Black-Hat Bash scripting part 13

Emmanuel Wiseman
2 min readDec 22, 2024

--

Well, short vacation done…back to work

scheduled tasks

think of it as automated tasks that a certain command runs at a specified time, so if an attacker writes malicious instructions the system may execute them with elevated privileges, so you can make a privileged user, changing folder permissions( who has access to it). on linux there are two methods to go by this: cron and At.

Cron

At

this is less common than cron , which works by specifying the shell command

Exercise 14 writing a cron job script to find credentials

Hardware

to collect info of hardware related you can use commands such as lash, dmidecode and hwinfo.

phew, this took longer than i wanted it to, that’s all for know till next time

be blessed

references

https://stackoverflow.com/questions/3052867/bash-script-using-grep-to-search-for-a-pattern-in-a-file

https://www.cyberciti.biz/faq/search-for-files-in-bash/#google_vignette

--

--

Emmanuel Wiseman
Emmanuel Wiseman

Written by Emmanuel Wiseman

Just someone sharing knowledge on his cyber journey

No responses yet