1 00:00:10,100 --> 00:00:16,970 In the last lecture, these are the basic commands in college, in this lecture, we saw some advanced 2 00:00:16,970 --> 00:00:19,930 commands that are required for ethical hacking. 3 00:00:20,690 --> 00:00:25,490 So without wasting any much time, let us get back to Akali Machine. 4 00:00:30,840 --> 00:00:38,220 As you yevsey am on the virtual machine, I create a new folder and name it as Efford. 5 00:00:44,450 --> 00:00:49,610 So I have created a new folder and another new folder, F2. 6 00:00:52,240 --> 00:01:00,070 In the new folder, I will create a document, an empty file, and name it as a file one, not the 60. 7 00:01:05,490 --> 00:01:07,950 Now I will launch the terminal window. 8 00:01:09,390 --> 00:01:16,590 We are at the root of the machine that is Akali, and we will go to college next up, when we hit Ellerslie, 9 00:01:16,590 --> 00:01:19,370 we can see the two folder's F1 and F2. 10 00:01:20,250 --> 00:01:21,810 Let us go to F1 Fulda. 11 00:01:22,350 --> 00:01:28,590 We have seen these basic commands, so I won't be explaining these basic commands again in the less 12 00:01:28,590 --> 00:01:29,670 you have Philabundance. 13 00:01:31,290 --> 00:01:37,170 Now let us move the fight one from Fulda, one to follow to M.V.. 14 00:01:37,170 --> 00:01:42,780 Is the command used to move follow from Formula One to follow two. 15 00:01:44,220 --> 00:01:53,220 But here, since we haven't specified any part, M.V. is you also used to create a copy of the folder 16 00:01:54,480 --> 00:01:56,360 or to rename the folder. 17 00:01:57,270 --> 00:02:02,160 So M.V. file one, not be 60, A.B.C. not 60. 18 00:02:02,160 --> 00:02:09,540 So File will not be 60 has been renamed as A.B.C. that you can see on the screen. 19 00:02:09,540 --> 00:02:16,590 After getting Ellis' we can see file one has been renamed with ABC Dorte. 20 00:02:18,480 --> 00:02:22,080 Now let us again use the movie command. 21 00:02:22,170 --> 00:02:31,680 But in this case we're specifying the part that is EF1, ABC, F2. 22 00:02:32,250 --> 00:02:41,680 Now what this commands is this command actually moves the file ABC text from folder EF1 to folder. 23 00:02:44,010 --> 00:02:49,470 So in the folder F2, you can see that we have the ABC file. 24 00:02:52,640 --> 00:02:55,880 That disclose all the dads and head back to next top. 25 00:03:02,400 --> 00:03:11,860 The next command that they are going to see is touch common touch is used to create a new file. 26 00:03:12,450 --> 00:03:18,720 So since you are in the next of to follow, we will create a new file, X, Y, Z. 27 00:03:20,190 --> 00:03:25,440 So we'll use the command touch X, Y, Z, not to create a new file. 28 00:03:27,860 --> 00:03:37,090 R.M. Command is used to remove the fight we have used R.M. ABC to remove the file from folder F2 and 29 00:03:37,130 --> 00:03:41,210 only file that has left in the folder F2 now is X, Y, Z. 30 00:03:43,130 --> 00:03:46,190 Now command is used to open and edit the file. 31 00:03:46,550 --> 00:03:50,270 So every type Nannerl and then the filename and hit enter. 32 00:03:53,790 --> 00:03:59,290 I am typing hello, we are learning the commands of Kleenex to save the file. 33 00:03:59,310 --> 00:04:02,310 What we have to do is we have to press control or. 34 00:04:08,420 --> 00:04:10,370 You have to control all. 35 00:04:11,400 --> 00:04:17,070 Then press enter and to exit press control x. 36 00:04:18,810 --> 00:04:26,070 So press control or to save the file or to write the contents to the file. 37 00:04:27,250 --> 00:04:38,170 And then press control, access to clues, so the steps are open, the file through NENO, right, something 38 00:04:38,590 --> 00:04:44,800 press control or enter, then press control X and it will get you back to terminal. 39 00:04:46,240 --> 00:04:47,050 So unless. 40 00:04:49,460 --> 00:04:56,400 You are there and we will CPQ Outdoor Cat Command is used to see the contents of that file. 41 00:04:56,990 --> 00:05:06,070 So if we use the come on, get big or we can see that we saw what we entered right now. 42 00:05:06,100 --> 00:05:07,510 You can see it on the screen. 43 00:05:09,050 --> 00:05:11,760 So this was about all hour creating and moving fires. 44 00:05:11,780 --> 00:05:12,670 This is all you need. 45 00:05:12,680 --> 00:05:19,040 You do not need to know more extra detail stuff about copying and moving files. 46 00:05:28,400 --> 00:05:35,150 Now, the next command is you named Ashot, you name stands for the virgin of the operating system we 47 00:05:35,150 --> 00:05:35,690 are using. 48 00:05:41,960 --> 00:05:44,100 The next command is free. 49 00:05:44,510 --> 00:05:51,980 The free tells you the total ram that is used and available right now, but this is not a total ram 50 00:05:52,520 --> 00:06:00,560 to see the total ram on your of your virtual hard disk or the machine, you have to type free Dashty 51 00:06:01,490 --> 00:06:02,700 and then hit enter. 52 00:06:03,200 --> 00:06:04,880 You can see the numbers have changed. 53 00:06:04,910 --> 00:06:06,440 You can see the total ram. 54 00:06:08,910 --> 00:06:13,400 You can see the occupied RAM, used RAM and also the free ram. 55 00:06:19,090 --> 00:06:21,150 Press clear to clear the screen. 56 00:06:25,460 --> 00:06:36,530 Then we will never get to get that password slash FTC, what is all this now, FTC password file stores, 57 00:06:36,530 --> 00:06:39,420 the contents of all the users who are on the system. 58 00:06:40,430 --> 00:06:45,860 You can see, Carly, that is no, I'm the one who is now logged into the user. 59 00:06:46,280 --> 00:06:48,740 These are not actually the physical users. 60 00:06:48,750 --> 00:06:53,650 These are some of the users are also machine created users of procreated users. 61 00:06:54,140 --> 00:07:01,310 So hackers are always interested in slash passwords, slash file that is epis to slash password file 62 00:07:01,760 --> 00:07:04,340 to know the content of who is using the system. 63 00:07:10,070 --> 00:07:18,680 Now we will add a user, let us add a cyber monck, so I would have put out user add cyber monck, make 64 00:07:18,680 --> 00:07:25,370 sure you use the command pseudo pseudo tells the system that you are the super user of the system as 65 00:07:25,370 --> 00:07:25,670 the U. 66 00:07:25,670 --> 00:07:30,920 Stands for super user and pseudo is actually that super user is performing some actions. 67 00:07:31,370 --> 00:07:34,100 So pseudo user add. 68 00:07:35,450 --> 00:07:40,470 But to add to the user you should be present on the home directory. 69 00:07:40,940 --> 00:07:44,330 So pseudo user add Cyberman. 70 00:07:46,700 --> 00:07:50,890 It will ask for your password, give the password and there you go. 71 00:07:50,930 --> 00:07:53,350 User has been added the how to check. 72 00:07:53,810 --> 00:07:55,610 Let us again go to get. 73 00:07:57,380 --> 00:07:59,590 Then we have to give password to the user. 74 00:07:59,600 --> 00:08:07,910 So pseudo password Cyberman now the password for Cyberman is Let's try a random password. 75 00:08:10,640 --> 00:08:14,160 Retype the password, and they were password updated successfully. 76 00:08:14,930 --> 00:08:17,600 Now user is added successfully. 77 00:08:18,560 --> 00:08:23,650 Now let us check with the cyber monk named User is added how to check. 78 00:08:24,210 --> 00:08:27,560 You have to go to get it easy. 79 00:08:27,830 --> 00:08:29,000 Slash password. 80 00:08:33,030 --> 00:08:40,050 But the then you go on the last line, you can see the user which created just now has been added. 81 00:08:40,770 --> 00:08:49,350 That is fiber, Molk, that is clear the screen another to see how to remove the same user. 82 00:08:52,970 --> 00:08:59,150 Sulu use a deal that is delete dash are Cyber Cyberman. 83 00:09:01,050 --> 00:09:04,290 You can see that cyber war will spoil something not found. 84 00:09:11,840 --> 00:09:16,100 Let again go to guy slash, slash the bloody. 85 00:09:19,710 --> 00:09:25,120 Then Abar grip cyber monck and then hit Enter. 86 00:09:25,560 --> 00:09:28,770 This is the actual command to remove the user. 87 00:09:34,340 --> 00:09:40,770 Let us again navigate to get past the beauty and then we will hit enter. 88 00:09:41,300 --> 00:09:46,190 You can see Cyber Monck has been deleted, the user has been deleted by us. 89 00:09:48,430 --> 00:09:52,620 It is clear the screen and see some different commands. 90 00:09:58,370 --> 00:10:03,980 There is go to see backstop and let us navigate to follow after. 91 00:10:06,760 --> 00:10:11,920 In order to we have to file you are dirty and expose a dirty. 92 00:10:12,880 --> 00:10:18,730 Now, these commands are the most important commands that about permissions you can see because you 93 00:10:18,730 --> 00:10:22,710 are not being fed, has only read and write commands for the user. 94 00:10:23,380 --> 00:10:29,860 It has only read commands from four groups and it has only read commands for others. 95 00:10:30,130 --> 00:10:40,240 So see it more is the command that is used to assign permissions of read, write and execute so you 96 00:10:40,240 --> 00:10:45,650 can see the syntax, see more reference operator mode. 97 00:10:45,880 --> 00:10:51,580 And finally, we will follow this syntax to give permissions to file names. 98 00:11:00,100 --> 00:11:01,600 Let's start giving permissions. 99 00:11:07,660 --> 00:11:12,580 You get all at its user group and others. 100 00:11:16,190 --> 00:11:21,770 Plus is the operator, which is used to assign something, minus is the operator, which is used to 101 00:11:21,770 --> 00:11:22,670 give permission. 102 00:11:23,990 --> 00:11:27,350 So now let us give permission to some fines. 103 00:11:38,510 --> 00:11:43,800 The references are used to distinguish the users to whom the permissions apply. 104 00:11:44,150 --> 00:11:52,370 That is a list of letters that specifies whom to give the permissions you stands for user or the owner. 105 00:11:52,370 --> 00:11:53,650 That is the file owner. 106 00:11:54,230 --> 00:12:02,090 G is users who are members of the group, that is the group or stands for the others. 107 00:12:02,090 --> 00:12:06,440 That is users when neither files owner nor the members of the file group. 108 00:12:07,490 --> 00:12:10,880 Now let us take the command S.H. more. 109 00:12:13,570 --> 00:12:18,430 You equal to X, that is I am giving user or. 110 00:12:19,550 --> 00:12:24,440 Owner of the group to execute the file pick, you are dirty. 111 00:12:25,310 --> 00:12:34,640 Now you can see user only has dash dash X, which means users now can only execute the file fake Ewha. 112 00:12:40,270 --> 00:12:42,730 After applying the command user. 113 00:12:44,020 --> 00:12:50,740 We can see that peak you are now only has minus minus X, Dashti X, come on. 114 00:12:53,380 --> 00:12:56,770 So you can see Ellis Nash. 115 00:12:57,950 --> 00:13:05,210 And we can see Pequod has only the commands for the user who can execute the command. 116 00:13:05,940 --> 00:13:15,810 We will assign S.H. more you is equal to our W, X and the filename X, Y, Z dot, which means we are 117 00:13:15,810 --> 00:13:19,770 giving user all the three permissions to really write and execute. 118 00:13:20,970 --> 00:13:26,560 You can again see that now X, Y, Z user has our W, X permissions. 119 00:13:27,480 --> 00:13:32,160 So these are the advanced commands that you need to know which political hackers.