All language subtitles for 3. Users and Privileges

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,150 --> 00:00:03,520 OK so now we're going to cover users and privileges. 2 00:00:03,660 --> 00:00:10,400 So in the last video we touched a little bit on privileges with our allies dash L.A. and we touched 3 00:00:10,400 --> 00:00:14,170 a little bit on users by changing the password of our route account. 4 00:00:14,310 --> 00:00:17,970 So now we'll cover a few more commands regarding those. 5 00:00:17,970 --> 00:00:20,730 So if we look again at s dash L.A. 6 00:00:23,970 --> 00:00:29,540 You could see all this crazy jumbled word EJ over here right. 7 00:00:29,580 --> 00:00:34,500 So it actually means something so we look at the first line here. 8 00:00:34,500 --> 00:00:41,270 If we see a dash like this a hyphen that means it's a file if we see a D. 9 00:00:41,280 --> 00:00:49,070 That means it's actually a directory and then you see our w an X so RW an X actually means read write 10 00:00:49,210 --> 00:00:50,100 execute. 11 00:00:50,270 --> 00:00:54,280 It's the permission settings that this particular group has. 12 00:00:54,380 --> 00:00:57,010 Now there are three groups here. 13 00:00:57,080 --> 00:01:00,860 There's the first second and then your third right here. 14 00:01:00,860 --> 00:01:01,830 Right. 15 00:01:01,880 --> 00:01:08,270 So your first group right here is the owner of the file. 16 00:01:08,330 --> 00:01:12,490 So it looks like the owner of the file has full read right execution. 17 00:01:12,560 --> 00:01:13,610 Right. 18 00:01:13,700 --> 00:01:20,090 And then the next set of three here is actually the permissions for the members of the group that own 19 00:01:20,090 --> 00:01:21,360 the file. 20 00:01:21,380 --> 00:01:25,940 So this is a group ownership as opposed to actual ownership here. 21 00:01:25,940 --> 00:01:31,250 So for the people that are in the group that has access to this file they can only read and execute. 22 00:01:31,250 --> 00:01:33,100 They can't write to it. 23 00:01:33,500 --> 00:01:36,710 Now for the last one this is just all of their users. 24 00:01:36,710 --> 00:01:40,960 So any common user here can actually just read and execute. 25 00:01:40,970 --> 00:01:42,730 They can't write the document. 26 00:01:43,130 --> 00:01:49,170 So that comes into play especially when we get into penetration testing because of penetration testing. 27 00:01:49,310 --> 00:01:51,860 We're looking to have full access right. 28 00:01:51,890 --> 00:01:55,620 So we're always going to be looking for that folder that has full read. 29 00:01:55,630 --> 00:01:56,300 Right. 30 00:01:56,310 --> 00:02:02,660 Typically if we look at temp that's our temp folder a lot of times you see the temple there has full 31 00:02:02,660 --> 00:02:03,650 read write execute. 32 00:02:03,740 --> 00:02:08,890 So when we're doing penetration testing we're trying to upload some sort of exploit. 33 00:02:08,900 --> 00:02:14,620 We might actually upload it into the temp folder because that's where we can execute those those files. 34 00:02:14,630 --> 00:02:21,980 However we could also be looking for other full read write execute files where we need to modify them 35 00:02:22,130 --> 00:02:24,890 and give us root access to a system. 36 00:02:24,920 --> 00:02:29,030 So it's all about insecure configurations. 37 00:02:29,030 --> 00:02:34,440 And we're going to cover that more once we get into the actual penetration testing part of the course. 38 00:02:34,460 --> 00:02:40,010 So for the Linux essentials part of the course all we need to worry about is these file permissions. 39 00:02:40,010 --> 00:02:44,960 Another important feature of that is if we were to create a script or scripts actually be to run until 40 00:02:44,960 --> 00:02:46,730 it has full access. 41 00:02:46,730 --> 00:02:49,320 So how do we change access here. 42 00:02:49,580 --> 00:02:51,890 So let's make a file. 43 00:02:51,950 --> 00:02:56,960 I'm just going to make will just echo another text document right. 44 00:02:56,990 --> 00:02:58,970 So we'll just say hello. 45 00:02:59,330 --> 00:03:01,850 And actually I type that it backwards. 46 00:03:02,460 --> 00:03:03,410 So hello. 47 00:03:03,500 --> 00:03:05,170 And we'll call it. 48 00:03:05,570 --> 00:03:06,550 Hello. 49 00:03:06,590 --> 00:03:14,320 Text slightly less here by default. 50 00:03:14,330 --> 00:03:18,180 We only have read write and then read access for everybody else. 51 00:03:18,230 --> 00:03:22,680 Meaning if we wanted to read it we could say cat which we're going to get into later. 52 00:03:23,090 --> 00:03:25,580 Cat hollowed out texts and it just says hello. 53 00:03:26,360 --> 00:03:34,910 So what can we do here where we can use something called change mode in changing mode is C H emoji and 54 00:03:34,910 --> 00:03:39,690 we have a couple options here so we can do a plus. 55 00:03:39,740 --> 00:03:40,160 Right. 56 00:03:40,190 --> 00:03:45,070 And we could say well we want read write execute or we just want execute. 57 00:03:46,580 --> 00:03:52,550 But another way I like doing it is you have a number feature. 58 00:03:52,640 --> 00:04:00,170 So the one you really need to know is all sevens sevens gives you full read write access across the 59 00:04:00,170 --> 00:04:01,160 board. 60 00:04:01,250 --> 00:04:06,430 So if we say C H mod seven seven seven hollowed out text. 61 00:04:07,010 --> 00:04:10,730 Now we l s L.A. and you notice that. 62 00:04:10,730 --> 00:04:11,240 Hello. 63 00:04:11,240 --> 00:04:12,710 That text turns green. 64 00:04:12,710 --> 00:04:14,930 That means it is full read right. 65 00:04:14,990 --> 00:04:15,910 And here you go. 66 00:04:15,920 --> 00:04:21,170 We've got the dash here saying it's a file and we've got read write execute across the board. 67 00:04:21,170 --> 00:04:23,740 So this is how we change file permissions. 68 00:04:23,900 --> 00:04:28,730 You don't need to necessarily know about the other numbers in terms of penetration testing it becomes 69 00:04:28,730 --> 00:04:34,400 more in terms of configuration and security management of files if you were to get down that path. 70 00:04:34,430 --> 00:04:41,060 So to stay on the easiest path just remember seven seven seven or plus X will work as well. 71 00:04:41,060 --> 00:04:46,670 So changing the mode is is critical and we're going to cover it time and time again throughout the course. 72 00:04:46,940 --> 00:04:48,950 Once we get a little bit deeper. 73 00:04:49,130 --> 00:04:51,810 So a couple more things we need to talk about. 74 00:04:51,920 --> 00:04:54,990 Say we wanted to add a new user. 75 00:04:55,120 --> 00:05:02,830 Well there's a feature called add user so we say add user and one or two names is allowed. 76 00:05:02,830 --> 00:05:06,470 So we need to add a user a John. 77 00:05:06,580 --> 00:05:06,910 OK. 78 00:05:06,940 --> 00:05:08,440 So it made something for John. 79 00:05:08,470 --> 00:05:16,930 Let's give him a password given password again and we'll just hit enter for the defaults. 80 00:05:16,930 --> 00:05:18,460 It's all correct. 81 00:05:18,460 --> 00:05:18,710 OK. 82 00:05:18,730 --> 00:05:28,510 So we now have a user named John and we can confirm that we can actually cat the Etsy password file 83 00:05:28,510 --> 00:05:33,870 here and you see down at the very bottom we have this user John. 84 00:05:33,900 --> 00:05:40,320 So this Etsy password file you're going to become very familiar with because it shows you all the users. 85 00:05:40,320 --> 00:05:45,180 Now this will this lot of times are you doing penetration testing you're going to have access is Etsy 86 00:05:45,200 --> 00:05:48,200 pass her file because it doesn't provide the password anymore. 87 00:05:48,210 --> 00:05:50,130 It used to a long time ago. 88 00:05:50,340 --> 00:05:56,460 Passwords are now in the shadow file so you actually have a little bit of access and information disclosure 89 00:05:56,460 --> 00:05:59,850 here at the hands of poor configuration. 90 00:05:59,850 --> 00:06:02,900 So you see that I've created a user John. 91 00:06:02,910 --> 00:06:04,980 Well that gives us a little bit more information. 92 00:06:04,980 --> 00:06:07,580 Say there's SSA each on a machine or something else. 93 00:06:07,680 --> 00:06:11,040 We can use that user name of John to try to break into the machine. 94 00:06:11,220 --> 00:06:13,830 So we'll cover that again later. 95 00:06:13,830 --> 00:06:22,470 But if we wanted to see what the Etsy shadow file looks like now we come in here and you've got these 96 00:06:23,190 --> 00:06:25,710 these jumbled stuff here right. 97 00:06:25,710 --> 00:06:28,050 So it's just a hashing format. 98 00:06:28,110 --> 00:06:37,200 So what we're doing is we can actually use a tool like hash cat to break this down and crack these passwords. 99 00:06:37,200 --> 00:06:43,920 Now a password a password will be very easy but just know that if you have access to the Etsy shadow 100 00:06:43,920 --> 00:06:49,140 file you have a good chance of cracking a password depending on your capabilities and depending on the 101 00:06:49,140 --> 00:06:52,570 strength of the password that allow you access to a machine. 102 00:06:52,590 --> 00:06:55,250 So something to think about their OK. 103 00:06:55,280 --> 00:06:57,770 So now we have our user John. 104 00:06:57,950 --> 00:07:04,070 Let's go ahead and switch to him so we can use something called SMU which stands for switch user will 105 00:07:04,140 --> 00:07:07,320 say switch user John OK. 106 00:07:07,350 --> 00:07:09,470 So automatically gave us John here. 107 00:07:09,480 --> 00:07:11,970 Let's see if we could switch back to root. 108 00:07:12,120 --> 00:07:16,260 We can't just switch back to root because we need root's password. 109 00:07:16,440 --> 00:07:16,710 Right. 110 00:07:16,740 --> 00:07:20,070 So we can type in password and that works. 111 00:07:20,070 --> 00:07:22,920 But if we didn't know the password then we'd be stuck on John. 112 00:07:23,040 --> 00:07:26,030 We are able to access John because we were already rude. 113 00:07:26,580 --> 00:07:29,700 So this comes into play in terms of users. 114 00:07:29,730 --> 00:07:30,990 Let's go back to John here 115 00:07:33,890 --> 00:07:34,440 now. 116 00:07:34,800 --> 00:07:40,260 If you're a user you have to be able to do certain things you need permission to do certain things I 117 00:07:40,260 --> 00:07:40,980 should say right. 118 00:07:41,010 --> 00:07:44,350 So root has full access and permission to do everything. 119 00:07:44,370 --> 00:07:45,810 But John we just created John. 120 00:07:45,810 --> 00:07:47,910 John doesn't have any sort of access. 121 00:07:47,910 --> 00:07:54,820 So if we wanted to if we wanted to change the password say we want to change the password for four root 122 00:07:56,890 --> 00:08:01,650 I can't modify the password information because I don't have that kind of access. 123 00:08:01,750 --> 00:08:07,330 Now there is something called a pseudo which would provide John the access if we gave it to him. 124 00:08:07,330 --> 00:08:15,250 So it's called a pseudo source file and basically anybody in that pseudo worse file can change permissions 125 00:08:15,250 --> 00:08:17,290 given if they are a pseudo user. 126 00:08:17,290 --> 00:08:18,050 Right. 127 00:08:18,070 --> 00:08:27,100 So we would type in pseudo password root and it's going to ask for the password for John but you're 128 00:08:27,100 --> 00:08:29,860 going to notice a John's not in the pseudo ours file. 129 00:08:29,860 --> 00:08:31,450 John can't do this. 130 00:08:31,450 --> 00:08:33,830 So John has base permissions right. 131 00:08:34,000 --> 00:08:38,350 And we're going to counter that a lot of times and penetration testing where if we get in we'll get 132 00:08:38,350 --> 00:08:43,780 something called Lower privilege and we'll get it and count like John and we're going to try to escalate 133 00:08:43,780 --> 00:08:45,580 into route but we just can't do it. 134 00:08:45,590 --> 00:08:52,360 You know the chances of doing a doing that and having a John in a pseudo risk file is just not high. 135 00:08:52,390 --> 00:08:54,790 It's possible but it's not likely. 136 00:08:54,790 --> 00:09:01,000 So for now just know that if you want a user other than route to have access to file permissions you 137 00:09:01,000 --> 00:09:06,070 need to have them in the pseudo file that becomes useful to penetration testing because you can look 138 00:09:06,070 --> 00:09:12,220 at the sewers file if you have access to see what users have sudo privileges OK. 139 00:09:12,250 --> 00:09:17,710 So that is it for this lesson and the next lesson we're going to be covering network commands and moving 140 00:09:17,710 --> 00:09:19,960 on gradually towards scripting. 141 00:09:19,960 --> 00:09:23,490 So let's go ahead and get there and I will see you when we get over there. 13496

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.