Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
69
understand how the OffSec training materials are presented and how we might approach
learning.
For this next section, please keep in mind that it is fine if the content is more technical than what
you feel you are ready for or if you are not able to follow along. For example, we’re going to start
off by saying “Every file on a Linux machine has a number of properties associated with it.” It is
fine if, as a reader, you don’t know what a Linux machine is yet, or what properties are, or even
what files are.
We’ll try and keep things pretty basic for a while, and then we’ll go a little deeper. If you’re a bit
more experienced in Linux, you may enjoy the puzzle that we work through as we go on.
Again, the purpose here isn’t actually to learn about the executable portion, but to have an
example so that we can discuss how we might approach teaching such a subject.
This Learning Unit covers the following Learning Objectives:
1.
Review a sample of learning material about the executable permission, expand beyond the
initial
information set, and work through a problem
2.
Understand how OffSec’s approach to teaching is reflected in the sample material
While each student will learn at their own pace, this Learning Unit should take about 30 minutes
to complete.
4.4.1
What is Executable Permission?
Every file on a Linux machine has a number of additional properties associated with it. These
include when the file was created, what user created it, which users have permissions to read that
file, and even the name of the file itself.
File permissions are particularly important. They indicate whether or not we are allowed to either
read, write, or execute a particular file.
We might think of the word
write
in this context as our
ability to make certain changes to a file. This could, for example, be set to not allow us to write to
a file, which might keep that file from being accidentally deleted. The permissions might also be
set to not allow us to read a file that has information in it that we shouldn’t be allowed to view.
These are called the
file permissions
,
157
and they pertain to a few different
types of users who
might be on this computer: the file owner, the user ownership group, and anyone else. These
different classes of users can be given (or denied) permission for each of the three actions above:
read, write, and execute.
For the sake of this Module, we’ll focus only on the owner of the file,
ourselves in this case.
Let’s open a terminal and review how this works in practice. We’ll touch
158
a file (newfilename.txt),
which will create it and automatically make us the owner. Then we’ll use the listing command ls
159
to gather information about the file, providing the -l parameter that
will produce a long listing
including the file permissions.
157
(Study Tonight, 2022), https://www.studytonight.com/linux-guide/understanding-file-permissions-in-linux-unix
158
(Rani, 2021), https://www.geeksforgeeks.org/touch-command-in-linux-with-examples/
159
(Verma, 2021), https://www.geeksforgeeks.org/practical-applications-ls-command-linux/
Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
70
kali@kali:~$
Yüklə
Dostları ilə paylaş: