Building on Linux Fundamentals Part 1, this room covers operators, SSH, advanced permissions, and common utilities. Think of operators as the glue that lets you combine commands into powerful one-liners. These skills are essential for efficient command-line work and scripting.
Prerequisites
Make sure you've completed Linux Fundamentals Part 1 first. This room builds directly on those concepts.
Shell Operators
Hiding Errors
Redirecting errors to /dev/null (a black hole) is useful during enumeration: "find / -name secret 2>/dev/null" shows results without permission denied spam.
SSH (Secure Shell)
Common Utilities
Special Permissions
SUID = Potential Privesc
SUID binaries are prime targets for privilege escalation. If a SUID binary owned by root has a vulnerability, you can escalate to root. Always enumerate SUID files on target systems!
Room Walkthrough
Linux Fundamentals Part 2 Tasks
1
SSH IntroductionLearn SSH syntax. Connect to the provided machine using credentials.
2
OperatorsPractice >, >>, |, &&, and &. Chain commands together.
3
File TransferUse SCP to copy files between machines. Practice wget/curl downloads.
4
Permissions Deep DiveIdentify SUID files. Understand special permission bits.
Knowledge Check
Key Takeaways
- > overwrites files, >> appends, | pipes between commands
- SSH provides secure remote access with password or key authentication
- SUID files run as owner - critical for privilege escalation
- wget/curl download files, SCP copies files over SSH
- 2>/dev/null hides error messages during enumeration