Linux Basics

Null Bangalore Puliya Session

20 February 2016

Slides

Abstract

We created a Repository to catalogue all details we discussed or found later in one place.
We will be covering following

Basic’s of linux file system hirarchy
Useful commands

VIM Editor Basics

Automating Routine Tasks

Interacting with other commands
overloading existing command to do more
writing shell scripts (Introduction)

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation by Anant Shrivastava at a Null Meet Bangalore Puliya session provides a foundational introduction to Linux for security professionals. Covering everything from the Unix/Linux family tree and filesystem basics through essential commands, shell scripting, SSH configuration, and task automation via cron, the session is designed as a hands-on primer to equip attendees with the practical Linux skills needed for security work. The talk includes scripting exercises and covers topics specifically relevant to security practitioners such as file permissions, privilege escalation concepts, and service configuration.

Key Topics Covered

Actionable Takeaways

  1. Master the core text processing pipeline (grep, sed, sort, uniq, cut, xargs) as these commands form the backbone of log analysis, data extraction, and security scripting on Linux systems.
  2. Set up SSH key-based authentication and disable password login on all servers you manage — this is a baseline security practice that eliminates brute-force password attacks.
  3. Understand Linux file permissions including SUID/SGID bits, as these are common vectors for privilege escalation in penetration testing engagements.
  4. Use crontab to automate recurring security tasks such as vulnerability scans, log collection, and backup verification rather than relying on manual execution.
  5. Practice shell scripting by building small utility scripts for your security workflow — start with the exercises in this presentation (simple interest, even/odd, prime numbers) to build fluency before tackling more complex automation.
  6. Always use sudo for privileged operations rather than logging in as root, and familiarize yourself with netstat -lntp for quickly auditing open ports and listening services on a system.