Hello again, it is I, Dutch. Here to give you some fundamentals and ideas of where you can continue learning if you truly desired it. Today we are going to talk about sudo-hacking as in we are going to talk about Linux.
Linux is a distro similar to Windows and Mac except we can use it with much less resources than the other which is ideal for lean computing. One of my friends who taught me about linux now works as a locksmith in Aventura and he says that the two are one in the same.
What is Linux
Linux is an open os which means anyone can take it and run with it. But it is comprised of different terms that are specific towards the OS itself.
“The OS is comprised of some pieces:
• The Bootloader: The software that manages the boot process of your computer. For most users, this will simply be a splash screen that pops up and eventually goes away to boot into the operating system.
• The kernel: This is the one piece of the whole that is called “Linux”. The kernel is the core of the system and manages the CPU, memory, and peripheral devices. The kernel is the “lowest” level of the OS.
• Daemons: These are background services (printing, sound, scheduling, etc) that either starts up during boot or after you log into the desktop.
• The Shell: You’ve probably heard mention of the Linux command line. This is the shell – a command process that allows you to control the computer via commands typed into a text interface. This is what, at one time, scared people away from Linux the most (assuming they had to learn a seemingly archaic command line structure to make Linux work). This is no longer the case. With modern desktop Linux, there is no need to ever touch the command line.
• Graphical Server: This is the sub-system that displays the graphics on your monitor. It is commonly referred to as the X server or just “X”.
• Desktop Environment: This is the piece of the puzzle that the users interact with. There are many desktop environments to choose from (Unity, GNOME, Cinnamon, Enlightenment, KDE, XFCE, etc.). Each desktop environment includes built-in applications (such as file managers, configuration tools, web browsers, games, etc.).” – Linux.com
How to Hack it?
Because there is an open terminal, it is highly possible to change, alter, and hack aspects of a Linux build with relative ease. In fact there is a theory that suggests that all viruses are from Linux and converted from there. Similar to how you get to have a mobile locksmith in Miami.
“Passwords are the sole criteria of system Security for most of the System. Moreover, when it comes to Linux, if you know the root password you owns the machine. Passwords are as a Security measure for BIOS, Login, Disk, Application, etc.
Linux is considered to be the most Secure Operating System to be hacked or cracked, and in reality it is, still we will be discussing some of the loop-holes and exploits of a Linux System. We will be using CentOS Linux throughout the article as an article to crack our own machine’s security.” – TecMint
More Research Material
There’s a great little game called ScopeCreep that can help you learn more about Linux and hacking. Check it out now!