0% found this document useful (0 votes)
15 views4 pages

Unit 3

Uploaded by

xaeabhishek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

Unit 3

Uploaded by

xaeabhishek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Unit-3

Operating System Basics in Ethical Hacking


3.1. Introduction to Operating Systems
3.2. Windows and Linux Command Line Basics
3.3. Essential Commands for Ethical Hacking

3.1. Introduction to Operating Systems


An Operating System (OS) is the software that manages hardware resources and provides
essential services for computer programs. The OS serves as an interface between the user and
the hardware, enabling interaction with devices, managing files, and handling system
resources.

Key Functions of an OS:

1. Process Management: Handles the execution of processes and programs, ensuring they
have the necessary resources (CPU, memory, etc.).
2. Memory Management: Allocates and deallocates memory for processes.
3. File Management: Controls how data is stored and retrieved, managing files and
directories.
4. Device Management: Manages input and output devices, ensuring proper communication
between the system and external devices.
5. Security and Access Control: Ensures authorized access to system resources and
protects data from unauthorized access.

For ethical hackers, understanding the operating system is crucial as they often work to test the
security of systems running on various OS platforms.

Windows is a widely used operating system developed by Microsoft, primarily known for its
user-friendly interface and strong integration with Microsoft software applications. It provides a
graphical user interface (GUI) that includes elements like the Start Menu and Taskbar, making
navigation easy for users. Windows supports a wide range of hardware and software, which
makes it versatile for both home and business use. Security features such as Windows
Defender (an integrated antivirus), User Account Control (UAC) to prevent unauthorized system
changes, and BitLocker for full disk encryption help protect users.
However, Windows is often targeted by various types of malware, including viruses,
ransomware, and trojans, due to its large user base. Regular updates are necessary to patch
vulnerabilities and improve security, and the system can be prone to privilege escalation attacks
if not properly secured.

Linux, on the other hand, is an open-source operating system known for its security, stability,
and flexibility, especially in server and developer environments. It is based on the Linux kernel
and is available in various distributions such as Ubuntu, Fedora, and CentOS. One of the core
strengths of Linux is its strict user privilege model, which enforces the principle of least
privilege, making it less susceptible to certain types of attacks.

While Linux is often preferred for its reliability and performance, especially in cloud and server
environments, it still faces security challenges like rootkits and privilege escalation if not
properly configured. Linux is highly customizable and offers a robust command-line interface
(CLI), though it also has GUIs available. Being open-source, it enjoys strong community
support, with extensive documentation and resources for both developers and users.

3.2. Windows and Linux Command Line Basics


Windows Command Line (CMD or PowerShell):

Windows provides a command-line interface where users can perform various tasks using
commands.

Common Commands:

dir : Lists files and directories in the current folder.


cd : Changes the directory.
mkdir : Creates a new directory.
del : Deletes a file.
copy : Copies a file from one location to another.
netstat : Displays active connections and network statistics.
ipconfig : Displays network configuration and IP address details.
tasklist : Lists all running processes.
shutdown : Shuts down or restarts the computer.

PowerShell is more powerful than CMD, with advanced scripting capabilities. PowerShell
uses commands known as cmdlets and has access to a broader range of administrative
tasks.

Linux Command Line (Terminal):


Linux (Unix-based systems) relies heavily on the command-line interface for performing
tasks.

Common Commands:

ls : Lists files and directories.


cd : Changes the directory.
mkdir : Creates a new directory.
rm -r : Removes files or directories.
cp : Copies files or directories.
mv : Moves or renames files and directories.
ps : Displays the currently running processes.
ifconfig or ip a : Displays network interface configuration.
top : Displays resource usage (CPU, memory, etc.).
chmod : Changes file permissions.
sudo : Runs commands with elevated privileges (superuser).
apt-get / yum : Package managers for installing, updating, or removing software.

Linux commands are powerful and often require admin (root) permissions to perform more
critical system changes.

3.3. Essential Commands for Ethical Hacking


Ethical hacking often involves penetration testing and security auditing of systems. The
following commands and tools are critical for performing these tasks:

Networking and Scanning:

Windows:
netstat -an : Displays active network connections.
ping : Checks the network connectivity to a host.
tracert : Traces the route of packets to a destination.
telnet : Connects to remote systems via the Telnet protocol (though not secure).
nslookup : Queries DNS to resolve domain names.
Linux:
netstat -tuln : Displays listening ports and network connections.
ifconfig or ip a : Displays network interfaces and their configurations.
ping : Verifies network connectivity.
nmap : Network scanning tool for discovering devices, services, and open ports.
traceroute : Traces the path of packets to a destination.
dig : DNS lookup tool.

File System Exploration:

Windows:
dir : Lists files and directories.
attrib : Displays or changes file attributes.
find : Searches for a string in a file.
Linux:
ls -l : Lists files with detailed information.
find : Searches for files in a directory hierarchy.
cat : Displays the content of files.
grep : Searches for patterns in files.
locate : Finds files by name.

You might also like