Unit 3
Unit 3
1. Process Management: Handles the execution of processes and programs, ensuring they
have the necessary resources (CPU, memory, etc.).
2. Memory Management: Allocates and deallocates memory for processes.
3. File Management: Controls how data is stored and retrieved, managing files and
directories.
4. Device Management: Manages input and output devices, ensuring proper communication
between the system and external devices.
5. Security and Access Control: Ensures authorized access to system resources and
protects data from unauthorized access.
For ethical hackers, understanding the operating system is crucial as they often work to test the
security of systems running on various OS platforms.
Windows is a widely used operating system developed by Microsoft, primarily known for its
user-friendly interface and strong integration with Microsoft software applications. It provides a
graphical user interface (GUI) that includes elements like the Start Menu and Taskbar, making
navigation easy for users. Windows supports a wide range of hardware and software, which
makes it versatile for both home and business use. Security features such as Windows
Defender (an integrated antivirus), User Account Control (UAC) to prevent unauthorized system
changes, and BitLocker for full disk encryption help protect users.
However, Windows is often targeted by various types of malware, including viruses,
ransomware, and trojans, due to its large user base. Regular updates are necessary to patch
vulnerabilities and improve security, and the system can be prone to privilege escalation attacks
if not properly secured.
Linux, on the other hand, is an open-source operating system known for its security, stability,
and flexibility, especially in server and developer environments. It is based on the Linux kernel
and is available in various distributions such as Ubuntu, Fedora, and CentOS. One of the core
strengths of Linux is its strict user privilege model, which enforces the principle of least
privilege, making it less susceptible to certain types of attacks.
While Linux is often preferred for its reliability and performance, especially in cloud and server
environments, it still faces security challenges like rootkits and privilege escalation if not
properly configured. Linux is highly customizable and offers a robust command-line interface
(CLI), though it also has GUIs available. Being open-source, it enjoys strong community
support, with extensive documentation and resources for both developers and users.
Windows provides a command-line interface where users can perform various tasks using
commands.
Common Commands:
PowerShell is more powerful than CMD, with advanced scripting capabilities. PowerShell
uses commands known as cmdlets and has access to a broader range of administrative
tasks.
Common Commands:
Linux commands are powerful and often require admin (root) permissions to perform more
critical system changes.
Windows:
netstat -an : Displays active network connections.
ping : Checks the network connectivity to a host.
tracert : Traces the route of packets to a destination.
telnet : Connects to remote systems via the Telnet protocol (though not secure).
nslookup : Queries DNS to resolve domain names.
Linux:
netstat -tuln : Displays listening ports and network connections.
ifconfig or ip a : Displays network interfaces and their configurations.
ping : Verifies network connectivity.
nmap : Network scanning tool for discovering devices, services, and open ports.
traceroute : Traces the path of packets to a destination.
dig : DNS lookup tool.
Windows:
dir : Lists files and directories.
attrib : Displays or changes file attributes.
find : Searches for a string in a file.
Linux:
ls -l : Lists files with detailed information.
find : Searches for files in a directory hierarchy.
cat : Displays the content of files.
grep : Searches for patterns in files.
locate : Finds files by name.