hexdefender
Email
  • Introduction to Linux
    • Overview
    • Linux Kernel
    • Linux Distros
    • Introduction to Kali Linux
    • Install Kali on VirtualBox
    • Install Kali on AWS
  • Linux Commands
    • Linux File Systems
    • Basic File and Directory commands
    • File Permissions and Ownerships
    • System Commands in Linux
    • Text Processing Commands in Linux
    • Linux Archive Utility
    • Package Management in Kali Linux
    • Networking Commands
    • Disk Utility Tools
    • Linux List of CLI Command lookup
    • Linux CLI Cheatsheet
    • Assignment
  • Networking Essentials
    • Overview
    • Networking Protocols
    • IP Addressing & Subnetting
    • DNS and DNS Security
    • Network Devices and Architecture
    • VPNs and Secure Tunnels
    • Network Address Translation (NAT) & Port Forwarding
    • Wireless Networks & Protocols
    • Cloud Networking & Security
    • Common Network Tools
  • Bash Scripting
    • Fundamentals of Bash
    • Variables, Branching and Loops
    • System Variables in Bash
    • Functions and Error Handling in Bash Scripts
    • File Handling and Text Processing
    • 5 Useful Bash Scripts for Everyday Tasks
    • Useful Assignments
  • Fundamentals of Cybersecurity
    • Introduction to Cybersecurity
    • Importance of Cybersecurity
    • Important Cybersecurity Frameworks
    • Cybersecurity Roles and Career Options
  • Penetration Testing
    • Reconnaissance and Footprinting
    • Exploitation Techniques
      • Introduction
      • Service Enumeration
      • Password Attacks
      • Exploit Discovery
      • The Art of Exploitation
      • The Pentester's guide to Metasploit
    • Post Exploitation - Malware & Escalation
  • Web Application Security
    • Common Web Vulnerabilities
    • OWASP Top 10
    • SQL Injections
    • Cross Site Scripting Attacks
    • Web Application Firewalls
    • Secure Coding Practices
  • Cryptography
    • Basic concepts of cryptography
    • Examples of Asymetric & Hashing functions
    • Public Key Infrastructure
    • Digital Signatures
    • Symmetric and Asymmetric Encryption
  • Social Engineering
    • Introduction to Social Engineering
    • Mitigation Strategies for Social Engineering
  • Digital Forensics
    • Digital Forensics Basics
    • Forensics Tools and Techniques
    • Reverse Engineering Fundamentals
    • Malware Analysis
Powered by GitBook
On this page
  1. Linux Commands

Assignment

PreviousLinux CLI CheatsheetNextOverview

Last updated 8 months ago

Here’s a table of specific assignments for each chapter covered, asking learners to perform specific tasks and providing criteria for checking their answers. Each assignment is aligned with the topics discussed in the previous chapters, allowing learners to apply their knowledge practically.

1

Linux Overview

Research and list five key features of Linux.

Must include details about features like open-source, multi-user, etc.

2

Linux Kernel

Explain the role of the kernel in Linux. Provide an example of how a kernel module can be loaded.

Should include a clear explanation and an example using modprobe.

3

Linux Distros

Compare two Linux distributions (e.g., Ubuntu vs. Fedora) and list their use cases.

Must include at least three differences and specific use cases.

4

Kali Linux

Download the prebuilt Kali Linux VM image and run it on VirtualBox.

Verify that the VM is successfully running and accessible.

5

Kali Linux

Install additional tools using apt on Kali Linux.

Must demonstrate successful installation of at least two tools.

6

Linux Commands

Navigate the filesystem using commands and create a directory structure with files.

Should include mkdir, cd, and ls commands with a screenshot.

7

File Permissions

Change the permissions of a file using both numeric and symbolic methods.

Should show commands and the final permissions with ls -l.

8

File Permissions

Create a script that sets specific permissions for a set of files in a directory.

The script must run successfully and show correct permissions.

9

Disk Utility Tools

Create and format a new partition on a virtual disk.

Must include steps taken and a final df output showing the new partition.

10

Mounting and Unmounting

Mount a USB drive and create a file on it, then unmount it.

Must show the mounted directory and confirmation of unmounting.

11

System Commands

Write a script to collect system information (CPU, RAM) and log it.

The output file should contain correct and formatted data.

12

Process Management

Identify and kill a running process based on its name.

Must show the process ID and the command used to terminate it.

13

Networking Tools

Use ping to test connectivity to a website and document the results.

Should include command output and an analysis of connectivity.

14

Networking Tools

Configure a static IP address using ifconfig or ip.

Must show the command used and the new network configuration.

15

Text Processing Tools

Use grep to search for specific patterns in a log file and report occurrences.

The output must include the pattern and a count of occurrences.

16

Text Processing Tools

Create a pipeline with awk to extract specific columns from a CSV file.

The output must be correctly formatted and relevant.

17

Text Processing Tools

Use sed to perform a find-and-replace operation in a text file.

Show the command and the final content of the modified file.

18

Package Management

Install a software package using apt and document the installation steps.

Should show commands used and the successful installation message.

19

Package Management

Update the package list and upgrade all installed packages.

Must show the output of the commands and verify upgraded packages.

20

Networking

Analyze a network issue using dig to check DNS resolution for a domain.

Must include command output and a summary of findings.

21

Disk Usage Analysis

Use du and df to analyze disk usage and report the results.

Should include a detailed summary of disk usage in a report format.

22

Backup and Recovery

Create a backup of a directory using tar and restore it.

Must show the commands used and confirmation of restored files.

23

User Management

Create a new user and set permissions using usermod.

Show the command used and the final user permissions.

24

Group Management

Create a group and add users to it, then verify membership.

Must show commands used and the output of groups for verification.

25

Access Control

Configure sudoers to allow a user to run specific commands.

Show changes made to sudoers and verify functionality.

26

Log Analysis

Analyze system logs for specific events and summarize findings.

The report must detail findings and commands used for analysis.

27

Shell Scripting

Write a shell script that accepts user input to create a directory.

The script must run successfully and show correct directory creation.

28

Environment Variables

Create and modify environment variables in a script.

Must demonstrate changes with echo $VARIABLE outputs.

29

Kernel Management

List currently loaded kernel modules and unload a specific module.

Should include commands and verification of changes.

30

System Security

Simulate a security breach by analyzing logs for suspicious activity.

The report must include findings and recommended actions.

31

Network Monitoring

Capture network packets using tcpdump and analyze the traffic.

Include the command output and a summary of the packet types captured.

32

Performance Tuning

Analyze system performance metrics and recommend optimizations.

Must include specific metrics analyzed and proposed changes.

33

Disk Cleanup

Develop a cleanup strategy using commands to remove temporary files.

The report should detail files removed and space saved.

34

Data Recovery

Simulate a data loss scenario and recover deleted files.

Must demonstrate the recovery process and files restored.

35

Application Deployment

Deploy a sample web application using Docker.

Must show successful deployment and access to the application.

36

Backup and Restore

Schedule a cron job for regular backups of a specific directory.

Must show the cron job and verify backup execution.

37

Change Management

Document a change management process for updating software in a production environment.

The document must detail the steps taken and approvals needed.

38

User Permissions

Create a scenario managing user permissions for a shared directory.

Must demonstrate correct permissions with ls -l.

39

Environment Setup

Set up a development environment with Docker for a sample application.

Show Docker containers running and accessible applications.

40

Security Hardening

Implement basic security measures on Kali Linux and document the changes.

The report must include specific measures taken and their impacts.

41

Backup and Recovery

Use rsync to back up files from one directory to another.

Must demonstrate correct usage and verify files in the backup.

42

User Management

Automate the creation of multiple users with specified configurations using a script.

The script must run successfully, creating the specified users.

43

Service Management

Use systemctl to start, stop, and check the status of a service.

Include commands used and the status before and after changes.

44

Log Analysis

Create a script that parses logs for failed login attempts and summarizes the results.

The output must detail findings and the script's functionality.

45

Network Configuration

Configure a virtual network using ip commands and verify connectivity.

Include commands and confirmation of network connectivity.

46

Package Management

Remove unnecessary packages and clean up the package cache using apt.

Must show commands and the result of apt autoremove.

47

System Security

Implement user-level security by configuring iptables rules and testing their effectiveness.

Must demonstrate rules set and results of testing access.

48

Environment Variables

Create a shell script that sets environment variables for a specific application.

Must show the script and the effect of running it on the application.

49

Kernel Management

Write a report on the current kernel version and suggest potential updates.

The report must include kernel details and suggested changes.

50

Disk Utility Tools

Create a report on disk health using smartctl and interpret the results.

Must include smartctl output and an analysis of disk health.