Examining Data About the Linux System

As part of my journey in cybersecurity, I have learned about the complexity of Linux systems. Both system administration and security assessment require a thorough understanding of a system’s design, operations, and configurations. Here’s a quick list …


This content originally appeared on DEV Community and was authored by Urah

As part of my journey in cybersecurity, I have learned about the complexity of Linux systems. Both system administration and security assessment require a thorough understanding of a system's design, operations, and configurations. Here's a quick list of some of the most significant Linux commands I have learned.

Fundamental System Details
whoami: Instantaneously show the active username. It is important to know what privileges you might have while gaining access to a system.

whoami

Whoami is extended with id, which shows the user's ID and group memberships. When auditing account permissions, this information is quite helpful.

The hostname of the system you are currently logged into is printed or set. Easy to use but efficient for machine identification.

uname: This command yields comprehensive system information, including the name and version of the kernel and hardware specifications. When evaluating possible kernel vulnerabilities, the -a flag is useful because it shows all accessible information.

uname -a

Networking Insights

ifconfig: For viewing and configuring network setups and network interface settings. It is necessary for diagnosing problems with networks.

ifconfig

ip: You can control network interfaces, routing, and tunnels with this more contemporary option to ifconfig.

ip a

Network status is shown via netstat, which also shows connections, routing tables, and interface information.

netstat -tuln

Another excellent tool that provides thorough information for examining sockets and network connections is ss.

ss -tuln

Handling Devices and Processes

  1. ps: Provides a list of active processes, which is helpful for debugging and keeping track of system activities.
ps aux
  1. lsblk: Provides details about block devices and a storage device hierarchy.
lsblk
  1. lsusb and lspci: These commands help identify connected hardware by listing USB and PCI devices, respectively.
lsusb
lspci
  1. Lists of open files, or lsofs, are useful for troubleshooting system problems and looking into possible security risks.
lsof

Getting Remote Access using SSH

One essential piece of technology that allows for safe remote access to Linux computers is SSH (Secure Shell). For those working in the disciplines of system administration and cybersecurity, it is an essential tool. One needs to be able to use SSH to log in and run commands remotely in order to perform system administration duties.

ssh username@remote_host

With these tools, I’m building a strong foundation in Linux system management, which is crucial for both day-to-day operations and security assessments. This knowledge will also aid in discovering vulnerabilities and misconfigurations that could lead to privilege escalation—a critical skill in penetration testing

Conclusion

Mastering these Linux commands is just the beginning of my cybersecurity journey. If you're also exploring Linux or cybersecurity, I'd love to hear your thoughts! What are your go-to commands? Connect with me on Twitter and let’s share knowledge.


This content originally appeared on DEV Community and was authored by Urah


Print Share Comment Cite Upload Translate Updates
APA

Urah | Sciencx (2024-08-16T09:08:26+00:00) Examining Data About the Linux System. Retrieved from https://www.scien.cx/2024/08/16/examining-data-about-the-linux-system/

MLA
" » Examining Data About the Linux System." Urah | Sciencx - Friday August 16, 2024, https://www.scien.cx/2024/08/16/examining-data-about-the-linux-system/
HARVARD
Urah | Sciencx Friday August 16, 2024 » Examining Data About the Linux System., viewed ,<https://www.scien.cx/2024/08/16/examining-data-about-the-linux-system/>
VANCOUVER
Urah | Sciencx - » Examining Data About the Linux System. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2024/08/16/examining-data-about-the-linux-system/
CHICAGO
" » Examining Data About the Linux System." Urah | Sciencx - Accessed . https://www.scien.cx/2024/08/16/examining-data-about-the-linux-system/
IEEE
" » Examining Data About the Linux System." Urah | Sciencx [Online]. Available: https://www.scien.cx/2024/08/16/examining-data-about-the-linux-system/. [Accessed: ]
rf:citation
» Examining Data About the Linux System | Urah | Sciencx | https://www.scien.cx/2024/08/16/examining-data-about-the-linux-system/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.