Due Date: September 13, 2024
Linux Permission for files and directories Assignment
Linux Permissions Using chmod and Octal Numbers
In Linux, file permissions are a way to control who can read,
write, or execute a file or directory.
The chmod command is used to change the permissions of a
file or directory, often represented in an octal (numeric) format.
Your task is to take notes on the use of the permission
command chmod based on Mr. Cusack's instructions.
You will write the notes displayed on the board onto paper,
ensuring that you include a standard heading.
Name your file as follows: PX_LinuxPermissions_lastname.png.
Once completed, submit a photo of your notes to Google Classroom.
Read my notes below:
File Permissions Overview
Each file or directory has three sets of permissions, corresponding to three groups:
1. Owner (User): The person who owns the file.
2. Group: Other users who belong to the file's group.
3. Others (World): All other users on the system.
Each set has three types of permissions:
- Read (r): Ability to view the file's content.
- Write (w): Ability to modify the file's content.
- Execute (x): Ability to run the file (if it's a script or program) or access a directory.
Octal Numbers in chmod
Each of the three permissions (read, write, execute) is represented by a number:
- Read (r) = 4
- Write (w) = 2
- Execute (x) = 1
- No permission (-) = 0
To represent permissions in octal form, you sum the values for each group of permissions (owner, group, others).
Examples of Octal Permissions
Examples:
- rwx = 4 + 2 + 1 = 7 (read, write, execute)
- rw- = 4 + 2 + 0 = 6 (read, write, no execute)
- r-- = 4 + 0 + 0 = 4 (read-only)
So, a three-digit octal number defines the permissions for owner, group, and others. For example:
- 755:
- Owner: rwx (4 + 2 + 1 = 7)
- Group: r-x (4 + 0 + 1 = 5)
- Others: r-x (4 + 0 + 1 = 5)
This means the owner can read, write, and execute the file, while the group and others can only read and execute it.
Using chmod with Octal Numbers
The chmod command is used to set these permissions. For example:
chmod 755 filename
This sets the permissions so that:
- The owner can read, write, and execute.
- The group can read and execute.
- Others can read and execute.
Common Permission Codes:
- 777: Everyone can read, write, and execute.
- 755: Owner has full permissions, others can read and execute.
- 644: Owner can read and write, others can only read.
- 600: Only the owner can read and write.
Changing Permissions with Symbolic Mode
You can also use symbolic notation:
- chmod u+rwx adds read, write, and execute permissions for the owner (user).
- chmod g-w removes write permission from the group.
- chmod o+x adds execute permission for others.
This approach allows more granular control without using octal numbers.
Course Content
Unit 1 - Foundations and Threats
Unit 1 Assessment
Section 0.1 - First Day Info &s; Ethics Agreement
Lesson Plan
0.1.1 - First Day Info &s; Ethics Agreement Lesson Guide
PowerPoint Activity - Course Interest Survey
Ethics Agreement
Section 1.1 - CIA Triad and Authentication
Lesson Plan
A1.1.1 - Intro to Security Concepts Lesson Guide
PowerPoint Activity - Understanding the CIA Triad
Activity - Understanding the CIA Triad Answers
Activity - CIA Triad Card Game
Activity - CIA Triad Card Game Answers
B1.1.2 - Authentication Lesson Guide
PowerPoint Activity - Testing Password Strength
Activity - Safe Password Poster Instructions
Activity - Creating a Safe Password
1.1.3 - Authentication and Password Attacks Lesson Guide
PowerPoint Activity - Have you been Pwned?
C1.1.4 - Password Hashing Lesson Guide
PowerPoint Activity - Hashing &s; Salts with Cyber Chef
Activity - Our Rainbow Table spreadsheet
Activity - NIST Password Guidelines Worksheet
Activity - NIST Guidelines Article 1
Activity - NIST Guidelines Article 2
D1.1.5 - Methods of Authentication Lesson Guide
PowerPoint Activity - Which Authentication
Activity - Which Authentication Samples Answers
Activity - Extension - Biometric Authentication Product Pitch
Section 1.2 - Identifying Security Threats
Lesson Plan
E1.2.1 - Malicious Code - Part 1 Lesson Guide
PowerPoint Activity - Historic Malware - Teacher
Activity - Historic Malware - Student
Activity - Historic Malware - Reference Articles
Activity - Historic Malware Template
Activity - Malware Notes Sheet
F1.2.2 - Malicious Code - Part 2 Lesson Guide
PowerPoint
FSection 1.3 - Intro to CLI (Command Line Interface)
Lesson Plan
G1.3.1 - Virtualization Lesson Guide
PowerPoint
HH.Lab - Online Virtual Machine Access
II.Lab - Online Virtual Machine Access PPT
J1.3.2 - Command Line Interface - Linux Lesson Guide
PowerPoint Lab - Terminus Part 1
KK.Lab - Terminus Part 1 Answers
LL.Lab - Terminus Part 1 Map
MM.Lab - Terminus Part 1 PPT
NN.Lab - Password Cracking with John the Ripper
PP.Lab - Password Cracking with John the Ripper Answers
QQ.Lab - Password Cracking with John the Ripper PPT
Linux Commands Reference Sheet
RR.Lab - Extension - Windows CLI
SS.Lab - Extension - Windows CLI PPT
Unit 2 - Human Factor
Unit 2 - Assessment
Section 2.1 - Social Engineering
Lesson Plan
2.1.1 - Social Engineering Lesson Guide
PowerPoint Activity - 7 Steps of Hacking
Activity - 7 Steps of Hacking Answers
Activity - Extension - Social Engineering PSA Video Project
Activity - Extension - Social Engineering PSA Video Project Rubric
Lab - Social Engineering Toolkit
Lab - Social Engineering Toolkit PPT
Section 2.2 - Phishing and OSINT
Lesson Plan
2.2.1 - Phishing Lesson Guide
PowerPoint
2.2.2 - OSINT Lesson Guide
PowerPoint Activity - OSINT Report on Tony Stark
Activity - OSINT Report on Tony Stark Answers
2.2.3 - Phishing Myself Project Activity - Phishing Myself
Activity - Phishing Myself Product Template
Activity - Phishing Myself Rubric
2.2.4 - Mitigating the Human Risk Lesson Guide
PowerPoint Activity - SANS Clean Desk Policy
Activity - SANS Clean Desk Policy Answers
Unit 3 - Data Safety &s; Best Practices
Unit 3 - Assessment
Section 3.1 - Securing the System
Lesson Plan
3.1.1 - System Vulnerabilities Lesson Guide
PowerPoint Activity - CVE Named Vulnerabilities
Activity - CVE Named Vulnerabilities Answer Key
3.1.2 - System Hardening Part 1 Lesson Guide
PowerPoint Lab - MBSA Vulnerability Scan
Lab - MBSA Vulnerability Scan Answer Key
Lab - MBSA Vulnerability Scan PPT
Activity - Extension - Benchmark Selections Project
Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference
3.1.3 - System Hardening Part 2 Lesson Guide
PowerPoint Activity - Bingo Teacher Instructions
Activity - Bingo Game Securing the System PPT
Activity - Bingo Blank Sheets
Activity - Bingo Prefilled Cards
Section 3.2 - IoT Threat Modeling
Lesson Plan
3.2.1 - Threat Modeling &s; IOT Lesson Guide
PowerPoint Activity - IoT Spoons Game Teacher Instructions
Activity - IoT Spoons Game
Activity - My IoT Threat Model
Unit 4 - Cryptography &s; Linux
Unit 4 - Assessment
Section 4.1 - Bit, Binary, &s; Encoding
Lesson Plan
4.1.1 - Bits, Bytes, and Binary Lesson Guide
PowerPoint Activity - Binary Magic Cards
Activity - Binary Magic Cards Instructions
Activity - Binary to Decimal Worksheet
Activity - Binary to Decimal Worksheet Answers
4.1.2 - Hexadecimal Numbers Lesson Guide
PowerPoint ASCII Chart Handout
4.1.3 - Encoding Lesson Guide
PowerPoint Activity - CTF Introduction
Activity - Extension - Encoding on Mars PPT
Activity - Extension - Article: Encoding on Mars
Lab - Decoding with CTF Challenges
Lab - Decoding with CTF Challenges Answers
Lab - Decoding with CTF Challenges PPT
Section 4.2 - Cryptography Basics Concepts
Lesson Plan
4.2.1 - Cryptography Basic Concepts Lesson Guide
PowerPoint Activity - Breaking Ciphers
Activity - Breaking Ciphers Answers
Activity - Vigenere Try It Teacher
Activity - Optional Scavenger Hunt Instructions
Activity - Optional Scavenger Hunt Clues
Activity - Optional Scavenger Hunt Handout
4.2.2 - Steganography Lesson Guide
PowerPoint Lab - Steganography CTF
Lab - Steganography CTF Answers
Lab - Steganography PPT
Section 4.3 - Advanced Linux CLI
Lesson Plan
4.3.1 - Advanced Linux CLI Lesson Guide
PowerPoint Lab - Terminus Part 2
Lab - Terminus Part 2 Answers
Lab - Terminus Part 2 PPT
Lab - Searching Files with Grep
Lab - Searching Files with Grep Answers
Lab - Searching Files with Grep PPT
4.3.2 - Scripting Lesson Guide
PowerPoint Lab - Scripting in Linux
Lab - Scripting in Linux Answers
Lab - Scripting in Linux PPT
Section 4.4 - Privacy vs Security
Lesson Plan
4.4.1 - Privacy vs Security Debate Activity - Debate Instructions
Activity - Debate Rubric
Activity - Debate Instructor Resources
Activity - Debate Privacy Resources
Activity - Debate Security Resources
Unit 5 - Devices &s; Networks
Unit 5 - Assessment
Section 5.1 - Computer Components
Lesson Plan
5.1.1 - Computer Components Lesson Guide
PowerPoint Lab - Installing PC Components
Lab - Installing PC Components PPT
Section 5.2 - Networking Fundamentals
Lesson Plan
5.2.1 - Network Connections Lesson Guide
PowerPoint Activity - Net Puzzles
Activity - Net Puzzles Answers
5.2.2 - Network Naming Lesson Guide
PowerPoint Lab - ARP with Wireshark
Lab - ARP with Wireshark Answers
Lab - ARP with Wireshark PPT
Section 5.3 - Protocols &s; Packets
Lesson Plan
5.3.1 - Communicating in a Network Lesson Guide
PowerPoint Activity - Mobster Net Instructions
Tags - Do Not Deliver
Tags - Deliver
5.3.2 - Packet Delivery &s; Protocols Lesson Guide
PowerPoint Lab - Instructor PPT - Packet Analysis with Wireshark
Lab - Teacher Notes - Packet Analysis with Wireshark
Lab - Packet Analysis with Wireshark Student Worksheet
Lab - Packet Analysis with Wireshark Answers
Unit 6 - Law &s; Ethics
Unit 6 - Assessment
Section 6.1 - Law &s; Ethics
Lesson Plan
6.1.1 - Law &s; Ethics Lesson Guide
PowerPoint Activity - Cyber Crime and Punishment Poster
Activity - Cyber Crime and Punishment Poster Instructions
Activity - Ethics Agreement
Activity - US Laws on Cybercrimes
Activity - Crime Articles zipped folder
Unit 7 - Reconnaissance
Unit 7 - Assessment
Section 7.1 - Recon Intro and Google Dorking
Lesson Plan
7.1.1 - Intro and Google Dorking Lesson Guide
PowerPoint Activity - Recon with Google Dorks
Activity - Recon with Google Dorks Answers
Section 7.2 - WHOIS and Nslookup
Lesson Plan
7.2.1 - Recon with WHOIS Lesson Guide
PowerPoint Lab - Recon with WHOIS
Lab - Recon with WHOIS Answers
Lab - Recon with WHOIS PPT
7.2.2 - Recon with Nslookup Lesson Guide
PowerPoint Lab - Using Nslookup
Lab - Using Nslookup Answers
Lab - Using Nslookup PPT
Section 7.3 - Network Scanning
Lesson Plan
7.3.1 - IP Address &s; Subnet Masks Lesson Guide
PowerPoint Activity - Infection Detection Instructions
Activity - Infection Detection Print IP Addresses
Activity - Infection Detection PrintSwitch Net IDs
7.3.2 - Recon with Scanning Lesson Guide
PowerPoint Lab - Nmap &s; Zenmap Scanning
Lab - Nmap &s; Zenmap Scanning Answers
Lab - Nmap &s; Zenmap Scanning PPT
Unit 8 - Network &s; System Threats
Unit 8 - Assessment
Section 8.1 - Net Attacks DoS
Lesson Plan
8.1.1 - CLI for Networking Lesson Guide
PowerPoint Lab - CLI for Networking
Lab - CLI for Networking Answers
Lab - CLI for Networking PPT
8.1.2 - DoS Attacks Lesson Guide
PowerPoint Lab - SYN Flood DoS Attack
Lab - SYN Flood DoS Attack Answers
Lab - SYN Flood DoS Attack PPT
Section 8.2 - Spoofing &s; Sniffing
Lesson Plan
8.2.1 - Spoofing &s; Sniffing Lesson Guide
PowerPoint Lab - ARP Spoofing for DoS &s; AiTM Attacks
Lab - ARP Spoofing for DoS &s; AiTM Attacks Answers
Lab - ARP Spoofing for DoS &s; AiTM Attacks PPT
Section 8.3 - Wireless, Mobile, &s; VPNs
Lesson Plan
8.3.1 - Wireless, Mobile, &s; VPNs Lesson Guide
PowerPoint Lab - SSH Tunneling for Privacy
Lab - SSH Tunneling for Privacy PPT
Section 8.4 - Pentesting &s; Exploits
Lesson Plan
8.4.1 - Pentesting &s; Exploits Lesson Guide
PowerPoint Lab - Exploring Metasploit
Lab - Exploring Metasploit Answers
Lab - Exploring Metasploit PPT
8.4.2 - Attack Scenario Lesson Guide
PowerPoint Lab - Exfiltration with MimiKatz
Lab - Exfiltration wtih MimiKatz Answers
Lab - Exfiltration with MimiKatz PPT
Lab - Post-Exploitation
Lab - Post-Exploitation Answers
Lab - Post-Exploitation PPT
8.4.3 - Threat Hunting Tools Lesson Guide
PowerPoint Lab - Hunting a BackDoor
Lab - Hunting a BackDoor PPT
Section 8.5 - Cyber War
Lesson Plan
8.5.1 - Cyber Weapons Lesson Guide
PowerPoint Activity - Trial of EternalBlue Project Instructions
Activity - Trial of EternalBlue Project Timeline Infographic
Activity - Trial of EternalBlue Project Sandworm Resources
Activity - Trial of EternalBlue Project North Korea Resources
Activity - Trial of EternalBlue Project Brokers Resources
Activity - Trial of EternalBlue Project NSA Resources
Unit 9 - Securing Online Components
Unit 9 - Assessment
Section 9.1 - Basic Web Concepts
Lesson Plan
9.1.1 - Web Basics Lesson Guide
PowerPoint Lab - Exploring Developers Tool
Lab - Exploring Developers Tool PPT
Section 9.2 - Web Vulnerabilities
Lesson Plan
9.2.1 - Web Vulnerabilities Lesson Guide
PowerPoint Lab - Cookie Manipulation
Lab - Cooking Manipulation PPT
9.2.2 - User Input Threats Lesson Guide
PowerPoint Lab - Command Injection &s; XSS
Lab - Command Injection &s; XSS PPT
Section 9.3 - Databases and SQL Injection
Lesson Plan
9.3.1 - Databases and SQL Injection Lesson Guide
PowerPoint Lab - Basic SQL Commands
Lab - Basic SQL Commands Answers
Lab - Basic SQL Commands PPT
Lab - Exploring SQL Injection
Lab - Exploring SQL Injection PPT
Unit 10 - Encryption Security Tools
Unit 10 - Assessment
Section 10.1 - Symmetric and Asymmetric Encryption
Lesson Plan
10.1.1 - Symmetric Encryption Lesson Guide
PowerPoint Activity - Creating a Key Exchange
10.1.2 - Asymmetric Encryption Lesson Guide
PowerPoint Activity - Investigating RSA Keypairs
Section 10.2 - SSL for Online Security
Lesson Plan
10.2.1 - SSL for Online Security Lesson Guide
PowerPoint Lab - Decrypting SSL
Lab - Decrypting SSL Answers
Lab - Decrypting SSL PPT