![]() The double dot is an indicator that you can move back from this location. ![]() The single dot is a meta-location, meaning the folder you are currently in. From there, the ls (list) command shows you what's in that (or any other) directory: $ pwd The pwd (print working directory) command tells you what directory you're currently in. ![]() The ls (list) command lists all files in the current directory. To list the files on your computer or device, you generally open a file manager application, whether it's called Explorer (Windows), Finder (Mac), Nautilus (GNOME), Amaze (Android), or anything else. So instead of starting your journey with the shell by learning terminal commands, begin with everyday tasks that you're already familiar with. There are direct analogs for everything you do in a GUI to most of the everyday activities you do in a terminal. While the terminal may seem mysterious and intimidating at first, it's easy to learn once you realize that a terminal uses the same information as all of your usual applications. ![]() That is, this article demonstrates how to use a terminal to move around and browse your computer as you would on a desktop, but from a terminal instead. This article compares navigating a computer desktop without the desktop. As with any new tool, you have to learn the shell before you can do anything useful with it. Because of this direct communication without the intervention of additional applications, using a terminal also makes it easy to script repetitive tasks, and design workflows unique to your own needs. You may be surprised to learn, then, that there's a more direct way to use a computer: a terminal, or shell, which provides a direct interface between you and the operating system. You probably learned how to interact with a computer using a GUI, and you're probably very good at it. How well do you know Linux? Take a quiz and get a badge.Linux system administration skills assessment.A guide to installing applications on Linux.Download RHEL 9 at no charge through the Red Hat Developer program.The potential of BackTrack is enormous given the tools it incorporates, which is why special care should be taken in its use, doing it always from a responsible point of view since some of its functions may infringe on the law. Forensic Tools: A complete analysis of those systems that have suffered from some attack so that the damages caused can be fixed and future attacks avoided.Tunneling: To implement a net protocol over another.Spoofing: The techniques of criminal impersonation such as IP changes, forgery of ARP table, etc.Fuzzers: Tools to look for protocol failures.Exploit Archives: All the exploits are contained here.Enumeration: With the tools included, we will get determined information about the equipment, such as the Kernel, Operating System, etc.The tools we can use with BackTrack are classified according to their functionality into the following groups: Anyway, on the official website, many helpful tutorials are available for the different installation options, use of the unique characteristics of BackTrack, customization of distribution, etc. We have to keep in mind that, in contrast to the great functionalities that BackTrack incorporates, to get good performance, it will be necessary to count on at least some basic knowledge to use them. With BackTrack, we dispose of a wide array of tools that allow us to perform limitless tests, diagnoses, and cross-checks, all related to important aspects when evaluating the information security of analyzed equipment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |