Linux learning 1

快捷键集合:

[Ctrl]+[Alt]+[F1]~[F6]:命令行登入tty1~tty6终端

[Ctrl]+[Alt]+[F7] or [F8]:图形界面桌面

[Ctrl]+[Alt]+[Backspace]:切换用户(登出当前用户)

[Tab]:命令补齐,文件补齐

[Ctrl]+C:终止进程

[Ctrl]+d:结束键盘输入,有时相当于exit命令

命令集合:

date:显示日期命令

cal:显示日历命令

bc:计数器命令

man:在线帮助命令

info:在线帮助命令

sync:数据同步写入磁盘命令

shutdown:关机命令

reboot:机器重启命令

halt:关机命令

poweroff:关闭电源命令

chown:更改文件拥有者命令

chgrp:改变文件所属用户组命令

chmod:改变文件的属性,SUID等特性命令

su:变换用户身份命令

cd:切换目录

pwd:显示当前所在的目录

mkdir:建立新目录

rmdir:删除"空"目录

echo $PATH:显示环境变量PATH

ls:查看文件和目录

cp:复制文件或目录

rm:删除文件或目录

mv:移动文件与目录,或重命名

basename:获取路径的文件名

dirname:获取路径的目录名

cat(concatenate):display content of the specific file

tac:display content of the specific file,but with the different way.

 

Key Features Grasp the intricacies of the ELF binary format of UNIX and Linux Design tools for reverse engineering and binary forensic analysis Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes Book Description Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them. The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis. This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker. Table of Contents Chapter 1. The Linux Environment and Its Tools Chapter 2. The ELF Binary Format Chapter 3. Linux Process Tracing Chapter 4. ELF Virus Technology – Linux/Unix Viruses Chapter 5. Linux Binary Protection Chapter 6. ELF Binary Forensics in Linux Chapter 7. Process Memory Forensics Chapter 8. ECFS – Extended Core File Snapshot Technology Chapter 9. Linux /proc/kcore Analysis
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值