⚡ China has suspended its partnership with Alibaba Cloud Services — whose researcher discovered the critical Log4j vulnerability — because the company did not first report this flaw to the government as required by the country's new law.
Read: https://thehackernews.com/2021/12/china-suspends-deal-with-alibaba-for.html
Read: https://thehackernews.com/2021/12/china-suspends-deal-with-alibaba-for.html
Forwarded from CYBERMONKEYOFFICIAL
📚BEST BOOKS COLLECTION RELATED TO PROGRAMMING , HACKING ,PENETRATION TESTING , CYBERSECURITY
ALL UPLOADED LINK GIVEN BELOW
👉TAKE A LOOK
https://t.me/backupcybermonkeyofficials
📚BOOKS LIST-
📕Hands on web scrapping with python
📕Learning CPP by creating games
📕Android studio development essentials
📕Approaching almost any machine learning
📕C for beginners
📕Comptia cyber security
📕Guidebook
📕Trisha knowledge systems GATE
📕Web-based projects
📕Gate CSE
📕Algorithms notes for professional
📕Machine learning automation
📕Coding python
📕Python webscrapping
📕Python automation cook book
📕Deep learning with applications
📕IOT Development
📕Django 3
📕Sql cheatsheet
📕Logo set collection
📕Seo checklist
📕Traffic secrets Russell Brunson
📕How to prepare for data interpretation
📕SSC Civil
📕Python for devops
📕IOT Devices pentest
📕Facebook marketing mania
📕Affiate marketing and success
📕Hacking wireless networks
📕The art of intrusion
📕Machine learning with spark
📕Webapplication hackers handbook
📕Crypto dictionary
📕Industrial cybersecurity efficiency
📕Hardware hacking book
ALL UPLOADED LINK GIVEN BELOW
👉TAKE A LOOK
https://t.me/backupcybermonkeyofficials
📚BOOKS LIST-
📕Hands on web scrapping with python
📕Learning CPP by creating games
📕Android studio development essentials
📕Approaching almost any machine learning
📕C for beginners
📕Comptia cyber security
📕Guidebook
📕Trisha knowledge systems GATE
📕Web-based projects
📕Gate CSE
📕Algorithms notes for professional
📕Machine learning automation
📕Coding python
📕Python webscrapping
📕Python automation cook book
📕Deep learning with applications
📕IOT Development
📕Django 3
📕Sql cheatsheet
📕Logo set collection
📕Seo checklist
📕Traffic secrets Russell Brunson
📕How to prepare for data interpretation
📕SSC Civil
📕Python for devops
📕IOT Devices pentest
📕Facebook marketing mania
📕Affiate marketing and success
📕Hacking wireless networks
📕The art of intrusion
📕Machine learning with spark
📕Webapplication hackers handbook
📕Crypto dictionary
📕Industrial cybersecurity efficiency
📕Hardware hacking book
How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
https://infosecwriteups.com/how-i-found-multiple-sql-injection-with-ffuf-and-sqlmap-in-a-few-minutes-2824cd4dfab
https://infosecwriteups.com/how-i-found-multiple-sql-injection-with-ffuf-and-sqlmap-in-a-few-minutes-2824cd4dfab
Medium
How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
Hello all, hope you’re OK. Our journey today is about how I found multiple SQL Injections in a bug bounty program in just a few minutes…
Forwarded from Complete Ethical Hacking Bootcamp 2021
🔰 Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
⏱ 26 Hours 📦 232 Lessons
Learn Ethical Hacking + Penetration Testing from scratch and master the most modern ethical hacking tools and best practices for 2021! You will practice real techniques used by black hat hackers, then learn to defend against them.
Taught by: Andrei Neagoie & Aleksa Tamburkovski
Download Full Course-
https://t.me/ethicalhackingbootcamp
⏱ 26 Hours 📦 232 Lessons
Learn Ethical Hacking + Penetration Testing from scratch and master the most modern ethical hacking tools and best practices for 2021! You will practice real techniques used by black hat hackers, then learn to defend against them.
Taught by: Andrei Neagoie & Aleksa Tamburkovski
Download Full Course-
https://t.me/ethicalhackingbootcamp
Telegram
Complete Ethical Hacking Bootcamp 2021
🔰 Udemy - Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
🌐TESLA DISABLES GAMES ON MOVING CAR SEEMS AFTER US PROBES 5.8 LAKH CARS
🌐MICROSOFT INFORMS CUSTOMERS ABOUT SECURITY BUGS IN AZURE CLOUD
🌐DUCK DUCK GO WORKING ON PRIVACY-FOCUSED DESKTOP BROWSER
🌐EROS NOW PARTNERS GLOBAL NETWORKS INFOCOM TO EXPAND REACH IN INDIA
🌐BGMI DEVICE BAN FEATURE: KRAFTON BRINGS DEVICE BAN FEATURES
🌐CISA, FBI, AND NSA PUBLISH JOINT ADVISORY AND SCANNER FOR LOG4J VULNERABILITIES
🌐POPULAR WORDPRESS PLATFORM FLYWHEEL VULNERABLE TO SUBDOMAIN TAKEOVER, RESEARCHER CLAIMS
🌐FOXCONN'S INDIA UNIT BAHARAT FIH WHICH MAKES XIAOMI PHONES FILES FOR RS 5000 CR INDIAN IPO
🌐SUBMARINE CABLE FAULT SLOWS INTERNET SPEED IN PAKISTAN
🌐CHINA REGULATOR SUSPENDS CYBER SECURITY DEAL WITH ALIBABA DEAL
🌐CISCO SAYS WORKING WITH JIO, AIRTEL, VI TO IMPROVE 5G READY NETWORK EFFICIENCIES
🌐HUAWEI WATCH D WITH BLOOD PRESSURE, ECG MONITORING LAUNCHED
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
🌐TESLA DISABLES GAMES ON MOVING CAR SEEMS AFTER US PROBES 5.8 LAKH CARS
🌐MICROSOFT INFORMS CUSTOMERS ABOUT SECURITY BUGS IN AZURE CLOUD
🌐DUCK DUCK GO WORKING ON PRIVACY-FOCUSED DESKTOP BROWSER
🌐EROS NOW PARTNERS GLOBAL NETWORKS INFOCOM TO EXPAND REACH IN INDIA
🌐BGMI DEVICE BAN FEATURE: KRAFTON BRINGS DEVICE BAN FEATURES
🌐CISA, FBI, AND NSA PUBLISH JOINT ADVISORY AND SCANNER FOR LOG4J VULNERABILITIES
🌐POPULAR WORDPRESS PLATFORM FLYWHEEL VULNERABLE TO SUBDOMAIN TAKEOVER, RESEARCHER CLAIMS
🌐FOXCONN'S INDIA UNIT BAHARAT FIH WHICH MAKES XIAOMI PHONES FILES FOR RS 5000 CR INDIAN IPO
🌐SUBMARINE CABLE FAULT SLOWS INTERNET SPEED IN PAKISTAN
🌐CHINA REGULATOR SUSPENDS CYBER SECURITY DEAL WITH ALIBABA DEAL
🌐CISCO SAYS WORKING WITH JIO, AIRTEL, VI TO IMPROVE 5G READY NETWORK EFFICIENCIES
🌐HUAWEI WATCH D WITH BLOOD PRESSURE, ECG MONITORING LAUNCHED
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
🌐CHINESE CHAMBERS IN INDIA URGE TO CENTER TO CHANGE TAX PROBE PRACTICE AFTER IT SEARCHES
🌐RUSSIA FINES GOOGLE , META RECORD $125 MN OVER BANNED CONTENT
MICROSOFT INFORMS
🌐CUSTOMERS ABOUT SECURITY BUG IN AZURE CLOUD
MICROCHIP THAT STORES
🌐COVID-19 VACCINE PASS UNDER USERS SKIN MADE BY SWEDISH FIRM
FORMER SPACE X
🌐ENGINEERS TO LAUNCH ROBOT RESTAURANT THAT MAKES PIZZA IN 45 SEC
🌐GOOGLE FINED 98MILLION BY RUSSIA FOR FAILING TO DELETE BANNED CONTENT
🌐59 FILES ACCESSED DURING MITSUBISHI HACK PROBLEMATIC :JAPAN GOVT
🌐TORRENT FILES OF SPIDERMAN INFECTED WITH CRYPTO MINING MALWARE
🌐TESLA UPDATE ALLOWS DRIVERS TO TURN THEIR CARS INTO MEGAPHONES
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
🌐CHINESE CHAMBERS IN INDIA URGE TO CENTER TO CHANGE TAX PROBE PRACTICE AFTER IT SEARCHES
🌐RUSSIA FINES GOOGLE , META RECORD $125 MN OVER BANNED CONTENT
MICROSOFT INFORMS
🌐CUSTOMERS ABOUT SECURITY BUG IN AZURE CLOUD
MICROCHIP THAT STORES
🌐COVID-19 VACCINE PASS UNDER USERS SKIN MADE BY SWEDISH FIRM
FORMER SPACE X
🌐ENGINEERS TO LAUNCH ROBOT RESTAURANT THAT MAKES PIZZA IN 45 SEC
🌐GOOGLE FINED 98MILLION BY RUSSIA FOR FAILING TO DELETE BANNED CONTENT
🌐59 FILES ACCESSED DURING MITSUBISHI HACK PROBLEMATIC :JAPAN GOVT
🌐TORRENT FILES OF SPIDERMAN INFECTED WITH CRYPTO MINING MALWARE
🌐TESLA UPDATE ALLOWS DRIVERS TO TURN THEIR CARS INTO MEGAPHONES
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Cybercrime Attack Types
Cybercrime can attack in various ways. Here, is some most common cybercrime attack mode:
Hacking:
It is an act of gaining unauthorized access to a computer system or network.
Denial Of Service Attack:
In this cyberattack, the cyber-criminal uses the bandwidth of the victim’s network or fills their e-mail box with spammy mail. Here, the intention is to disrupt their regular services.
Software Piracy:
Theft of software by illegally copying genuine programs or counterfeiting. It also includes the distribution of products intended to pass for the original.
Phishing:
Pishing is a technique of extracting confidential information from the bank/financial institutional account holders by illegal ways.
Spoofing:
It is an act of getting one computer system or a network to pretend to have the identity of another computer. It is mostly used to get access to exclusive privileges enjoyed by that network or computer.
Cybercrime can attack in various ways. Here, is some most common cybercrime attack mode:
Hacking:
It is an act of gaining unauthorized access to a computer system or network.
Denial Of Service Attack:
In this cyberattack, the cyber-criminal uses the bandwidth of the victim’s network or fills their e-mail box with spammy mail. Here, the intention is to disrupt their regular services.
Software Piracy:
Theft of software by illegally copying genuine programs or counterfeiting. It also includes the distribution of products intended to pass for the original.
Phishing:
Pishing is a technique of extracting confidential information from the bank/financial institutional account holders by illegal ways.
Spoofing:
It is an act of getting one computer system or a network to pretend to have the identity of another computer. It is mostly used to get access to exclusive privileges enjoyed by that network or computer.
Cyber Crime Tools
There are many types of Digital forensic tools
Kali Linux:
Kali Linux is an open-source software that is maintained and funded by Offensive Security. It is a specially designed program for digital forensics and penetration testing.
Ophcrack:
This tool is mainly used for cracking the hashes, which are generated by the same files of windows. It offers a secure GUI system and allows you to runs on multiple platforms.
EnCase:
This software allows an investigator to image and examine data from hard disks and removable disks.
SafeBack:
SafeBack is mainly using for imaging the hard disks of Intel-based computer systems and restoring these images to some other hard disks.
Data dumper:
This is a command-line computer forensic tool. It is freely available for the UNIX Operating system, which can make exact copies of disks suitable for digital forensic analysis.
Md5sum:
A tool to check helps you to check data is copied to another storage successfully or not.
There are many types of Digital forensic tools
Kali Linux:
Kali Linux is an open-source software that is maintained and funded by Offensive Security. It is a specially designed program for digital forensics and penetration testing.
Ophcrack:
This tool is mainly used for cracking the hashes, which are generated by the same files of windows. It offers a secure GUI system and allows you to runs on multiple platforms.
EnCase:
This software allows an investigator to image and examine data from hard disks and removable disks.
SafeBack:
SafeBack is mainly using for imaging the hard disks of Intel-based computer systems and restoring these images to some other hard disks.
Data dumper:
This is a command-line computer forensic tool. It is freely available for the UNIX Operating system, which can make exact copies of disks suitable for digital forensic analysis.
Md5sum:
A tool to check helps you to check data is copied to another storage successfully or not.
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
🌐PM MODI LAUNCHES BLOCKCHAIN BASED DIGITAL DEGREES AT IIT KANPUR CONVOCATION
🌐AMAZON FIXES ERROR THAT LED ALEXA TO TELL 10-YR-OLD TO TRY LETHAL OUTLET CHALLENGE
🌐APPLE TO LAUNCH IPHONES WITHOUT SIM CARD SLOT BY SEPTEMBER 2022
🌐FERRARI TO MAKE EXCLUSIVE DIGITAL CONTENT FOR FANS WITH SWISS FIRM
🌐LAWSUIT CLAIMING LINKEDIN OVERCHARGED ADVERTISERS DISMISSED IN US
🌐RELIANCE JIO PLANNING TO RAISE UP TO RS 8000 CRORE VIA BONDS
🌐PLI SCHEME A GAME CHANGER IN ATTRACTING GLOBAL FIRMS TO SET UP SHOP IN INDIA: FINANCE MINISTER NIRMALA SITHARAMAN
🌐ITALY TO USE TIM-LED PROJECT AS BLUEPRINT IN NATIONAL CLOUD TENDER
🌐BHARTI-BACKED ONEWEB LAUNCHES 36 MORE SATELLITES TO BRING IN-ORBIT CONSTELLATION TO 394 SATELLITES
🌐KARNATAKA CID PROBE REVEALS HACKER USED HOTEL IP ADDRESS TO STEAL RS 11.5 CR FROM GOVT PORTAL
🌐APPLE PATCHED A MACOS GATEKEEPER BYPASS VULNERABILITY
🌐1.9 MILLION PEOPLE DATA IS UP FOR SALE AFTER HACK OF VIETNAMESE CRYPTO TRADING APP ONUS
🌐T-MOBILE CYBERATTACK:CUSTOMER INFO EXPOSED IN NEW MOBILE DATA BREACH
🌐OFFICIAL DATA OF MINISTRY OF FINANCE GETS HACKED IN A RECENT PHISHING ATTACK
🌐MON HEALTH PHISHING ATTACK , ACCOUNT TAKEOVER IMPACATS DATA OF 398K PATIENTS
🌐POLYGON BUIDL IT BECOMES INDIA'S EXCLUSIVE AND LARGEST WEB3 HACKATHON WITH 186 PROJECTS
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
🌐PM MODI LAUNCHES BLOCKCHAIN BASED DIGITAL DEGREES AT IIT KANPUR CONVOCATION
🌐AMAZON FIXES ERROR THAT LED ALEXA TO TELL 10-YR-OLD TO TRY LETHAL OUTLET CHALLENGE
🌐APPLE TO LAUNCH IPHONES WITHOUT SIM CARD SLOT BY SEPTEMBER 2022
🌐FERRARI TO MAKE EXCLUSIVE DIGITAL CONTENT FOR FANS WITH SWISS FIRM
🌐LAWSUIT CLAIMING LINKEDIN OVERCHARGED ADVERTISERS DISMISSED IN US
🌐RELIANCE JIO PLANNING TO RAISE UP TO RS 8000 CRORE VIA BONDS
🌐PLI SCHEME A GAME CHANGER IN ATTRACTING GLOBAL FIRMS TO SET UP SHOP IN INDIA: FINANCE MINISTER NIRMALA SITHARAMAN
🌐ITALY TO USE TIM-LED PROJECT AS BLUEPRINT IN NATIONAL CLOUD TENDER
🌐BHARTI-BACKED ONEWEB LAUNCHES 36 MORE SATELLITES TO BRING IN-ORBIT CONSTELLATION TO 394 SATELLITES
🌐KARNATAKA CID PROBE REVEALS HACKER USED HOTEL IP ADDRESS TO STEAL RS 11.5 CR FROM GOVT PORTAL
🌐APPLE PATCHED A MACOS GATEKEEPER BYPASS VULNERABILITY
🌐1.9 MILLION PEOPLE DATA IS UP FOR SALE AFTER HACK OF VIETNAMESE CRYPTO TRADING APP ONUS
🌐T-MOBILE CYBERATTACK:CUSTOMER INFO EXPOSED IN NEW MOBILE DATA BREACH
🌐OFFICIAL DATA OF MINISTRY OF FINANCE GETS HACKED IN A RECENT PHISHING ATTACK
🌐MON HEALTH PHISHING ATTACK , ACCOUNT TAKEOVER IMPACATS DATA OF 398K PATIENTS
🌐POLYGON BUIDL IT BECOMES INDIA'S EXCLUSIVE AND LARGEST WEB3 HACKATHON WITH 186 PROJECTS
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
https://youtu.be/f00EnuMz8fk
*Start making YouTube videos again*
*Don't forget to subscribe*
*Like and Share our video*
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
*Start making YouTube videos again*
*Don't forget to subscribe*
*Like and Share our video*
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
https://youtu.be/KmrPSjyCvGs
New video why Phishing is too dangerous attack
Share and support
Don't forget to subscribe
New video why Phishing is too dangerous attack
Share and support
Don't forget to subscribe
https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q
Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned «https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's ❤️❤️ Enjoy and Share…»
https://youtu.be/vN8TWtfPZrI
*If you want to learn Cyber security in free then watch this video*
*How to learn cyber security in free*
*How i learn cyber security*
*How to learn cyber security from Google and YouTube*
*How to learn Cyber security from github and movies*
*How to learn cyber security from people's and groups*
*How to find leaked courses*
*If you want to learn Cyber security in free then watch this video*
*How to learn cyber security in free*
*How i learn cyber security*
*How to learn cyber security from Google and YouTube*
*How to learn Cyber security from github and movies*
*How to learn cyber security from people's and groups*
*How to find leaked courses*
Freelearningtech pinned «https://youtu.be/vN8TWtfPZrI *If you want to learn Cyber security in free then watch this video* *How to learn cyber security in free* *How i learn cyber security* *How to learn cyber security from Google and YouTube* *How to learn Cyber security from…»
➕ CHMOD, CHGRP, CHOWN ➕
Today i write an post about those three commands, maybe you heard already about it.
You can list files by using the command »ls« and adding the parameter »-l«.
ls -l Course/
insgesamt 0
drwxr-sr-x 1 root mrblackx 546 29. Nov 15:58 'Hacking'
As you can see here i list he directory "Course" now let's go deeper:
drwxr-sr-x
d
= directory
r = Read
w = Write
x = eXecute
- = Permission not set.
There are 3 places for one group/user
The first place would be for yourself for the owner (do echo $USER so see your current username). Your current username is the owner.
The second place has the group xyz(depends on the group which exists). You can list group by groups command.
The third place has other permissions.
In our case (
drwxr-sr-x
)
The owner has r(read), w(write) and x(execute) permissions, the group has r(read), -(not write permission) and s(setgid/setuid which is the same as x(execute permission)) and others has r(read), -(not write permission) and x(execute).
If the first character is a - instead of a d(directory) then it's a file. There are different first characters:
- = Regular File
d = Directory
l = Symbolic Link
You maybe saw the command "chmod 755 *", those numbers has the same effect such as chmod a=rwx *.
◾️Character 1: as we said before it indicates if this is a file (–) or a directory (d).
◾️2-4: permissions for the user owner (in this case rwx)
◾️5-7: permissions for the group owner (in this case rwx)
◾️8-10: permissions for others (any user who is not the user owner or is not part of the group owner – in this case r-x)
I hope you understand characters:
d r w x r - x r - -
1 2 3 4 5 6 7 8 9 10
(without the spaces i used spaces for better overview)
The octal number comes from the sum of the following numbers:
◾️4 for the read permission
◾️2 for the write permission
◾️1 for the execute permission
Source of this little table : codefather.tech/blog/chmod-755-command/
As you saw the 755 is equals to :
rwxr-xr-x
chmod 777 would be
rwxrwxrwx
Chmod Examples:
To give only user read, write and execute you can do:
touch test
ls -l test
Output :
-rw-r--r--
chmod u=rwx test
.txt
ls -l test
.txt
Output : -rwxr--r--
We use here u= for the current user, o= would be other and g= group.
Possible permissions:
User : u=r, u=rw, u=rwx
Group : g=r, g=rw, g=rwx
Other : o=r, o=rw, o=rwx
Next :
root mrblackx
This is printed because the first would be the user who owns the permission of the current file and the second would be the group which als owns the file permission. In my case the user root owns by the group mrblackx the file permissions.
You can change the owner and the owner group by using the commands chgrp and chown.
If my user is mrblackx and my brother marcus want to use the file or the file is only for marcus then i will type for example :
chown marcus test
.txt
command | user | file
Well we the group would be still mrblackx because we did not changed the group.
chgrp marcus test.txt
If the user is super user(which should not be) then you need to add sudo, otherwise the operation is not allowed to do.
546 29. Nov 15:58 'Hacking'
This is the last block which is very easy to explain.
The
546
is the size of the file. The block 29 Nov 15:58 is the date and the exact time when the file was created. 'Hacking' is the folder name.
Sources which helped me a lot to learn this topic :
✔️ https://linuxize.com/post/chmod-command-in-linux/
✔️ https://linuxize.com/post/chgrp-command-in-linux/
✔️ https://linuxize.com/post/linux-chown-command/
Today i write an post about those three commands, maybe you heard already about it.
You can list files by using the command »ls« and adding the parameter »-l«.
ls -l Course/
insgesamt 0
drwxr-sr-x 1 root mrblackx 546 29. Nov 15:58 'Hacking'
As you can see here i list he directory "Course" now let's go deeper:
drwxr-sr-x
d
= directory
r = Read
w = Write
x = eXecute
- = Permission not set.
There are 3 places for one group/user
The first place would be for yourself for the owner (do echo $USER so see your current username). Your current username is the owner.
The second place has the group xyz(depends on the group which exists). You can list group by groups command.
The third place has other permissions.
In our case (
drwxr-sr-x
)
The owner has r(read), w(write) and x(execute) permissions, the group has r(read), -(not write permission) and s(setgid/setuid which is the same as x(execute permission)) and others has r(read), -(not write permission) and x(execute).
If the first character is a - instead of a d(directory) then it's a file. There are different first characters:
- = Regular File
d = Directory
l = Symbolic Link
You maybe saw the command "chmod 755 *", those numbers has the same effect such as chmod a=rwx *.
◾️Character 1: as we said before it indicates if this is a file (–) or a directory (d).
◾️2-4: permissions for the user owner (in this case rwx)
◾️5-7: permissions for the group owner (in this case rwx)
◾️8-10: permissions for others (any user who is not the user owner or is not part of the group owner – in this case r-x)
I hope you understand characters:
d r w x r - x r - -
1 2 3 4 5 6 7 8 9 10
(without the spaces i used spaces for better overview)
The octal number comes from the sum of the following numbers:
◾️4 for the read permission
◾️2 for the write permission
◾️1 for the execute permission
Source of this little table : codefather.tech/blog/chmod-755-command/
As you saw the 755 is equals to :
rwxr-xr-x
chmod 777 would be
rwxrwxrwx
Chmod Examples:
To give only user read, write and execute you can do:
touch test
ls -l test
Output :
-rw-r--r--
chmod u=rwx test
.txt
ls -l test
.txt
Output : -rwxr--r--
We use here u= for the current user, o= would be other and g= group.
Possible permissions:
User : u=r, u=rw, u=rwx
Group : g=r, g=rw, g=rwx
Other : o=r, o=rw, o=rwx
Next :
root mrblackx
This is printed because the first would be the user who owns the permission of the current file and the second would be the group which als owns the file permission. In my case the user root owns by the group mrblackx the file permissions.
You can change the owner and the owner group by using the commands chgrp and chown.
If my user is mrblackx and my brother marcus want to use the file or the file is only for marcus then i will type for example :
chown marcus test
.txt
command | user | file
Well we the group would be still mrblackx because we did not changed the group.
chgrp marcus test.txt
If the user is super user(which should not be) then you need to add sudo, otherwise the operation is not allowed to do.
546 29. Nov 15:58 'Hacking'
This is the last block which is very easy to explain.
The
546
is the size of the file. The block 29 Nov 15:58 is the date and the exact time when the file was created. 'Hacking' is the folder name.
Sources which helped me a lot to learn this topic :
✔️ https://linuxize.com/post/chmod-command-in-linux/
✔️ https://linuxize.com/post/chgrp-command-in-linux/
✔️ https://linuxize.com/post/linux-chown-command/
CODEFATHER
Chmod 755 Command: What Does it Do? - Codefather
The chmod command allows to set permissions for files and directories in Linux. In this article you will learn the meaning of the chmod 755 command.
Forwarded from ☠️🇮🇳 ༄ᴹᴿ°᭄ANON࿐ 🇮🇳☠️ [OFFLINE]🤡
Media is too big
VIEW IN TELEGRAM
🅷🅰🅲🅺_🅰🅽🆈🅾🅽🅴_
🅵🆁🅾🅽🆃_🅲🅰🅼🅴🆁🅰_🅹🆄🆂🆃_🆂🅴🅽🅳🅸🅽🅶_🅰_🅵🅴🆂🆃🅸🆅🅻_🆆🅸🆂🅷🅸🅽🅶_🅻🅸🅽🅺📸📸😍
ⱤɆ₳Đ ł₮ ₵₳ⱤɆ₣ɄⱠⱠɎ 🔥
(All Commands is Here😍)👇
https://telegra.ph/Hack-Anyones-Front-camera-just-Sending-a-festival-wishing-link-12-30
If you don't want to download then play video online using Google drive or Mega link 👇
Gdrive:- https://bit.ly/32tSXtW
Mega :- https://bit.ly/3EEJMne
🎩ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴɪʙʟᴇ ғᴏʀ ᴀɴʏᴛʜɪɴɢ ʏᴏᴜ ᴅᴏ ᴜsɪɴɢ this ɪɴғᴏʀᴍᴀᴛɪᴏɴ. ᴘʟᴇᴀsᴇ ᴅᴏɴ'ᴛ ʜᴀʀᴍ ᴀɴʏᴏɴᴇ. ᴛʜɪs ᴘᴏsᴛ ɪs sᴛʀɪᴄᴛʟʏ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏsᴇ.🎩
❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
🅵🆁🅾🅽🆃_🅲🅰🅼🅴🆁🅰_🅹🆄🆂🆃_🆂🅴🅽🅳🅸🅽🅶_🅰_🅵🅴🆂🆃🅸🆅🅻_🆆🅸🆂🅷🅸🅽🅶_🅻🅸🅽🅺📸📸😍
ⱤɆ₳Đ ł₮ ₵₳ⱤɆ₣ɄⱠⱠɎ 🔥
(All Commands is Here😍)👇
https://telegra.ph/Hack-Anyones-Front-camera-just-Sending-a-festival-wishing-link-12-30
If you don't want to download then play video online using Google drive or Mega link 👇
Gdrive:- https://bit.ly/32tSXtW
Mega :- https://bit.ly/3EEJMne
🎩ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴɪʙʟᴇ ғᴏʀ ᴀɴʏᴛʜɪɴɢ ʏᴏᴜ ᴅᴏ ᴜsɪɴɢ this ɪɴғᴏʀᴍᴀᴛɪᴏɴ. ᴘʟᴇᴀsᴇ ᴅᴏɴ'ᴛ ʜᴀʀᴍ ᴀɴʏᴏɴᴇ. ᴛʜɪs ᴘᴏsᴛ ɪs sᴛʀɪᴄᴛʟʏ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏsᴇ.🎩
❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️