You will be introduced to the Linux operating system and learn how it is commonly used in cybersecurity. You’ll also learn about Linux architecture and common Linux distributions. In addition, you’ll be introduced to the Linux shell and learn how it allows you to communicate with the operating system.
Learning Objectives
- Discuss why Linux is commonly used in the security profession.
- Describe the architecture of the Linux operating system.
- Identify the unique features of common Linux distributions.
- Describe how a shell provides an interface for the user to interact with the operating system.
All about Linux
Video: Welcome to module 2
This section explores the Linux operating system and its use in security. It discusses the architecture of Linux, compares different distributions, and introduces the shell. The author shares their excitement about learning Linux with the reader.
Welcome back! We have another
important topic to explore. Previously, you learned about operating systems
and user interfaces. You learned how operating
systems work and how resources are
allocated in computers. We also reviewed several
common operating systems. You may already have a
favorite operating system. It’s common to hear that
people are fans of one over another, but in
the security world, Linux is commonly used. In this section, you’ll
be learning more about the Linux operating
system and how it’s used in everyday
tasks in security. First, you’ll learn about
the architecture of Linux. After this, we’ll compare the different distributions
of Linux that are available. Lastly, you’ll
explore the shell, a key Linux component that allows you to communicate
with the system. I remember when I
first learned about the Linux OS, and I’m really happy to
explore it with you now.
Video: Introduction to Linux
Linux is an open-source operating system that is widely used in security. It has several unique features that make it well-suited for security tasks, including its open-source nature, its large community of developers, and its wide variety of distributions.
Some of the ways that Linux is used in security include:
- Examining logs to identify suspicious activity
- Verifying access and authorization in identity and access management systems
- Using digital forensic tools to investigate incidents
- Using pen testing tools to look for vulnerabilities
Linux is a valuable skill for security professionals to have, and it is a good choice for both entry-level and experienced security analysts.
Introduction to Linux
Linux is a free and open-source operating system that is widely used in servers, workstations, and embedded systems. It is known for its stability, security, and flexibility.
What is an operating system?
An operating system is the software that manages your computer’s hardware and resources, and provides a platform for running applications. It is responsible for tasks such as:
- Booting up your computer
- Loading and running applications
- Managing files and folders
- Controlling input and output devices
- Providing a user interface
What is Linux?
Linux is a family of Unix-like operating systems that are based on the Linux kernel. The Linux kernel is the core of the operating system, and it is responsible for managing the system’s hardware resources.
Linux is distributed in the form of distributions. A Linux distribution is a collection of software that includes the Linux kernel, system utilities, and a selection of applications.
Some popular Linux distributions include:
- Ubuntu
- Debian
- Fedora
- CentOS
- Arch Linux
Why use Linux?
There are many reasons to use Linux, including:
- It is free and open-source.
- It is stable and secure.
- It is flexible and customizable.
- It has a wide range of distributions to choose from.
- It is widely used in industry.
Getting started with Linux
If you are new to Linux, the best way to get started is to install a Linux distribution on your computer. You can download a Linux distribution ISO image from the distribution’s website and then install it using a bootable USB drive or DVD.
Once you have installed Linux on your computer, you can begin to learn how to use it. There are many resources available online and in libraries that can teach you about Linux.
Some basic Linux commands
Here are some basic Linux commands that you should know:
ls
: Lists the contents of the current directory.cd
: Changes the current directory.pwd
: Prints the current working directory.mkdir
: Creates a new directory.rmdir
: Removes an empty directory.touch
: Creates a new file.cp
: Copies a file or directory.mv
: Moves a file or directory.rm
: Removes a file or directory.sudo
: Allows you to run commands with root privileges.
Learning more about Linux
There are many resources available online and in libraries that can teach you more about Linux. Here are a few suggestions:
- The Linux Documentation Project website has a comprehensive collection of Linux documentation.
- The Linux Foundation website offers a variety of Linux training courses.
- The book “Linux in a Nutshell” is a good introduction to Linux for beginners.
- The book “The Linux Command Line” is a comprehensive guide to the Linux command line.
Conclusion
Linux is a powerful and versatile operating system that can be used for a wide range of tasks. It is a good choice for both beginners and experienced users. If you are interested in learning more about Linux, there are many resources available to help you get started.
How do security analysts use Linux? Select three answers.
- To verify access and authorization in an identity and access management system
- To use digital forensic tools to investigate what happened following an event
- To examine different types of logs to identify what is going on in a system
Security analysts use Linux to verify access and authorization in an identity and access management system. They also use Linux to examine logs and to investigate what happened in an event.
You might have seen or
heard the name Linux in the past. But did you know Linux is the most-used
operating system in security today? Let’s start by taking a look at Linux and
how it’s used in security. Linux is an open-source operating system. It was created in two parts. In the early 1990s, two different people
were working separately on projects to improve computer engineering. The first person was Linus Torvalds. At the time, the UNIX operating
system was already in use. He wanted to improve it and make it
open source and accessible to anyone. What was revolutionary was his
introduction of the Linux kernel. We’re going to learn what
the kernel does later. Around the same time,
Richard Stallman started working on GNU. GNU was also an operating
system based on UNIX. Stallman shared Torvalds’ goal of
creating software that was free and open to anyone. After working on GNU for
a few years, the missing element for the software was a kernel. Together, Torvalds’ and Stallman’s innovations
made what is commonly referred to as Linux. Now that you’ve learned
the history behind Linux, let’s take a look at
what makes Linux unique. As mentioned before, Linux is open source, meaning anyone can have access to
the operating system and the source code. Linux and many of the programs that come
with Linux are licensed under the terms of the GNU Public License, which allow you
to use, share, and modify them freely. Thanks to Linux’s open-source philosophy
as well as a strong feature set, an entire community of developers
has adopted this operating system. These developers are able to
collaborate on projects and advance computing together. As a security analyst, you’ll discover that Linux is
used at different organizations. More specifically,
Linux is used in many security programs. Another unique feature about Linux
is the different distributions, or varieties, that have been developed. Because of the large
community contribution, there are over 600 distributions of Linux. Later you’ll learn more
about distributions. Finally, let’s take a look at how you
would use Linux in an entry-level security position. As a security analyst, you’ll use many
tools and programs in everyday work. You might examine different types of logs
to identify what’s going on in the system. For example, you might find yourself looking at
an error log when investigating an issue. Another place where you will use
Linux is to verify access and authorization in an identity and
access management system. In security, managing access is key
in order to ensure a secure system. We’ll take a closer look into access and
authorization later. Finally, as an analyst,
you might find yourself working with specific distributions designed for
a particular task. For example, you might use a distribution
that has a digital forensic tool to investigate what
happened in an event alert. You might also use
a distribution that’s for pen testing in offensive security to
look for vulnerabilities in the system. Distributions are created to
fit the needs of their users. I hope you’re excited to
learn more about Linux. This will be a very useful
skill in the security field.
Video: Phil: Learn and grow in the cybersecurity field
Phil is the Chief Information Security Officer for Google Cloud, and he says that cybersecurity is a big space where you need to learn continuously. He also says that you don’t have to learn everything all at once, and that you can learn as you go. He recommends starting off by writing a few lines of simple code or looking at somebody else’s code and trying to understand what it does and then change it a little bit. He also says that it’s important to build a foundation of knowledge that gives you the ability to learn other things.
Hi, I’m Phil I’m the Chief Information Security
Officer for Google Cloud, and a big part of that is,
of course, cybersecurity. So, in cyber you’ve
always got to learn, you’ve always got to
stay up to date for the simple reason
that technology and business and the world of our, kind of digital lives is
just always changing. The online services that you use today are probably
very different even just when what they
were 12 months ago. In the mid ’90s, I
worked on one of the world’s first
internet banking systems. And essentially we were building and coding all of the
security ourselves. I remember working on
the first web browsers, the first web servers, the first implementations of
encryption on the Internet. This was even before
Google even existed. And so this was the very beginning of the Internet and we were
literally kind of assembling and building this and
learning how to do it as we went along. When you are first getting
into cybersecurity, it’s important to
not get overwhelmed. It’s a very big space. And all of us started off
at where you are today. And we had to learn into that. At one point, I
didn’t know Linux, I didn’t know how to program. I didn’t know various parts
of other operating systems. And I had to learn step-by-step, how all of that worked and gradually build up that
knowledge over time. And even now I still have to look things up
occasionally because I don’t keep
everything in my head all at once and
that’s totally fine. When you’re approaching
a new situation, you’re always going to
have a degree of anxiety about whether you’re going to be able to learn it quickly enough. And generally, with
enough experience, you’re gradually comfortable
that you will. But again, this is important
to remember that you don’t have to learn everything
about everything all at once. Most of the time
you learn enough to be enough of value in the
initial part of the process, then you learn as you go. Start off by writing
a few lines of simple code or looking at somebody else’s
code and trying to understand what it does
and then change it a little bit and just
incrementally work into this. Build that foundation
of knowledge that gives you the ability
to learn other things, and I think things
will stem from that.
Video: Linux architecture
The components of the Linux architecture are:
- User: The person interacting with the computer.
- Applications: Programs that perform specific tasks.
- Shell: A command line interpreter that processes commands and outputs the results.
- Filesystem Hierarchy Standard (FHS): Organizes data.
- Kernel: Manages processes and memory, and communicates with the hardware.
- Hardware: The physical components of a computer.
Linux Architecture Tutorial
Linux is a Unix-like operating system that is based on the Linux kernel. The Linux kernel is the core of the operating system, and it is responsible for managing the system’s hardware resources.
The Linux architecture is divided into the following layers:
- Hardware layer: This layer consists of the physical hardware components of the computer, such as the CPU, memory, and storage.
- Kernel layer: This layer contains the Linux kernel, which is responsible for managing the system’s hardware resources, such as the CPU, memory, and file system.
- System library layer: This layer contains the system libraries, which provide the basic functionality of the operating system, such as file I/O and networking.
- Shell layer: This layer contains the shell, which is a command-line interpreter that allows users to interact with the operating system.
- Application layer: This layer contains the user applications, such as web browsers, text editors, and office suites.
The following diagram illustrates the Linux architecture:
+------------+
| Application |
+------------+
|
|
v
+------------+
| Shell |
+------------+
|
|
v
+------------+
| Kernel |
+------------+
|
|
v
+------------+
| Hardware |
+------------+
The kernel is the most important layer in the Linux architecture. It is responsible for managing all of the system’s resources, including the CPU, memory, file system, and networking. The kernel also provides a set of system calls that allow user applications to interact with the hardware.
The shell is the interface between the user and the kernel. It allows users to enter commands and to view the results of those commands. The shell also provides a number of built-in commands, such as ls
, cd
, and mkdir
.
The system library layer provides the basic functionality of the operating system, such as file I/O and networking. User applications use the system libraries to access the system’s resources.
The application layer contains the user applications, such as web browsers, text editors, and office suites. User applications are written in a variety of programming languages, such as C, C++, and Java.
Learning more about Linux architecture
There are many resources available online and in libraries that can teach you more about Linux architecture. Here are a few suggestions:
- The Linux Documentation Project website has a comprehensive collection of Linux documentation, including a section on architecture.
- The Linux Foundation website offers a variety of Linux training courses, including a course on Linux architecture.
- The book “Linux in a Nutshell” has a good chapter on Linux architecture.
Conclusion
Understanding the Linux architecture is an important step in learning how to use Linux effectively. By understanding the different components of the architecture and how they interact with each other, you will be able to troubleshoot problems and optimize your Linux system.
What is the kernel’s role in the Linux operating system?
It manages processes and memory.
The kernel is the component of the Linux OS that manages processes and memory.
Let me start with a
quick question that may seem unrelated to security. Do you have a favorite building? And what is it about its architecture that
impresses you the most? The windows? The
structure of the walls? Just like buildings,
operating systems also have an architecture
and are made up of discrete components that work
together to form the whole. In this video, we’re
going to look at all the components that
together make up Linux. The components of Linux include
the user, applications, the shell, the Filesystem
Hierarchy Standard, the kernel, and the hardware. Don’t worry—we’ll go into these components one
by one together. First, you are the user. The user is the person
interacting with the computer. In Linux, you’re
the first element to the architecture of
the operating system. You’re initiating the tasks or commands that the OS
is going to execute. Linux is a multi-user system. This means that more
than one user can use the system’s resources
at the same time. The second element
of the architecture is the applications
within a system. An application is a program that performs a specific task, such as a word processor
or a calculator. You might hear the
word “applications” and “programs” used
interchangeably. As an example, one popular Linux
application that we’ll learn more
about later is Nano. Nano is a text editor. This simple application helps you keep notes on the screen. Linux applications are commonly distributed through
package managers. We’ll learn more about
this process later. The next component
in the architecture of Linux is the shell. This is an important
element because it is how you will
communicate with the system. The shell is a command
line interpreter. It processes commands
and outputs the results. This might sound familiar. Previously, we learned about the two types
of user interfaces: the GUI and the CLI. You can think of
the shell as a CLI. Another element of
the architecture of Linux is the Filesystem
Hierarchy Standard, or FHS. It’s the component of the Linux
OS that organizes data. An easy way for
you to think about the FHS is to think about it
as a filing cabinet of data. The FHS is how data is
stored in a system. It’s a way to organize
data so that it can be found when the data is
accessed by the system. That brings us to the kernel. The kernel is a component of the Linux OS that manages
processes and memory. The kernel communicates
with the hardware to execute the commands
sent by the shell. The kernel uses
drivers to enable applications to execute tasks. The Linux kernel helps
ensure that the system allocates resources
more efficiently and makes the
system work faster. Finally, the last component of the architecture
is the hardware. Hardware refers to the physical
components of a computer. You can compare this to
software applications which can be downloaded
into a system. The hardware in your
computer are things like the CPU, mouse,
and keyboard. Congratulations! We’ve now covered
the architecture of Linux. An understanding of these components will help you become increasingly
familiar with Linux.
Reading: Linux architecture explained
Reading
Understanding the Linux architecture is important for a security analyst. When you understand how a system is organized, it makes it easier to understand how it functions. In this reading, you’ll learn more about the individual components in the Linux architecture. A request to complete a task starts with the user and then flows through applications, the shell, the Filesystem Hierarchy Standard, the kernel, and the hardware.
User
The user is the person interacting with a computer. They initiate and manage computer tasks. Linux is a multi-user system, which means that multiple users can use the same resources at the same time.
Applications
An application is a program that performs a specific task. There are many different applications on your computer. Some applications typically come pre-installed on your computer, such as calculators or calendars. Other applications might have to be installed, such as some web browsers or email clients. In Linux, you’ll often use a package manager to install applications. A package manager is a tool that helps users install, manage, and remove packages or applications. A package is a piece of software that can be combined with other packages to form an application.
Shell
The shell is the command-line interpreter. Everything entered into the shell is text based. The shell allows users to give commands to the kernel and receive responses from it. You can think of the shell as a translator between you and your computer. The shell translates the commands you enter so that the computer can perform the tasks you want.
Filesystem Hierarchy Standard (FHS)
The Filesystem Hierarchy Standard (FHS) is the component of the Linux OS that organizes data. It specifies the location where data is stored in the operating system.
A directory is a file that organizes where other files are stored. Directories are sometimes called “folders,” and they can contain files or other directories. The FHS defines how directories, directory contents, and other storage is organized so the operating system knows where to find specific data.
Kernel
The kernel is the component of the Linux OS that manages processes and memory. It communicates with the applications to route commands. The Linux kernel is unique to the Linux OS and is critical for allocating resources in the system. The kernel controls all major functions of the hardware, which can help get tasks expedited more efficiently.
Hardware
The hardware is the physical components of a computer. You might be familiar with some hardware components, such as hard drives or CPUs. Hardware is categorized as either peripheral or internal.
Peripheral devices
Peripheral devices are hardware components that are attached and controlled by the computer system. They are not core components needed to run the computer system. Peripheral devices can be added or removed freely. Examples of peripheral devices include monitors, printers, the keyboard, and the mouse.
Internal hardware
Internal hardware are the components required to run the computer. Internal hardware includes a main circuit board and all components attached to it. This main circuit board is also called the motherboard. Internal hardware includes the following:
- The Central Processing Unit (CPU) is a computer’s main processor, which is used to perform general computing tasks on a computer. The CPU executes the instructions provided by programs, which enables these programs to run.
- Random Access Memory (RAM) is a hardware component used for short-term memory. It’s where data is stored temporarily as you perform tasks on your computer. For example, if you’re writing a report on your computer, the data needed for this is stored in RAM. After you’ve finished writing the report and closed down that program, this data is deleted from RAM. Information in RAM cannot be accessed once the computer has been turned off. The CPU takes the data from RAM to run programs.
- The hard drive is a hardware component used for long-term memory. It’s where programs and files are stored for the computer to access later. Information on the hard drive can be accessed even after a computer has been turned off and on again. A computer can have multiple hard drives.
Key takeaways
It’s important for security analysts to understand the Linux architecture and how these components are organized. The components of the Linux architecture are the user, applications, shell, Filesystem Hierarchy Standard, kernel, and hardware. Each of these components is important in how Linux functions.
Practice Quiz: Test your knowledge: All about Linux
As a security analyst, you might use Linux to review logs when investigating an issue.
True
As a security analyst, you might use Linux to review logs when investigating an issue. Another reason you might use Linux is to verify access and authorization.
Which of the following are components of the Linux architecture? Select all that apply.
The shell, Applications, The kernel
Fill in the blank: The Filesystem Hierarchy Standard (FHS) is the component of Linux architecture that _____.
organizes data
The Filesystem Hierarchy Standard (FHS) is the component of the Linux OS that organizes data.
Which of the following hardware components are peripheral devices? Select all that apply.
a printer, a monitor
Monitors and printers are peripheral devices. Peripheral devices are hardware components that are attached and controlled by the computer system. The CPU and RAM are internal hardware. Internal hardware are the components required to run the computer.
Linux distributions
Video: Linux distributions
Linux is a customizable operating system that is available in many different versions, called distributions. Each distribution has its own unique set of tools and apps, making it important to understand the distribution you are using.
Linux distributions can be compared to different types of vehicles, each with its own purpose. For example, Debian is a general-purpose distribution, while Kali Linux is specifically designed for security testing.
Linux distributions are created by modifying the Linux kernel, which is the core of the operating system. All distributions are derived from another distro, but there are a few that are considered parent distributions, such as Red Hat and Slackware.
Ubuntu and Kali Linux are both derived from Debian, and are two of the most commonly used distributions by security analysts.
Key takeaways:
- Linux is a customizable operating system with many different distributions to choose from.
- Each distribution has its own unique set of tools and apps, so it is important to understand the distribution you are using.
- Linux distributions can be compared to different types of vehicles, each with its own purpose.
- Kali Linux is a popular distribution specifically designed for security testing.
- Ubuntu and Kali Linux are both derived from Debian, and are two of the most commonly used distributions by security analysts.
What is a Linux distribution?
A Linux distribution is a version of the Linux operating system that includes a package manager, a set of pre-installed software, and a graphical user interface (GUI). Linux distributions are created by different organizations and individuals, and each distribution has its own unique features and strengths.
Why are there so many Linux distributions?
There are many reasons why there are so many Linux distributions. One reason is that Linux is open source, which means that anyone can modify and distribute the source code. This has led to a wide variety of different distributions, each with its own focus and purpose.
Another reason for the diversity of Linux distributions is that Linux is very customizable. This allows users to choose a distribution that meets their specific needs and requirements. For example, some distributions are designed for general-purpose use, while others are designed for specific tasks such as security testing or web development.
Which Linux distribution should I choose?
The best Linux distribution for you will depend on your individual needs and requirements. If you are new to Linux, it is a good idea to start with a general-purpose distribution such as Ubuntu or Fedora. These distributions are easy to install and use, and they come with a wide range of pre-installed software.
If you are looking for a distribution that is specifically designed for security testing, Kali Linux is a good option. Kali Linux comes with a wide range of pre-installed security tools, making it a great choice for security professionals.
Here are some of the most popular Linux distributions:
- Ubuntu
- Fedora
- Linux Mint
- Elementary OS
- Zorin OS
- Deepin
- Manjaro
- Kali Linux
- Parrot OS
- Tails
- BackBox Linux
How to install a Linux distribution
Installing a Linux distribution is relatively straightforward. Most distributions offer a graphical installer that will walk you through the process step-by-step.
To install a Linux distribution, you will need a bootable USB drive or DVD. You can create a bootable USB drive using a tool such as Rufus.
Once you have a bootable USB drive, you can boot your computer from the USB drive. This will start the graphical installer for the Linux distribution that you are installing.
The graphical installer will guide you through the installation process. You will need to choose a language, keyboard layout, and partition scheme. You will also need to create a user account.
Once the installation is complete, you will be able to log in to your new Linux system.
Conclusion
Linux distributions are a great way to experience the power and flexibility of Linux. With so many different distributions to choose from, there is a distribution that is perfect for everyone.
What type of components might be different from one Linux distribution to another? Select three answers.
Their parent distributions, Their pre-installed programs, Their user interfaces
The pre-installed programs, user interfaces, and parent distributions might differ from one Linux distribution to another.
Let’s learn a little bit
more about Linux and what you need to know about this operating
system when working as a security analyst. Linux is a very customizable
operating system. Unlike other operating systems,
there are different versions available for you to use. These different versions of
Linux are called distributions. You might also hear them called
distros or flavors of Linux. It’s essential for you to understand
the distribution that you’re using so you know what tools and
apps are available to you. For example, Debian is a distro that has different
tools than the Ubuntu distribution. Let’s use an analogy to
describe Linux distributions. Think of the OS as a vehicle. First, we’ll start with its engine—that
would be the kernel. Just as the engine makes a vehicle run, the kernel is the
most important component of the Linux OS. Because the Linux kernel is open source,
anyone can take the kernel and modify it to build a new distribution. This is comparable to a vehicle
manufacturer taking an engine and creating different types of vehicles:
trucks, cars, vans, convertibles,
busses, airplanes, and so on. These different types of vehicles can be
compared to different Linux distributions. A bus is used to transport lots of people. A truck is used to transport a large
number of goods across vast distances. An aircraft transports
passengers or goods by air. Just as each vehicle
serves its own purpose, different distributions are used for
different reasons. Additionally, vehicles all have different
components which distinguish them from each other. Aircrafts have control panels
with buttons and knobs. Regular cars have four tires,
but trucks can have more. Similarly, different Linux distributions
contain different preinstalled programs, user interfaces, and much more. A lot of this is based on
what the Linux user needs, but some distros are also
chosen based on preference—the same way a sports car
might be chosen as a vehicle. The advantage of using Linux as
an OS is that you can customize it. Distributions include the Linux kernel,
utilities, a package management system, and
an installer. We learned earlier that
Linux is open source, and anyone can contribute to
adding to the source code. That is how new distributions are created. All distros are derived
from another distro, but there are a few that are considered
parent distributions. Red Hat® is the parent of CentOS, and
Slackware® is the parent of SUSE®. Both Ubuntu and
KALI LINUX™ are derived from Debian. As we continue, we’re going to take a look
at some of the distributions most commonly used by security analysts. The more you understand
these distributions, the easier your work will be.
Video: KALI LINUX ™
In this section, we will cover the Linux distribution Kali Linux™, which is widely used in security. Kali Linux™ is a Debian-derived distribution specifically made for penetration testing and digital forensics. It comes with many pre-installed tools, such as Metasploit, Burp Suite, and John the Ripper, which are useful for penetration testing and digital forensic work.
Key takeaways:
- Kali Linux™ is a Linux distribution specifically made for penetration testing and digital forensics.
- It comes with many pre-installed tools that are useful for these tasks.
- Kali Linux™ should be used on a virtual machine to prevent damage to your system.
Image:
Next steps:
Explore other Linux distributions that are widely used in security.
What is Kali Linux?
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It is freely available and includes numerous tools that are commonly used by security professionals, such as Metasploit, Nmap, and Wireshark.
Why use Kali Linux?
Kali Linux is a popular choice for security professionals because it is:
- Comprehensive: Kali Linux comes with a wide range of pre-installed tools for penetration testing and digital forensics. This makes it a one-stop shop for security professionals, saving them time and effort.
- Customizable: Kali Linux is highly customizable, allowing users to install and configure only the tools they need.
- Free and open source: Kali Linux is free and open source software, which means that anyone can use it, modify it, and distribute it. This makes it a good choice for organizations of all sizes and budgets.
How to install Kali Linux
To install Kali Linux, you will need a bootable USB drive or DVD. You can create a bootable USB drive using a tool such as Rufus.
Once you have a bootable USB drive, you can boot your computer from the USB drive. This will start the graphical installer for Kali Linux.
The graphical installer will guide you through the installation process. You will need to choose a language, keyboard layout, and partition scheme. You will also need to create a user account.
Once the installation is complete, you will be able to log in to your new Kali Linux system.
Getting started with Kali Linux
Once you have logged in to your Kali Linux system, you should start by getting familiar with the pre-installed tools. You can do this by browsing the Kali Linux documentation or by searching the web for tutorials.
To start using Kali Linux for penetration testing or digital forensics, you will need to choose the right tools for the job. There are many different resources available online to help you choose the right tools for your needs.
Here are a few examples of popular Kali Linux tools:
- Metasploit: Metasploit is a penetration testing framework that can be used to exploit vulnerabilities in systems and networks.
- Nmap: Nmap is a port scanner that can be used to identify open ports on a system or network.
- Wireshark: Wireshark is a network traffic analyzer that can be used to capture and analyze network traffic.
- John the Ripper: John the Ripper is a password cracker that can be used to crack weak passwords.
- Autopsy: Autopsy is a digital forensics tool that can be used to analyze hard drives and smartphones.
These are just a few examples of the many tools that are included with Kali Linux. For a more comprehensive list of tools, please see the Kali Linux documentation.
Conclusion
Kali Linux is a powerful tool for penetration testing and digital forensics. It is a popular choice for security professionals of all skill levels. If you are interested in learning more about penetration testing or digital forensics, I encourage you to download and install Kali Linux.
Image:
Next steps:
- Learn more about the pre-installed tools on Kali Linux by browsing the Kali Linux documentation or searching the web for tutorials.
- Choose the right tools for the job you need to do.
- Start using Kali Linux for penetration testing or digital forensics.
Which of the following statements accurately describe the KALI LINUX ™ distribution? Select all that apply.
- It contains many pre-installed tools that can be used for cybersecurity tasks.
- It should be used on a virtual machine.
- It is derived from Debian.
KALI LINUX ™ is a Debian-derived distribution, it contains many pre-installed tools for cybersecurity tasks, and it should be used on a virtual machine. It is an open-source distribution.
In this section, we’re going to cover
a Linux distribution that’s widely used in security and discuss KALI LINUX™. KALI LINUX™ is a trademark of Offensive
Security and is Debian derived. This open-source distro was made
specifically with penetration testing and digital forensics in mind. There are many tools
pre-installed into KALI LINUX™. It’s important to note that KALI LINUX™
should be used on a virtual machine. This prevents damage to your system in
the event its tools are used improperly. An additional benefit is that using
a virtual machine gives you the ability to revert to a previous state. As security professionals advance in their careers,
some specialize in penetration testing. A penetration test is a simulated attack
that helps identify vulnerabilities in systems, networks, websites,
applications, and processes. KALI LINUX™ has numerous tools that
are useful during penetration testing. Let’s look at a few examples. To begin, Metasploit can be used to look for and
exploit vulnerabilities on machines. Burp Suite is another tool that helps to
test for weaknesses in web applications. And finally, John the Ripper is
a tool used to guess passwords. As a security analyst, your work
might involve digital forensics. Digital forensics is
the process of collecting and analyzing data to determine what
has happened after an attack. For example, you might take an investigative look
at data related to network activity. KALI LINUX™ is also
a useful distribution for security professionals who
are involved in digital forensic work. It has a large number of tools that
can be used for this. As one example, tcpdump is a command-line packet analyzer.
It’s used to capture network traffic. Another tool commonly used in
the security profession is Wireshark. It has a graphical user interface
that can be used to analyze live and captured network traffic. And as a final example, Autopsy is a forensic tool used to
analyze hard drives and smartphones. These are just a few tools
included with KALI LINUX™. This distribution has many tools used to
conduct pen testing and digital forensics. We’ve explored how KALI LINUX™ is
an important distribution that’s widely used in security, but there are other distributions that
security professionals use as well. Next we’ll explore a few
more distributions.
Reading: More Linux distributions
Reading
Previously, you were introduced to the different distributions of Linux. This included KALI LINUX ™. (KALI LINUX ™ is a trademark of OffSec.) In addition to KALI LINUX ™, there are multiple other Linux distributions that security analysts should be familiar with. In this reading, you’ll learn about additional Linux distributions.
KALI LINUX ™
KALI LINUX ™ is an open-source distribution of Linux that is widely used in the security industry. This is because KALI LINUX ™, which is Debian-based, is pre-installed with many useful tools for penetration testing and digital forensics. A penetration test is a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes. Digital forensics is the practice of collecting and analyzing data to determine what has happened after an attack. These are key activities in the security industry.
However, KALI LINUX ™ is not the only Linux distribution that is used in cybersecurity.
Ubuntu
Ubuntu is an open-source, user-friendly distribution that is widely used in security and other industries. It has both a command-line interface (CLI) and a graphical user interface (GUI). Ubuntu is also Debian-derived and includes common applications by default. Users can also download many more applications from a package manager, including security-focused tools. Because of its wide use, Ubuntu has an especially large number of community resources to support users.
Ubuntu is also widely used for cloud computing. As organizations migrate to cloud servers, cybersecurity work may more regularly involve Ubuntu derivatives.
Parrot
Parrot is an open-source distribution that is commonly used for security. Similar to KALI LINUX ™, Parrot comes with pre-installed tools related to penetration testing and digital forensics. Like both KALI LINUX ™ and Ubuntu, it is based on Debian.
Parrot is also considered to be a user-friendly Linux distribution. This is because it has a GUI that many find easy to navigate. This is in addition to Parrot’s CLI.
Red Hat® Enterprise Linux®
Red Hat Enterprise Linux is a subscription-based distribution of Linux built for enterprise use. Red Hat is not free, which is a major difference from the previously mentioned distributions. Because it’s built and supported for enterprise use, Red Hat also offers a dedicated support team for customers to call about issues.
CentOS
CentOS is an open-source distribution that is closely related to Red Hat. It uses source code published by Red Hat to provide a similar platform. However, CentOS does not offer the same enterprise support that Red Hat provides and is supported through the community.
Key takeaways
KALI LINUX ™, Ubuntu, Parrot, Red Hat, and CentOS are all widely used Linux distributions. It’s important for security analysts to be aware of these distributions that they might encounter in their career.
Reading: Package managers for installing applications
Reading
Previously, you learned about Linux distributions and that different distributions derive from different sources, such as Debian or Red Hat Enterprise Linux distribution. You were also introduced to package managers, and learned that Linux applications are commonly distributed through package managers. In this reading, you’ll apply this knowledge to learn more about package managers.
Introduction to package managers
A package is a piece of software that can be combined with other packages to form an application. Some packages may be large enough to form applications on their own.
Packages contain the files necessary for an application to be installed. These files include dependencies, which are supplemental files used to run an application.
Package managers can help resolve any issues with dependencies and perform other management tasks. A package manager is a tool that helps users install, manage, and remove packages or applications. Linux uses multiple package managers.
Note: It’s important to use the most recent version of a package when possible. The most recent version has the most up-to-date bug fixes and security patches. These help keep your system more secure.
Types of package managers
Many commonly used Linux distributions are derived from the same parent distribution. For example, KALI LINUX ™, Ubuntu, and Parrot all come from Debian. CentOS comes from Red Hat.
This knowledge is useful when installing applications because certain package managers work with certain distributions. For example, the Red Hat Package Manager (RPM) can be used for Linux distributions derived from Red Hat, and package managers such as dpkg can be used for Linux distributions derived from Debian.
Different package managers typically use different file extensions. For example, Red Hat Package Manager (RPM) has files which use the .rpm file extension, such as Package-Version-Release_Architecture.rpm. Package managers for Debian-derived Linux distributions, such as dpkg, have files which use the .deb file extension, such as Package_Version-Release_Architecture.deb.
Package management tools
In addition to package managers like RPM and dpkg, there are also package management tools that allow you to easily work with packages through the shell. Package management tools are sometimes utilized instead of package managers because they allow users to more easily perform basic tasks, such as installing a new package. Two notable tools are the Advanced Package Tool (APT) and Yellowdog Updater Modified (YUM).
Advanced Package Tool (APT)
APT is a tool used with Debian-derived distributions. It is run from the command-line interface to manage, search, and install packages.
Yellowdog Updater Modified (YUM)
YUM is a tool used with Red Hat-derived distributions. It is run from the command-line interface to manage, search, and install packages. YUM works with .rpm files.
Key takeaways
A package is a piece of software that can be combined with other packages to form an application. Packages can be managed using a package manager. There are multiple package managers and package management tools for different Linux distributions. Package management tools allow users to easily work with packages through the shell. Debian-derived Linux distributions use package managers like dpkg as well as package management tools like Advanced Package Tool (APT). Red Hat-derived distributions use the Red Hat Package Manager (RPM) or tools like Yellowdog Updater Modified (YUM).
Reading: Resources for completing Linux labs
Reading: Lab tips and troubleshooting steps
Reading
Throughout this certificate you will use Qwiklabs and Jupyter Notebooks to complete hands-on activities that include Linux command line, packet capture, and Python programming tasks. In this reading, we will cover some tips and troubleshooting steps for using Qwiklabs and Jupyter Notebooks on your computer.
Browser compatibility
Make sure your internet browser is updated regularly. Qwiklabs and Jupyter Notebooks require the latest version of Google Chrome, Firefox, Safari, or Microsoft Edge. If your browser is outdated or you are using a browser that is not supported by Qwiklabs or Jupyter Notebooks, you may encounter a problem. If your browser is up to date and you are using one of the browsers listed above and still encountering problems try restarting your browser or clearing your browser’s cache and cookies. You can also use incognito mode which prevents your browser from storing cookies and other temporary data.
Note: The Qwiklabs user interface works best with Google Chrome.
Internet connection
Qwiklabs and Jupyter Notebooks require a stable internet connection. If you are experiencing problems starting or completing Qwiklabs or Jupyter Notebooks, your internet connection may be slow or unreliable. Some signs of an unstable internet connection may be freezing labs, difficulty connecting to virtual machines, or the inability to type or enter commands within the lab environment.
Pro Tip: If you are unable to complete a Qwiklab or Jupyter Notebooks lab on one device, try using another device.
Troubleshooting steps
To summarize, here are the troubleshooting steps to try if you encounter a problem with Qwiklabs or Jupyter Notebooks.
- Make sure you are using the latest version of a supported browser: Google Chrome, Firefox, Safari, or Microsoft Edge.
- Restart your browser and clear your browser’s cache and cookies. You can also use incognito mode.
- Check your internet connection and make sure it is stable. You can try restarting your router and modem to regain a stable connection.
- Try restarting Qwiklabs or Jupyter Notebooks again.
- For Qwiklabs only: If problems persist or you receive a message stating that you have exceeded the quota for a Qwiklab, submit this form to Qwiklabs support for assistance.
Practice Quiz: Test your knowledge: Linux distributions
Fill in the blank: Because the _____ is open source, anyone can modify it to build new Linux distributions.
kernel
Because the kernel is open source, anyone can modify it to build new Linux distributions. The kernel is the component of the Linux OS that manages processes and memory.
What is KALI LINUX ™?
A Debian-derived, open-source distribution of Linux designed for security tasks
KALI LINUX ™ is a Debian-derived, open-source distribution of Linux designed for security tasks, such as penetration testing and digital forensics.
What is an open-source, user-friendly distribution derived from Debian that is widely used in security and other industries?
Ubuntu
Ubuntu is an open-source, user-friendly distribution derived from Debian that is widely used in security and other industries. Because of its wide use, Ubuntu has a large number of community resources to support users.
Which of the following are distributions of Linux? Select all that apply.
Red Hat, CentOS, Parrot
Red Hat, CentOS, and Parrot are all distributions of Linux.
The shell
Video: Introduction to the shell
The Linux shell is a command-line interpreter that allows users to communicate with the operating system. It is the primary interface for security analysts to interact with Linux systems. The shell provides a command-line interface that allows users to enter commands to tell the operating system what to do. The shell communicates with the kernel to execute these commands. The shell is a powerful tool that allows users to perform a wide range of tasks, including running tests, executing applications, and performing complex and automated tasks.
Introduction to the Shell
The shell is a command-line interpreter that allows users to communicate with the operating system. It is the primary interface for security analysts to interact with Linux systems. The shell provides a command-line interface (CLI) that allows users to enter commands to tell the operating system what to do. The shell communicates with the kernel to execute these commands.
Benefits of using the shell
There are several benefits to using the shell, including:
- Efficiency: The shell is a very efficient way to interact with the operating system. Commands can be typed quickly and easily, and the results are displayed immediately.
- Power: The shell provides a wide range of commands that can be used to perform a variety of tasks, including system administration, file management, and software development.
- Flexibility: The shell is very flexible and can be customized to meet the specific needs of the user.
Getting started with the shell
To get started with the shell, you will need to open a terminal window. A terminal window is a window that provides access to the shell. To open a terminal window, press Ctrl
+Alt
+T
on most Linux distributions.
Once you have opened a terminal window, you can start typing commands. To execute a command, simply type it in the terminal window and press Enter
.
Some basic shell commands
Here are some basic shell commands:
ls
: List the contents of the current directory.cd
: Change directory.pwd
: Print working directory.mkdir
: Create a new directory.rmdir
: Remove a directory.touch
: Create a new file.rm
: Remove a file.cat
: Display the contents of a file.grep
: Search for a pattern in a file.man
: Display the manual page for a command.
Shell scripting
Shell scripting is the process of writing scripts that can be executed by the shell. Shell scripts are typically used to automate tasks. To create a shell script, simply create a new file with a .sh
extension and add your commands to the file.
Once you have created a shell script, you can execute it by typing the following command:
sh <script_name>
For example, to execute a shell script called my_script.sh
, you would type the following command:
sh my_script.sh
Conclusion
The shell is a powerful tool that can be used to perform a wide range of tasks. It is the primary interface for security analysts to interact with Linux systems. If you are new to Linux, I encourage you to learn how to use the shell. It is a valuable skill that will make you more productive and efficient.
Here are some additional tips for learning the shell:
- Start by learning the basic shell commands.
- Experiment with the shell and try different commands.
- Read the man pages for the commands that you use frequently.
- Write shell scripts to automate your tasks.
- Find a good shell scripting tutorial or book.
With a little effort, you can learn how to use the shell effectively.
What is the purpose of the shell?
It helps humans and computers communicate with each other.
The shell helps humans and computers communicate with each other. It is the command-line interpreter and helps humans communicate with the operating system through the command line.
Welcome back! In this video, we’re
going to discuss the Linux shell. This part of the Linux architecture
is where the action will happen for you as a security analyst. We introduced the shell with other
components of the Linux OS earlier, but let’s take a deeper look at
what the shell is and what it does. The shell is the command-line interpreter. That means it helps you communicate
with the operating system through the command line. Previously, we discussed
a command-line interface. This is essentially the shell. The shell provides the command-line
interface for you to interact with the OS. To tell the OS what to do, you enter
commands into this interface. A command is an instruction telling
the computer to do something. The shell communicates with
the kernel to execute these commands. Earlier, we discussed how
the operating system helps humans and computers speak with each other. The shell is the part of the OS
that allows you to do this. Think of this as a very helpful language
interpreter between you and your system. Since you do not speak
computer language or binary, you can’t directly
communicate with your system. This is where the shell
comes in to help you. Your OS doesn’t need the shell for
most of its work, but it is an interface between you and
what your system can offer. It allows you to perform math,
run tests, and execute applications. More importantly, it allows you
to combine these operations and connect applications to each other to perform complex and automated tasks. Just as there are many
Linux distributions, there are many different types of shells. We’ll primarily focus on
the Bash shell in this course. Let’s continue to learn
more about the shell.
Reading: Different types of shells
Reading
Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shells can be used for many common tasks. Previously, you were introduced to shells and their functions. This reading will review shells and introduce you to different types, including the one that you’ll use in this course.
Communicate through a shell
As you explored previously, the shell is the command-line interpreter. You can think of a shell as a translator between you and the computer system. Shells allow you to give commands to the computer and receive responses from it. When you enter a command into a shell, the shell executes many internal processes to interpret your command, send it to the kernel, and return your results.
Types of shells
The many different types of Linux shells include the following:
- Bourne-Again Shell (bash)
- C Shell (csh)
- Korn Shell (ksh)
- Enhanced C shell (tcsh)
- Z Shell (zsh)
All Linux shells use common Linux commands, but they can differ in other features. For example, ksh and bash use the dollar sign ($) to indicate where users type in their commands. Other shells, such as zsh, use the percent sign (%) for this purpose.
Bash
Bash is the default shell in most Linux distributions. It’s considered a user-friendly shell. You can use bash for basic Linux commands as well as larger projects.
Bash is also the most popular shell in the cybersecurity profession. You’ll use bash throughout this course as you learn and practice Linux commands.
Key takeaways
Shells are a fundamental part of the Linux operating system. Shells allow you to give commands to the computer and receive responses from it. They can be thought of as a translator between you and your computer system. There are many different types of shells, but the bash shell is the most commonly used shell in the cybersecurity profession. You’ll learn how to enter Linux commands through the bash shell later in this course.
Video: Input and output in the shell
Communication with the shell can be divided into three parts: standard input, standard output, and standard error.
- Standard input is the information received by the OS via the command line.
- Standard output is the information returned by the OS through the shell.
- Standard error contains error messages returned by the OS through the shell.
Example:
echo hello
Output:
hello
Example:
eco hello
Output:
command not found: eco
The shell communicates with the kernel to execute commands. If the shell can interpret the command, it asks the kernel for the resources it needs to execute the related task. If the shell cannot interpret the command, it returns an error message.
Input and output in the shell
The shell is a command-line interpreter that allows users to communicate with the operating system. It is the primary interface for security analysts to interact with Linux systems. The shell provides a command-line interface (CLI) that allows users to enter commands to tell the operating system what to do. The shell communicates with the kernel to execute these commands.
Input and output redirection
Input and output redirection allows users to specify where the shell should read input from and send output to. This can be useful for a variety of reasons, such as piping the output of one command to the input of another command, or saving the output of a command to a file.
To redirect input, use the <
operator. For example, to redirect the contents of the file my_file.txt
to the input of the cat
command, you would type the following command:
cat < my_file.txt
To redirect output, use the >
operator. For example, to redirect the output of the ls
command to the file my_file.txt
, you would type the following command:
ls > my_file.txt
Piping
Piping allows you to connect the output of one command to the input of another command. This can be useful for automating complex tasks.
To pipe the output of one command to the input of another command, use the |
operator. For example, to list the contents of the current directory and then search for the string “hello” in each file, you would type the following command:
ls | grep "hello"
This command will first list the contents of the current directory using the ls
command. The output of the ls
command will then be piped to the grep
command, which will search for the string “hello” in each file. The output of the grep
command will then be displayed on the screen.
Conclusion
Input and output redirection and piping are powerful tools that can be used to automate tasks and perform complex operations in the shell. By learning how to use these tools, you can make yourself a more efficient and productive shell user.
Here are some additional tips for using input and output redirection and piping:
- Use the
>
operator to redirect output to a file. - Use the
<
operator to redirect input from a file. - Use the
|
operator to pipe the output of one command to the input of another command. - Use the
tee
command to redirect output to both a file and the screen. - Use the
head
andtail
commands to view the first or last few lines of a file. - Use the
sort
command to sort the output of a command. - Use the
uniq
command to remove duplicate lines from the output of a command.
With a little practice, you can learn to use input and output redirection and piping to perform a wide range of tasks in the shell.
What can the shell return after a user types a command?
Standard output or standard error
After a user types a command into the shell, the shell can return either standard output or standard error. Standard output is information returned by the OS through the shell. Standard error contains error messages returned by the OS through the shell.
Hello again! In this video, we’re going to learn
a little more about the shell and how to
communicate with it. Communicating with a computer is like having a conversation
with your friend. One person asks a question and the other person
answers with a response. If you don’t know the answer, you can just say you
don’t know the answer. When you communicate
with the shell, the commands in the
shell can take input, give output, or give
error messages. Let’s explore standard input, standard output, and error
messages in more detail. Standard input consists
of information received by the OS
via the command line. This is like you
asking your friend a question during
a conversation. The information is input from
your keyboard to the shell. If the shell can
interpret your request, it asks the kernel
for the resources it needs to execute
the related task. Let’s take a look at
this through echo, a Linux command that outputs
a specified string of text. String data is data consisting of an ordered sequence
of characters. In our example, we’ll just have it output the string of: hello. So, as input, we’ll type: echo
hello into the shell. Later, when we press enter,
we’ll get the output. But before we do that, let’s first discuss the concept
of output in more detail. Standard output is
the information returned by the OS
through the shell. In the same way that your friend gives an answer
to your question, output is a computer’s response
to the command you input. Output is what you receive. Let’s pick up where we left
off in our example and send the input of: echo hello to
the OS by pressing enter. Immediately, the shell
returns the output of: hello. Finally, standard error contains error messages returned by
the OS through the shell. Just like your friend might indicate that they can’t
answer a question, the system responds with an error message if they can’t
respond to your command. Sometimes this might
occur when we misspell a command or the system doesn’t know the
response to the command. Other times, it might happen
because we don’t have the appropriate permissions
to perform a command. We’ll explore another example that demonstrates
standard error. Let’s input: eco hello
into the shell. Notice I intentionally
misspelled echo as e-c-o. When we press enter, an error message appears. To wrap up, we’ve covered the basics of communication
with the shell. Communication with the
shell can only go in one of three ways: the system receives a command—this is input; the system responds to the
command and produces output; and finally, the system
doesn’t know how to respond, resulting in an error. Later, you’ll become much
more familiar with this as we explore commands useful
for security professionals.
Practice Quiz: Test your knowledge: The shell
What is the shell?
The command-line interpreter
The shell is the command-line interpreter. It processes commands and outputs the results.
After a user inputs a command into the shell, what can the shell return to the user? Select two answers.
Output, An error message
After a user inputs a command into the shell, the shell can return output or an error message to the user. Output is the computer’s response to the user’s input. An error message occurs when the shell cannot interpret the input.
What is standard error in Linux?
Error messages returned by the operating system through the shell
Standard error contains error messages returned by the OS through the shell.
What is the difference between standard input and standard output?
Standard input is sent to the operating system. Standard output is sent from the operating system.
Standard input is sent to the operating system. Standard output is sent from the operating system.
Review: The Linux operating system
Video: Wrap-up
This section provided an overview of the Linux operating system, including its architecture, different distributions, and the shell.
Key takeaways:
- Linux is a Unix-like operating system with a monolithic kernel.
- Some of the most widely used Linux distributions for security include Kali Linux, Ubuntu, Parrot, Red Hat, and CentOS.
- The shell is an interpreter between the user and the operating system.
The next section will cover specific shell commands that security analysts use.
We’ve made it to the
end of this section. Great work! Let’s recap what
you’ve just completed. In this section, you learned about the Linux
operating system. We examined the
architecture of Linux. In our exploration of the different
distributions of Linux, we discussed some of the most widely used distros in security. You were introduced to
KALI LINUX™, Ubuntu, Parrot, Red Hat, and
CentOS distributions. Finally, you learned
about the shell and its role as an interpreter between the user and
operating system. Congratulations! You’re doing great, and we have more
useful topics to come. In the next part of the program, you’ll learn specific
commands to use within the shell while working as a security analyst.
Let’s continue on.
Reading: Glossary terms from module 2
Terms and definitions from Course 4, Module 2
Application: A program that performs a specific task
Bash: The default shell in most Linux distributions
CentOS: An open-source distribution that is closely related to Red Hat
Central Processing Unit (CPU): A computer’s main processor, which is used to perform general computing tasks on a computer
Command: An instruction telling the computer to do something
Digital forensics: The practice of collecting and analyzing data to determine what has happened after an attack
Directory: A file that organizes where other files are stored
Distributions: The different versions of Linux
File path: The location of a file or directory
Filesystem Hierarchy Standard (FHS): The component of the Linux OS that organizes data
Graphical user interface (GUI): A user interface that uses icons on the screen to manage different tasks on the computer
Hard drive: A hardware component used for long-term memory
Hardware: The physical components of a computer
Internal hardware: The components required to run the computer
Kali Linux ™: An open-source distribution of Linux that is widely used in the security industry
Kernel: The component of the Linux OS that manages processes and memory
Linux: An open source operating system
Package: A piece of software that can be combined with other packages to form an application
Package manager: A tool that helps users install, manage, and remove packages or applications
Parrot: An open-source distribution that is commonly used for security
Penetration test (pen test): A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes
Peripheral devices: Hardware components that are attached and controlled by the computer system
Random Access Memory (RAM): A hardware component used for short-term memory
Red Hat® Enterprise Linux® (also referred to simply as Red Hat in this course): A subscription-based distribution of Linux built for enterprise use
Shell: The command-line interpreter
Standard error: An error message returned by the OS through the shell
Standard input: Information received by the OS via the command line
Standard output: Information returned by the OS through the shell
String data: Data consisting of an ordered sequence of characters
Ubuntu: An open-source, user-friendly distribution that is widely used in security and other industries
User: The person interacting with a computer
Quiz: Module 2 challenge
Fill in the blank: Linux is a(n) _____ operating system.
open-source
Which of the following components are part of the Linux architecture? Select all that apply.
The kernel, The Filesystem Hierarchy Standard (FHS)
Which of the following are examples of Linux distributions? Select all that apply.
Ubuntu, Debian
What is KALI LINUX ™? (KALI LINUX ™ is a trademark of OffSec.)
An open-source Linux distribution that is widely used in security
Which of these Linux distributions come with pre-installed tools related to penetration testing and digital forensics? Select two answers.
KALI LINUX ™, Parrot
What is the shell in Linux?
The command-line interpreter
If you enter echo cybersecurity into the command line, what is the output?
cybersecurity
Which of the following is an example of an application?
nano
What is standard input?
Information received by the OS via the command line