really, really important part of any cybersecurity or information security paradigm, because 5 00:00:29,460 --> 00:00:37,470 when you allocate certain restriction or certain permissions to a file, you actually achieve more towards 6 00:00:37,470 --> 00:00:46,410 the confidentiality of cybersecurity, because if you don't have proper confidentiality, you cannot 7 00:00:46,410 --> 00:00:48,030 achieve the access control. 8 00:00:48,420 --> 00:00:55,490 You should assure that these certain files can only be accessed by a certain group of people or person. 9 00:00:55,800 --> 00:00:56,120 Right. 10 00:00:56,610 --> 00:01:07,140 So just like in our in our regular example, we allow only certain, certain, you know, certain resources 11 00:01:07,140 --> 00:01:10,930 to be allocated for a few people right. 12 00:01:11,250 --> 00:01:13,970 In my my home or your home as well. 13 00:01:14,250 --> 00:01:21,900 Only a few people are allowed to access to your bedroom and very few maybe you you will be allowed to 14 00:01:21,900 --> 00:01:22,880 open up your wardrobe. 15 00:01:22,890 --> 00:01:23,070 Right. 16 00:01:23,940 --> 00:01:33,780 So exactly the same way when you have files in your directories, you can specify or the permissions 17 00:01:33,780 --> 00:01:37,200 for individual files about who can really access. 18 00:01:37,710 --> 00:01:38,060 All right. 19 00:01:38,370 --> 00:01:41,860 So let's let's understand how that really works. 20 00:01:42,360 --> 00:01:49,640 So for permission, if we understand based on the example, with the moment we do the analyst minus 21 00:01:50,250 --> 00:01:55,860 and test test minus text file you might have seen earlier as well. 22 00:01:56,010 --> 00:02:03,150 Whenever we have done the this Discman, we get to see the you know, the initial privileges. 23 00:02:03,480 --> 00:02:08,600 These indicates what are what all privileges we have for a specific file. 24 00:02:08,610 --> 00:02:08,830 Right. 25 00:02:09,360 --> 00:02:15,360 So that's where the AH represent the read W represents the right. 26 00:02:15,640 --> 00:02:23,840 That means some the person can write the file and the X represent you can execute the file into these 27 00:02:23,880 --> 00:02:28,260 files belongs to any process shall Python script or any sort of stuff. 28 00:02:28,530 --> 00:02:28,870 All right. 29 00:02:29,130 --> 00:02:32,870 So if you look at it, the first segment indicates the admin privileges. 30 00:02:33,510 --> 00:02:35,940 Second, indicate your privileges for group. 31 00:02:36,270 --> 00:02:42,030 So if you look at the privileges for the admin, it can write, it can read, sorry, you can write 32 00:02:42,300 --> 00:02:43,880 and it can execute the file. 33 00:02:44,040 --> 00:02:48,340 But when you look at the group, it can execute the file and read the file. 34 00:02:48,900 --> 00:02:55,030 If you look at the third one that belongs to the public now you see and you would be amazed as well 35 00:02:55,740 --> 00:02:57,200 and to execute the file. 36 00:02:57,660 --> 00:02:57,930 Right. 37 00:02:58,200 --> 00:03:02,340 So this is where the force indicates the admin group public. 38 00:03:02,340 --> 00:03:05,250 Remember, the structure admin is the one. 39 00:03:05,730 --> 00:03:08,760 It's okay to have all the privileges for the admin. 40 00:03:08,760 --> 00:03:09,080 Right. 41 00:03:09,480 --> 00:03:13,940 It is okay for certain group to have access to execute. 42 00:03:13,950 --> 00:03:14,400 All right. 43 00:03:14,520 --> 00:03:16,290 Exercisable for public. 44 00:03:16,290 --> 00:03:19,110 It is good to have just read X's sometime. 45 00:03:19,110 --> 00:03:19,410 Right. 46 00:03:19,860 --> 00:03:21,590 Or in fact quite often as well. 47 00:03:22,140 --> 00:03:23,820 So this is the example. 48 00:03:24,240 --> 00:03:33,840 Now let's understand what exactly you need and how you can actually Grandy's your required privileges 49 00:03:34,080 --> 00:03:36,510 to any certain file in any sort of file. 50 00:03:36,960 --> 00:03:42,990 So before we really understand, we need to understand how that really works, how the how the command 51 00:03:42,990 --> 00:03:44,070 really works for them. 52 00:03:44,310 --> 00:03:47,340 OK, so let's change the permission of the funnel. 53 00:03:47,790 --> 00:03:53,790 So for every permission, for every privilege, there is a number assigned to it. 54 00:03:54,030 --> 00:03:58,400 And based on that number itself, your command will be defined. 55 00:03:58,920 --> 00:04:03,420 So for execution, for executing any file, the number is one. 56 00:04:03,510 --> 00:04:11,070 Remember this value, this is the value will be using it for creating, for creating the final output 57 00:04:11,400 --> 00:04:11,820 the final. 58 00:04:11,820 --> 00:04:15,240 And I'll tell you what exactly it is for right at this. 59 00:04:15,240 --> 00:04:18,320 Do four read it is for OK. 60 00:04:18,900 --> 00:04:26,040 Now in our structure we have admin, we have our group and we have public. 61 00:04:26,340 --> 00:04:29,220 Now we need to have our admin as it is. 62 00:04:29,220 --> 00:04:33,030 We need all the privileges for admin that he can feed. 63 00:04:33,360 --> 00:04:36,690 He can write, he can execute for group. 64 00:04:36,690 --> 00:04:42,480 We want him to read and write and for public, we just want him to read. 65 00:04:42,650 --> 00:04:43,520 That's right. 66 00:04:44,010 --> 00:04:46,870 So this is how it looks, admin group and public. 67 00:04:47,250 --> 00:04:50,660 So let me tell you how exactly we are going to meet. 68 00:04:51,330 --> 00:04:56,850 So in order to have admin to get the permission, we need all of this. 69 00:04:56,860 --> 00:04:59,680 So we have four plus. 70 00:04:59,930 --> 00:05:04,810 Two plus one that comes to seven, isn't it? 71 00:05:06,890 --> 00:05:11,720 My math, it's pretty brading, is quick group. 72 00:05:12,020 --> 00:05:17,090 We want the permission to be, let's say, read and write. 73 00:05:17,330 --> 00:05:23,270 So four plus two, that equals to six. 74 00:05:25,150 --> 00:05:32,680 And for public, I just want him to read for public access, maybe anybody, you know, the access, 75 00:05:32,680 --> 00:05:35,690 he should only be able to read the file. 76 00:05:35,920 --> 00:05:42,750 He should not be able to execute or write and write the file, basically, or modify the file. 77 00:05:43,300 --> 00:05:44,710 So it should be just for. 78 00:05:45,770 --> 00:05:54,230 That's for right, so the final value is seven, six, four, OK, now will be executing will be assigning 79 00:05:54,670 --> 00:05:56,510 the exact command. 80 00:05:57,230 --> 00:06:03,530 So in order to change the permission of any file, you just need to go to the Karley in the Seelie and 81 00:06:03,530 --> 00:06:06,930 type of command CMH mode Hammoudi. 82 00:06:07,460 --> 00:06:14,290 So this is the change mode and start with change mode and then you specify the privilege. 83 00:06:14,510 --> 00:06:20,720 So then it would be seven, six, four, OK, and then you specify the filename. 84 00:06:20,720 --> 00:06:23,350 Let's to test Dorte. 85 00:06:24,800 --> 00:06:28,670 I'm sorry the extent that it's so easy. 86 00:06:29,000 --> 00:06:29,360 Right. 87 00:06:29,360 --> 00:06:38,150 But it is so now it is so complicated out there on the Internet that sometimes you feel it is it is 88 00:06:38,150 --> 00:06:39,080 difficult to digest. 89 00:06:39,080 --> 00:06:47,210 Sometimes I hope you got the idea and executed in the real life and you get more clarity about it. 90 00:06:47,360 --> 00:06:55,750 OK, so let me log in to the galley that you define, OK? 91 00:06:55,760 --> 00:06:57,940 And let's see what all we have. 92 00:06:57,980 --> 00:07:00,560 OK, and in this case. 93 00:07:03,450 --> 00:07:06,030 Let me see the full privileges. 94 00:07:07,470 --> 00:07:11,960 This is what it is best for Roger to see. 95 00:07:12,040 --> 00:07:13,570 This is the privileges for it. 96 00:07:14,280 --> 00:07:17,700 Now I want to sign the privileges to it. 97 00:07:18,090 --> 00:07:20,070 So exactly the same way. 98 00:07:20,070 --> 00:07:23,550 I want to sign seven, six, four, because I want the Edman. 99 00:07:24,000 --> 00:07:25,680 In our case, it is just. 100 00:07:28,490 --> 00:07:34,470 Admin can read and write and then group can read public, and that's it. 101 00:07:35,270 --> 00:07:42,100 We just want to allocate more permissions, more privileges to this file so we can make use of SUDEP, 102 00:07:42,650 --> 00:07:47,870 see it mode and then seven, six, four, seven, six, four. 103 00:07:48,530 --> 00:07:52,370 And then the filing test for Roger. 104 00:07:53,670 --> 00:07:56,040 The extent that's done. 105 00:07:56,070 --> 00:07:58,740 Oh, my buzzer lovely. 106 00:07:58,800 --> 00:08:01,280 Now let's see if anything has been changed. 107 00:08:02,570 --> 00:08:03,270 Wonderful. 108 00:08:03,290 --> 00:08:05,450 You see, the privileges has been changed. 109 00:08:06,800 --> 00:08:07,260 All right. 110 00:08:07,550 --> 00:08:08,750 Isn't it really cool? 111 00:08:09,020 --> 00:08:09,390 Right. 112 00:08:09,740 --> 00:08:19,190 So I hope you got the idea and I hope you got the clarity how the permission or granting the privileges 113 00:08:19,190 --> 00:08:19,850 really works. 114 00:08:20,480 --> 00:08:21,300 Thank you so much. 115 00:08:21,590 --> 00:08:22,760 We'll catch you in the next one.