Introduction to Linux

By Drs. Anthony Vance and Dave Eargle

Part 1. Complete this very gentle introduction to the Linux terminal

CodeAcademy has an introductory set of lessons that teach the Linux Terminal. You should complete the first lesson-set within each module:

  1. Navigating the File System
    1. Navigation
  2. Viewing and Changing the File System
    1. Manipulation
  3. Redirecting Input and Output
    1. Redirection
  4. Configuring the Environment
    1. Environment

You do not need to do any of the “projects” or multiple choice quizzes. Just the lesson-sets.

Part 2. Play the Bandit wargame on OvertheWire.org

Play the Bandit wargame on OvertheWire.org. Start at Level 0 and complete Level 15 (which gives you the password for Level 16).

To play, you’ll need to connect to the Bandit server using an SSH client. SSH stands for Secure SHell, and allows you to remotely control a server using a command line interface. SSH is secure because your connection to the server is encrypted using a symmetric cipher like AES. It also uses asymmetric cryptography such as RSA to establish the server’s identity.

Using SSH on Windows

If you’re using Windows, download Putty for Windows.

Enter the username (bandit0), server address, and port (2220) into putty like so:

img

Click the Open button. You’ll be presented with a message like the following:

img

This message tells you that you haven’t connected to this server before. The Bandit server is using a ECDSA asymmetric key pair, which is similar to RSA. The fingerprint is a hash of the server’s public key. To learn more about verifying SSH fingerprints, see here.

To continue logging in, click the Yes button.

Using SSH on MacOS

If you’re using a Mac, open Terminal.app and use the ssh command to connect to the Bandit server, like so:

ssh -p 2220 [email protected]

When you first connect to a sever using SSH, you’ll see a message like the following:

img

This message tells you that you haven’t connected to this server before. The Bandit server is using a ECDSA asymmetric key pair, which is similar to RSA. The fingerprint is a hash of the server’s public key. To learn more about verifying SSH fingerprints, see here.

To continue logging in, type yes and press enter.

Instructions

Deliverable 1

For each level you complete, take a screenshot of your terminal screen showing the following:

Add all of the screenshots to Word document and submit the document in the Linux tutorial quiz on Canvas.

img

Part 3. Set up the Kali VM

Deliverable 2

See here for the download link, and here for the login credentials.

Using the Kali VM for the steps below shows both that you got your Kali VM up and running, and that you have basic skills with the Linux terminal. You must use your Kali VM for the following.

For example:

img

Learn a Linux text editor

The CodeAcademy lessons above give you basic exposure to the nano text editor. However, you are free to use whatever text editor you like, such as Vim (see tutorial here). However, nano is good for beginners.

Optional—More thorough walkthrough, but also more difficult