Did you know this about Linux? // Linux for Hackers Ep 5

Поділитися
Вставка
  • Опубліковано 23 сер 2024

КОМЕНТАРІ • 134

  • @davidbombal
    @davidbombal  2 місяці тому +5

    Big thank you to Brilliant for sponsoring this video! Try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/DavidBombal
    // UA-cam Video REFERENCE //
    Binary? How does it work?: ua-cam.com/video/Toa5-1i4wRE/v-deo.html
    // Occupy The Web Books //
    Linux Basics for Hackers:
    US: amzn.to/3wqukgC
    UK: amzn.to/43PHFev
    Getting Started Becoming a Master Hacker
    US: amzn.to/4bmGqX2
    UK: amzn.to/43JG2iA
    Network Basics for hackers:
    US: amzn.to/3yeYVyb
    UK: amzn.to/4aInbGK
    // OTW Discount //
    Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/
    // Occupy The Web SOCIAL //
    X: twitter.com/three_cube
    Website: hackers-arise.net/
    // Playlists REFERENCE //
    Linux Basics for Hackers: ua-cam.com/video/YJUVNlmIO6E/v-deo.html&pp=iAQB
    Mr Robot: ua-cam.com/video/3yiT_WMlosg/v-deo.html&pp=iAQB
    Hackers Arise / Occupy the Web Hacks: ua-cam.com/video/GxkKszPVD1M/v-deo.html&pp=iAQB
    // David's SOCIAL //
    Discord: discord.com/invite/usKSyzb
    X: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    UA-cam: www.youtube.com/@davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    00:00 - Coming up
    00:49 - Brilliant sponsored segment
    03:01 - Controlling directory permissions // Linux Basics for Hackers Chapter 5
    06:16 - Explaining permissions // Kali demo
    10:59 - Explaining permissions continued
    14:47 - How to change permissions // Two ways to change permissions
    22:10 - Special permissions // Sticky Bit
    26:09 - Privilege escalation explained & demo
    27:51 - The importance of social engineering
    32:58 - Group explained
    34:48 - Chapter 5 summary
    35:40 - OTW books
    36:44 - Visit OTW's website // hackers-arise.net
    38:38 - Special discount
    38:44 - Conclusion
    linux
    kali linux
    parrot os
    linux permissions
    linux users
    linux groups
    root
    linux 777
    linux chmod
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.
    #linux #kalilinux #hacker

    • @nome1036
      @nome1036 2 місяці тому

      Sir I don't fix my linux
      Whenever I want to install linux in virtual box so many times black screen comes and stuck.

    • @cyberdevil657
      @cyberdevil657 2 місяці тому

      Hi David!
      I used the affiliate link to support you!

    • @cyberdevil657
      @cyberdevil657 2 місяці тому

      God i am stupid i accidently removed my comment!!

    • @Ann-op5kj
      @Ann-op5kj 2 місяці тому

      Hi! Can you do a video on software updates and calls being diverted? Motorola 13 downloads a QR Code Scan that can't be removed. It's always on and won't turn off.
      Also Rob Braxman is good (just watched a video of your featuring him) but when it comes to your calls being diverted he is naive. He insists only governments can do this but I've had to change my phone number 5 times in 4 years because my phone is ALWAYS being diverted. I have gone to the police and have traveled internationally, I'm not a wanted woman... Just being stalked by a psycho.
      Please do an update to that video! Thank you

  • @CraigHollabaugh
    @CraigHollabaugh 2 місяці тому +9

    Glad you covered suid and sticky bit, its probably the most important section here.

  • @GoogelDeepMind2024
    @GoogelDeepMind2024 2 місяці тому +18

    So as a cyber security expert we use a little trick of rolling ("DICE") to pick any numbers used in a password. The best passwords are very long and different from anything anyone would imagine.

    • @ServusChristi777
      @ServusChristi777 2 місяці тому +1

      Is this a joke?

    • @GoogelDeepMind2024
      @GoogelDeepMind2024 2 місяці тому +2

      @@ServusChristi777 "Roll the dice & find out cyborg dude."

    • @anonymousghost946
      @anonymousghost946 2 місяці тому

      what you mean sir can you explain it plz

    • @tacticalcenter8658
      @tacticalcenter8658 2 місяці тому +1

      Rolling dice isn't as good as some devices can generate 24 word passwords.

    • @anonymousghost946
      @anonymousghost946 2 місяці тому

      @@tacticalcenter8658 Thanks for knowledge

  • @kartelune2730
    @kartelune2730 2 місяці тому +15

    We really enjoy the voice of OTW. Thanks David for the videos

    • @davidbombal
      @davidbombal  2 місяці тому

      You're welcome!

    • @SpiderCode.
      @SpiderCode. 2 місяці тому +3

      We really enjoy the voice of OTW,Vibrate,clean and clear.Thank you sir David for the videos

  • @hexyosyenite
    @hexyosyenite 2 місяці тому +2

    We really enjoy the voice of this guy(OTW). DAVID THANKS AND WE WISH YOU TO MAKE MORE INTERVIEWS WITH OTW

  • @user-ed7zt1ot8t
    @user-ed7zt1ot8t 2 місяці тому +8

    David really deserves millions of subs,cause he don't leave any garp in hacking and cyber security,❤❤❤❤❤❤

    • @davidbombal
      @davidbombal  2 місяці тому +1

      Thank you :)

    • @andyehara
      @andyehara 2 місяці тому +2

      He has Udemy classes on Udemy as well. I’m taking his class on networking as a refresher. His classes are very fun compared to some of the other classes I have take. I like more upbeat instructors because it makes it more fun to learn. But this is just my opinion.

  • @majiddehbi9186
    @majiddehbi9186 2 місяці тому +5

    hello david it's so great that you host Mr OTW again as I m preparing my exam of CCNP exam great I wil take advantage of this episode for security part thx and God bless u

  • @_PrateekTiwari
    @_PrateekTiwari 2 місяці тому +3

    20:22 GOU is described but o is not owner its others as later explained. Great video btw got to learn alot!

  • @takashimitsuya1343
    @takashimitsuya1343 2 місяці тому +1

    I study this few days ago but I jump in chapter 6 because it's hard sometimes when no one explains to you but now you upload this video. I hope you discuss with Mr.Anon the whole book. THANK YOU MR.DAVID❤

  • @lonwabobrandon304
    @lonwabobrandon304 2 місяці тому +1

    thanks for keeping us updated and I'm very new in the I.T industry still studying A+ N+ and fundamental for cyber the EPs really are helpful.

  • @rami.0092
    @rami.0092 2 місяці тому +1

    Big thanks to both of you. I appreciate what you do for us. And we are waiting for more and more from you.

    • @davidbombal
      @davidbombal  Місяць тому +1

      Hopefully lots more content coming soon :)

  • @nolananthony5880
    @nolananthony5880 2 місяці тому +1

    Thanks! For all your ideas ,support , and general understanding of my social ineptitude . Knowledge is the key to any success.

  • @michi.m
    @michi.m 2 місяці тому +1

    Awesome, we are back. Am reading the physical book. Listening to the videos to fill in

  • @techfan7808
    @techfan7808 2 місяці тому +2

    He says that on every channel he visits. "The best blah blah channel"

  • @istvanbarta
    @istvanbarta 2 місяці тому

    I love OTW! The way he's explaining and talking is relaxing and understandable.

  • @anishbhadouria3186
    @anishbhadouria3186 2 місяці тому +6

    Pls make a video with OTW that include topics like "Quantum Hacking.... Q - Day... AI Hackers.... Future of Cyber Security by 2030.... Scary reality of Cyber - War".... It's my humble request to David sir 🙏🙏🙏🙏🙏🙏🙏🙏

  • @Abduselam.m
    @Abduselam.m 2 місяці тому +3

    Thanks so much David

  • @user-lj6ch1io6m
    @user-lj6ch1io6m 2 місяці тому +1

    David, your educational videos are awesome! Could you make a video about port forwarding and tunneling?

  • @jasonpitts8395
    @jasonpitts8395 2 місяці тому

    Thx David. You always have the most relevant and useful videos related to cyber security.

  • @ten99j4
    @ten99j4 23 дні тому

    @davidbombal This series with OTW is great. Will you be adding further chapter coverage? The book is perfect for beginners.

  • @carsonjamesiv2512
    @carsonjamesiv2512 2 місяці тому

    I just finished reading ch. 5 of OTW's Linux Basics Book. I LIKE OTW's book!😃😎👍👍

  • @mjf.3300
    @mjf.3300 2 місяці тому

    Amazing and informative content, thank you David and OTW.

  • @1einszweidrei
    @1einszweidrei 2 місяці тому +1

    Excellent, as always!

  • @hexyosyenite
    @hexyosyenite 2 місяці тому +1

    I like this guy

  • @Tanhasecurity
    @Tanhasecurity 2 місяці тому

    When ever i see david, i am suprised that some thing new happen ❤

  • @kingsleymbonu8370
    @kingsleymbonu8370 Місяць тому +1

    Good morning david bombal when is Eps 7 coming out?

  • @LysanderDD
    @LysanderDD 2 місяці тому

    The explanation is good. Octal permission 4000 is called setuid though. The sticky bit is octal 1000 because this makes files sticky (staying where they are if you're not the owner and only have 'inferior' rights).

  • @John-yx2is
    @John-yx2is 2 місяці тому

    Thank you both. I love these Linux videos with OTW. David could you please interview Angelina Tsuboi. She is an amazing young woman- only about 20 years old- but works for NASA in cybersecurity. She has created many cybersecurity gadgets and specializes in aerospace cybersecurity such as aeroplanes, drones, satelites etc

  • @mainasir-gini5777
    @mainasir-gini5777 2 місяці тому

    always thankful for the knowledge....👏

  • @Crypto_sis
    @Crypto_sis 2 місяці тому

    Yayyyyy chapter 5 thank you so much!

  • @uruyuto
    @uruyuto 2 місяці тому

    Thanks for another awesome video :D
    Here i's an idea, maybe you (David) and Keith can prepare a challenge related to this Linux knowledge applied to an real life case of study on cloud/network security and OTW can act as the threat actor. Idk, just sharing some thoughts.

  • @flioink
    @flioink 2 місяці тому +1

    I was looking forward to this.

    • @davidbombal
      @davidbombal  2 місяці тому +1

      I hope you enjoy the video!

    • @flioink
      @flioink 2 місяці тому

      @@davidbombal Definitely did.
      Keep up the good work!

  • @ariasm8911
    @ariasm8911 2 місяці тому +3

    Any chance we get a video about kali purple and defensive security?

    • @davidbombal
      @davidbombal  2 місяці тому +2

      I'll look at this again as a few people have asked for it.

    • @ariasm8911
      @ariasm8911 2 місяці тому

      @@davidbombal TY

  • @volkan8583
    @volkan8583 2 місяці тому

    There is a mistake in the slide 22:19 that u and o representations! Good video!

  • @hollywoodhank591
    @hollywoodhank591 2 місяці тому

    At second 00:50 i have the same Book in your background!!! Its really nice! Jon Erickson!

  • @rusnakhraj7401
    @rusnakhraj7401 2 місяці тому

    David, I think that in time 20:22 there is a mistake. O is for others not for the owner. U is for user. OTW also mentioned it in wrong way compared to the linux permissions picture mentioned in 11:18. Or am I missing something? Thank you

  • @naifawad1065
    @naifawad1065 2 місяці тому +1

    My man always giving us knowledge

    • @davidbombal
      @davidbombal  2 місяці тому +1

      That's the goal! We need to share the knowledge :)

    • @ShadowsSpeak345
      @ShadowsSpeak345 2 місяці тому

      Luv you from Nepal ❤️

  • @BooksWeCanRead
    @BooksWeCanRead 2 місяці тому

    Do you have any videos explaining the ethics you practise with hacking or any steps you take to make sure you’re not teaching bad actors bad things?

  • @dustinhxc
    @dustinhxc 2 місяці тому

    OCCUPYTHEWEB!! Let’s gooooo! ❤

  • @TheSecurityAgency
    @TheSecurityAgency 2 місяці тому +1

    He made a mistake by callng o - owner.
    1. **u** - User (the file's owner)
    2. **g** - Group (the file's group owner)
    3. **o** - Others (all other users)
    4. **a** - All (user, group...)

  • @smzaman111
    @smzaman111 2 місяці тому

    Waiting for new version of OTW’s Linus for hackers. Amazon says it’s coming on 1 April 2025. Can’t wait that long. Will it be available earlier?

  • @markcostello4013
    @markcostello4013 2 місяці тому

    David, have you got any videos showing potential career/learning pathways to take depending on experience and after getting some of the well know basic certs out of the way A+, CCNA obviously good start but after this, there is so many ways to approach a new career in IT after this however.

  • @anonymousghost946
    @anonymousghost946 2 місяці тому

    I am trying to finish book but i can't but sir if you put video regularly i finish it under a month and thanks for your time david and otw sir

  • @CactusJack182
    @CactusJack182 2 місяці тому

    Thanks mr david i have a question for master otw wich operting system use hackers prefer windows or macOs ????❤

  • @jameswhite1450
    @jameswhite1450 2 місяці тому

    I have that book on preorder.

  • @wilk85
    @wilk85 2 місяці тому +2

    Its u- user g-group o-others not like otw said in introduction

  • @BitCloud047
    @BitCloud047 2 місяці тому

    Really great video, I always wondered why it was 777

  • @k_usuan
    @k_usuan 2 місяці тому

    Great content. Bravo!

  • @DanielGohou
    @DanielGohou 2 місяці тому

    Where is the first place your computer would look to find the ip adress of a domain ?

  • @rainerwahnsinn3265
    @rainerwahnsinn3265 2 місяці тому

    If you need to learn: David Bombal
    If you need to learn RIGHT NOW: Network Chuck

  • @zanyaboutit
    @zanyaboutit 2 місяці тому +1

    Misinformation: I was confused because 20:22 says U for all other users but right after that OTW types o+x to give execute permission to others. I searched and found out O is for others and U is for user (owner).

    • @zanyaboutit
      @zanyaboutit 2 місяці тому +1

      And I think it's not David's false (maybe not double checking, if any) because OTW himself said 20:22 part. And right after that he types o+x to give execute permission to others, so OTW was temporarily confused I guess.

  • @shubhamxthakur_
    @shubhamxthakur_ 10 днів тому

    I have created memory dump of the Kali Linux version 6.8.11 -amd 64 using avml command but the volatility 3 is not showing results it shows (Unsatisfied requirement plugins. Bash. kernel ,A translation layer requirement was not fulfilled,A symbol table requirement was not fulfilled) I tried to find symbols for the linux but they also didn't work Please Help.

  • @obranuu
    @obranuu 2 місяці тому

    Good job guys! We need more help from civilized world in this war!

  • @iyeetsecurity922
    @iyeetsecurity922 2 місяці тому

    You can do this with the Flipper Zero.

  • @m24vader
    @m24vader 2 місяці тому

    They are back 💯💪

    • @davidbombal
      @davidbombal  2 місяці тому

      I hope you enjoy the video :)

  • @Factshort225
    @Factshort225 2 місяці тому +1

    Sir best book 📚 for full cyber security 🤔👀 please 🙏 help me 🙏

  • @SMARTCLIQ
    @SMARTCLIQ 2 місяці тому

    Can you please tell, how do hackers like you learned hacking , from where didi you learned this skill? , we are learning from your video from where you learned?

  • @Asim-Mias
    @Asim-Mias Місяць тому

    Hi, I have an issue in my kali linux that is when i boot kali linux the terminal open automatically, i hope you can help me to solve this issue

  • @BufferTheHutt
    @BufferTheHutt 2 місяці тому

    Master OTW 😍😍😍

  • @ZeNex74
    @ZeNex74 2 місяці тому

    ep5 didnt think we ever moved on from ep2..

  • @kourygg8738
    @kourygg8738 2 місяці тому

    David l would love to see a tutorial about LVM please l really need this.

  • @user-ed7zt1ot8t
    @user-ed7zt1ot8t 2 місяці тому

    I love you so much otw,
    Especially you David,please tell otw that am aspiring to be like him❤

    • @davidbombal
      @davidbombal  2 місяці тому

      We can all learn so much from OTW :)

  • @dipanjanmandal1771
    @dipanjanmandal1771 2 місяці тому

    Thanks for the video sir

  • @IlIIllIlIlIIlIlIlIlIIl
    @IlIIllIlIlIIlIlIlIlIIl Місяць тому

    isn't him marcus hutchins or keith debus?

  • @Nobody-speedyspeedy
    @Nobody-speedyspeedy 2 місяці тому

    The Problem is that the login with Password is an insecure method. There a better option comming soon.

  • @cyberdevil657
    @cyberdevil657 2 місяці тому

    Hi David & OTW !

  • @anjurajput4139
    @anjurajput4139 2 місяці тому

    20:19 editin required

  • @anonymousghost946
    @anonymousghost946 2 місяці тому

    david sir Put at least 1 video in a week with otw sir

  • @IlIIllIlIlIIlIlIlIlIIl
    @IlIIllIlIlIIlIlIlIlIIl Місяць тому

    btw his name is Keith Debus.

  • @propolipropoli
    @propolipropoli 2 місяці тому

    Occupytheweb forever !!!!

  • @nome1036
    @nome1036 2 місяці тому

    Whenever I want to install linux in virtual box so many times black screen comes and stuck.

    • @davidbombal
      @davidbombal  2 місяці тому

      Please ask for help in my discord: discord.com/invite/usKSyzb

  • @takatoekoe
    @takatoekoe 2 місяці тому

    When is the second edition comming out

    • @davidbombal
      @davidbombal  2 місяці тому

      I don't have an exact date. Hopefully this year.

  • @Zagnikasalam
    @Zagnikasalam 2 місяці тому

    make video on bitcoin tracing with otw please🙏🙏🙏🙏🙏🙏

  • @TLOZ1986
    @TLOZ1986 2 місяці тому

    Best permissions chmod 600 / -R

  • @00Jimmy00
    @00Jimmy00 2 місяці тому

    did not mention chmod and gtfobins

  • @forsaken1776
    @forsaken1776 2 місяці тому

    since there's only one thumbs up here's more 👍👍👍👍👍👍👍👍👍👍

  • @guilherme5094
    @guilherme5094 2 місяці тому

    👍!

  • @richardcarberry831
    @richardcarberry831 2 місяці тому

    More like: Linux for sysadmins

  • @-SHADOW-300
    @-SHADOW-300 2 місяці тому

    I'm planning to buy a MacBook Air M1 for ethical hacking. I've heard that some hacking tools don't work on it and that there might be compatibility issues. Should I still buy this laptop? If anyone has experience using a MacBook Air M1 for ethical hacking, I'd appreciate your insights.

  • @Hwmestrey
    @Hwmestrey 2 місяці тому

    every one does it

  • @romansovetskikh7902
    @romansovetskikh7902 2 місяці тому

    stop otw now!

    • @_RaVeN33
      @_RaVeN33 2 місяці тому

      No you have it wrong - STOP PUTIN NOW! Have a blessed day!!

  • @Factshort225
    @Factshort225 2 місяці тому

    Best PC setup for hacking

    • @davidbombal
      @davidbombal  2 місяці тому

      Watch this video: ua-cam.com/video/3KYZ5yEqvY4/v-deo.html

    • @Factshort225
      @Factshort225 2 місяці тому

      @@davidbombal thanks 🙏 sir 😁

    • @ServusChristi777
      @ServusChristi777 2 місяці тому

      By far the best pc setup for hacking is your victim’s pc 👍🏻

  • @knewdist
    @knewdist 2 місяці тому

    😎

  • @rishiraj2548
    @rishiraj2548 2 місяці тому

    👍👍

  • @carsonjamesiv2512
    @carsonjamesiv2512 2 місяці тому

    😃👍

  • @Factshort225
    @Factshort225 2 місяці тому

    Hello 👋 sir

  • @entelin
    @entelin 2 місяці тому

    Linux's permission system sucks. The lack of NFSv4 ACL's makes using it as a conventional fileserver in a business setting a total pain and often just simply not viable. It also makes Samba integration far harder than it needs to be.

  • @hollywoodhank591
    @hollywoodhank591 2 місяці тому

    Second

    • @davidbombal
      @davidbombal  2 місяці тому

      Thank you for your support!

  • @isaacyukon5869
    @isaacyukon5869 2 місяці тому +1

    I will not be clicking on any links.
    Oh, is that not funny?

  • @bobanmilisavljevic7857
    @bobanmilisavljevic7857 2 місяці тому

    Finally, permission granted to see episode 5! 🦾😎

  • @hopeful_martian
    @hopeful_martian 2 місяці тому

    in ubuntu, I tried 'sudo find / -user root -perm 4000' but found none. It looks like ubuntu indicates the executable bit as 's' not 'x' if it has a setuid. ie rwsr-xr-x 1 root root 64152 Feb 6 07:53 /usr/bin/passwd