DEV Community

Cover image for Examining Data About the Linux System
Urah
Urah

Posted on

Examining Data About the Linux System

As part of my journey in cybersecurity, I have learned about the complexity of Linux systems. Both system administration and security assessment require a thorough understanding of a system's design, operations, and configurations. Here's a quick list of some of the most significant Linux commands I have learned.

Fundamental System Details
whoami: Instantaneously show the active username. It is important to know what privileges you might have while gaining access to a system.

whoami
Enter fullscreen mode Exit fullscreen mode

Whoami is extended with id, which shows the user's ID and group memberships. When auditing account permissions, this information is quite helpful.

The hostname of the system you are currently logged into is printed or set. Easy to use but efficient for machine identification.

uname: This command yields comprehensive system information, including the name and version of the kernel and hardware specifications. When evaluating possible kernel vulnerabilities, the -a flag is useful because it shows all accessible information.

uname -a
Enter fullscreen mode Exit fullscreen mode

Networking Insights

ifconfig: For viewing and configuring network setups and network interface settings. It is necessary for diagnosing problems with networks.

ifconfig
Enter fullscreen mode Exit fullscreen mode

ip: You can control network interfaces, routing, and tunnels with this more contemporary option to ifconfig.

ip a
Enter fullscreen mode Exit fullscreen mode

Network status is shown via netstat, which also shows connections, routing tables, and interface information.

netstat -tuln
Enter fullscreen mode Exit fullscreen mode

Another excellent tool that provides thorough information for examining sockets and network connections is ss.

ss -tuln
Enter fullscreen mode Exit fullscreen mode

Handling Devices and Processes

  1. ps: Provides a list of active processes, which is helpful for debugging and keeping track of system activities.
ps aux
Enter fullscreen mode Exit fullscreen mode
  1. lsblk: Provides details about block devices and a storage device hierarchy.
lsblk
Enter fullscreen mode Exit fullscreen mode
  1. lsusb and lspci: These commands help identify connected hardware by listing USB and PCI devices, respectively.
lsusb
lspci
Enter fullscreen mode Exit fullscreen mode
  1. Lists of open files, or lsofs, are useful for troubleshooting system problems and looking into possible security risks.
lsof
Enter fullscreen mode Exit fullscreen mode

Getting Remote Access using SSH

One essential piece of technology that allows for safe remote access to Linux computers is SSH (Secure Shell). For those working in the disciplines of system administration and cybersecurity, it is an essential tool. One needs to be able to use SSH to log in and run commands remotely in order to perform system administration duties.

ssh username@remote_host
Enter fullscreen mode Exit fullscreen mode

With these tools, I’m building a strong foundation in Linux system management, which is crucial for both day-to-day operations and security assessments. This knowledge will also aid in discovering vulnerabilities and misconfigurations that could lead to privilege escalation—a critical skill in penetration testing


Conclusion

Mastering these Linux commands is just the beginning of my cybersecurity journey. If you're also exploring Linux or cybersecurity, I'd love to hear your thoughts! What are your go-to commands? Connect with me on Twitter and let’s share knowledge.

Image of Timescale

Timescale – the developer's data platform for modern apps, built on PostgreSQL

Timescale Cloud is PostgreSQL optimized for speed, scale, and performance. Over 3 million IoT, AI, crypto, and dev tool apps are powered by Timescale. Try it free today! No credit card required.

Try free

Top comments (2)

Collapse
 
thegrumpyopsdude profile image
JB

And I would like to add "dmesg" to this list, it's a really useful command to execute to look at the kernels latest information, it's just really a useful tool for troubleshooting and information gathering.

Collapse
 
b3secur3 profile image
Urah

Thank you for highlighting dmesg! Your feedback is precisely the reason I think this platform is so important; working together and exchanging knowledge truly aids in enhancing and perfecting our comprehension. I appreciate your contribution!

A Workflow Copilot. Tailored to You.

Pieces.app image

Our desktop app, with its intelligent copilot, streamlines coding by generating snippets, extracting code from screenshots, and accelerating problem-solving.

Read the docs

👋 Kindness is contagious

Dive into an ocean of knowledge with this thought-provoking post, revered deeply within the supportive DEV Community. Developers of all levels are welcome to join and enhance our collective intelligence.

Saying a simple "thank you" can brighten someone's day. Share your gratitude in the comments below!

On DEV, sharing ideas eases our path and fortifies our community connections. Found this helpful? Sending a quick thanks to the author can be profoundly valued.

Okay