Black-Hat Bash scripting part 13
Well, short vacation done…back to work
scheduled tasks
think of it as automated tasks that a certain command runs at a specified time, so if an attacker writes malicious instructions the system may execute them with elevated privileges, so you can make a privileged user, changing folder permissions( who has access to it). on linux there are two methods to go by this: cron and At.
Cron
At
this is less common than cron , which works by specifying the shell command
Exercise 14 writing a cron job script to find credentials
Hardware
to collect info of hardware related you can use commands such as lash, dmidecode and hwinfo.
phew, this took longer than i wanted it to, that’s all for know till next time
be blessed
references
https://stackoverflow.com/questions/3052867/bash-script-using-grep-to-search-for-a-pattern-in-a-file
https://www.cyberciti.biz/faq/search-for-files-in-bash/#google_vignette