Time
2 hours 9 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:00
Hello and welcome to this Callie fundamentals lesson. I'm very excited to be here with you today. So what we're getting ready to jump into and what we're getting ready to discuss is how did you manage users in Cali? And so you may be asking yourself, You know, I know that I come in his route. I know that that's the default user. What if I want to add a user for day to day use? Or
00:20
what if I
00:21
want to add a user for testing purposes? Well, now's the time to discuss that. So our lessons lesson objectives today is to walk away with a high level ability to check current users and groups. And so again, you know, we just want to know what's on the system and then the ability to add and delete users.
00:39
So this isn't a long lesson, and we've just got some high points to touch on,
00:43
so let's jump right in.
00:45
So when we're wanting to check users and groups and as they are in the Cali distribution, you're essentially going to be going to this etc. Password files, so you'll go to the Etc directory, and there's a file they're called past W D. And what you can do is you can run contaminate against that or the group file,
01:03
and it'll give you these outputs here so you'll notice.
01:06
On this end, we went to the Etc. Directory using that CD command. And then from there, what you'll do is you'll notice that we ran cat password. Now, if you look over to the left of this line, you'll see that we've got cysts and Ben and Damon and root these air, all users on the system and some of these air running,
01:26
you know, in some of these areas, with no log in permissions as it states over here.
01:30
And so we can't log into those users. So they're they're really for service purpose or some other purpose. And then when we did the same thing with the group file, you'll notice here would ran Cat Against Group in that same etc. Folder. It shows us again the current groups that air in our distribution, so
01:48
not a lot there. It's really just, you know, going to that particular file on being able to see what's on the system. So as you
01:55
continue to work through listening sir, if you use it day today,
01:57
and you feel maybe there's a user on the system that you need to check into or that you may not have been aware of her. If you just check regularly, you can use these two locations to give you a better idea of you know what's going on in your distribution or to ensure that you've, you know, added a user correctly. So let's go ahead and talk about that for a moment as well.
02:17
So when we look at adding and deleting users,
02:20
what you've got here is the ad User Command and the user delete Commander del Command, and that here, this is just where you replace user name with the actual user name. So as you can see here, we were still in that Etc folder and we were able to execute the ad User command and we added a test user and it went through each of these areas,
02:38
you know, describing what was adding the user and in the group it created a home directory, as you can see here
02:45
and then it asked us for a password, which we just did test in this case and then it ask for all this information to describe the user. And then at the end, it designates whether or not it's correct. And so once you go through that process and we went back to that passed a beauty
03:00
file and we did a cat again, we'll see here at the end that we now have a test user.
03:06
So when we then on the other side of that run the user del command and we put test on the end, as you can see here it runs. It doesn't give you any feedback if the entry was correct. But then we'll see once we look in that past a beauty file again, that the test user is no longer there.
03:25
So with those things in mind, let's just do a real brief check on learning. So what is the name of the file containing current users? And so we talked about
03:37
two types of files that had some information in them. Which one had current users?
03:45
All right, so looking at the options that we have here, sssh, configures it config file. So there's definitely not user information and that we didn't talk about a user's file or anything of that nature. We did talk about group, but again, in this particular file,
04:02
it has group information.
04:04
And the past W D file contained a lot of information to include current users. So if you guessed passed a beauty, you did an excellent job there. So again, this was a brief lesson we didn't want to get too deep into,
04:20
uh, you know, users and adding in the leading users just really ah, high level way that you can start to manipulate users
04:27
if you need them for testing purposes or if you're going to create an account for day to day purposes.
04:32
And so we learned how to check those users and groups using that passed a beauty in group files in the Etc directory. And then we talked about how to add and delete users. So I want to thank you for joining me today, and I look forward to seeing you again soon.

Up Next

Kali Linux Fundamentals

In this Kali Linux training course you will learn about the industry standard tool for penetration and security testing.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor