5 hours 21 minutes
Hello and welcome to command line basics. In this video, we're gonna learn about Lennox System commands one. I'm Christopher Heller, and let's begin
are learning objectives for this video. We're gonna learn a little bit more about the pseudo command to kind of refresher learning the apte get command, understand that. Who am I? Come in and understand the you name command as well.
All right, pre assessment. Using the pseudo command allows users to run programs as route. Is this true or false?
The answer is true. We learned about this in the previous video where you need to use the pseudo command if you need to have those elevated privileges in order to install commands, install new programs and run these functions as route.
So just like we learned before, the pseudo command runs commands as root. And it's very important to make sure that if you're running through errors that you know should work properly, make sure you're running these commands as route, so make sure you're using the pseudo command.
I can't tell you how many times from my personal experience where I was able thio solve a problem with either a, uh,
a user or myself where I realized that I was not running a command as I wasn't using the pseudo.
So keep that in mind. Always use that first during your trouble shooting,
all right, and that we have the act. Get command Now, what this does is it allows you to install new packages, new programs for your linen installation that you may not have already.
You can also list and search for available packages as well.
So, uh, and keep in mind usually need root permissions in order to be able Thio, you know, install these as well. So let's give a quick demonstration
so on to you
list for a program called X Turn.
And as you can see, it has this installed in there as well already. So already have this program installed. Now let's say I want a program called Terminator
and you can see it does not have that installed in there as well. So in order to install this war in a type pseudo
it's gonna ask forthe you pseudo password,
make sure it's the right one,
and then it will run through a bunch of different operations. It will tell you how much it's gonna download, and if you're sure you can hit the enter key
and it'll go through, download all this, install it for you and tell you if there's any any issues or errors while I was setting this up.
it's important to make sure that you're running these as root like we were saying,
and now I can use the Terminator command
and check it out. This is our new program that we just download it
All right, so who am I? Come in now. This is the command to show who the current user is, and it's very useful, especially on like an SS age. Or I tell the connection where you may or may not know exactly, which use your account you're in.
So in order to run, this command will show you exactly which use your account you are using at that time. So it's useful toe no. And, uh, something a tool you're gonna use quite often while you are on the shell. So as you can see
rocket type, who am I? And it says I am user.
And, as you can tell already from the shell we are user at user virtual machine, which is the name of this machine.
Now, let's say if I ran pseudo who am I?
Comes as route because we were running this. Who am I? Command under Pseudo. So it's running as route. So that *** in my command said, Hey, your route Because route is running this command,
then we have the you name commandos. Well, what this does that helps displays all the Lenox system properties as well? And we can use the dash A for all so we can get all the information about our current Lennix installation and use that to our advantage. Or if we were an attacker, did
maybe even help find any vulnerable applications. Vulnerable service is,
you know, any colonel exploits that may be active for that specific Lennox distribution.
So come over here and we're gonna type in
and union. Just by itself is going to say, Hey, you have lyrics. So do dash A and this will give us way. More information about our machine. This is our machine name. User. Virtual machine was stolen. I created when I created this virtual machine will show us our Colonel
and when it was installed, this well.
So this is important to keep in mind. And, you know, it's a useful from a penetration tester perspective, this wall, so you could hopefully try and find any exploits.
All right, Post assessment. Which command would search through available packages for a terminal program? Is it 1/2 to get terminal,
be CEO, have to get terminal.
See? Absent list terminal or D Act dash dash list terminal.
The answer is C act list terminal. So this will allow you to search through any distribution information for program named Terminal
he asked. Get terminal for A and B are used to install a program named Eternal and the apt dash dash list terminal is not a valid command for the APP command.
All right, so in this video we learned the pseudo command When the app get command, understood the who in my command and understood the union command as well. And I hope to see you in the next video
SOC Analyst Assessment Level 1
Cydefe's SOC Analyst Assessment, Level 1, Capture-the-Flag (CTF) Assessment
How to Use GDB (BSWJ)
The GNU Debugger (GDB) is one of the most commonly-used debugging tools in the world. ...
Certificate of Completion Offered