Automated Malware Analysis Report for Cron

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for Cron ID: 202041 Sample Name: cron Cookbook: defaultlinuxfilecookbook.jbs Time: 02:54:41 Date: 20/01/2020 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report cron 4 Overview 4 General Information 4 Detection 4 Classification 4 Mitre Att&ck Matrix 5 Signature Overview 6 AV Detection: 6 Bitcoin Miner: 6 Networking: 6 System Summary: 6 Persistence and Installation Behavior: 6 Malware Analysis System Evasion: 6 Malware Configuration 7 Runtime Messages 7 Behavior Graph 7 Yara Overview 7 Initial Sample 7 PCAP (Network Traffic) 8 Dropped Files 8 Sigma Overview 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 9 Dropped Files 9 Antivirus, Machine Learning and Genetic Malware Detection 9 Initial Sample 9 Dropped Files 9 Domains 9 URLs 9 Startup 9 Created / dropped Files 10 Domains and IPs 10 Contacted Domains 10 URLs from Memory and Binaries 10 Contacted IPs 10 Public 11 Static File Info 11 General 11 Static ELF Info 11 ELF header 11 Sections 12 Program Segments 12 Dynamic Tags 12 Symbols 13 Network Behavior 13 Network Port Distribution 13 TCP Packets 13 UDP Packets 13 DNS Queries 13 DNS Answers 14 System Behavior 14 Analysis Process: cron PID: 20755 Parent PID: 20706 14 General 14 File Activities 14 File Read 14 Copyright Joe Security LLC 2020 Page 2 of 17 Directory Enumerated 14 Analysis Process: cron PID: 20758 Parent PID: 20755 14 General 14 Analysis Process: sh PID: 20758 Parent PID: 20755 14 General 15 File Activities 15 File Read 15 File Written 15 Analysis Process: sh PID: 20760 Parent PID: 20758 15 General 15 Analysis Process: rm PID: 20760 Parent PID: 20758 15 General 15 File Activities 15 File Deleted 15 File Read 15 Analysis Process: sh PID: 20762 Parent PID: 20758 15 General 15 Analysis Process: mkdir PID: 20762 Parent PID: 20758 16 General 16 File Activities 16 File Read 16 Directory Created 16 Analysis Process: sh PID: 20768 Parent PID: 20758 16 General 16 Analysis Process: chmod PID: 20768 Parent PID: 20758 16 General 16 File Activities 16 File Read 16 Directory Enumerated 16 Permission Modified 16 Analysis Process: cron PID: 20772 Parent PID: 20755 16 General 16 File Activities 17 File Read 17 File Written 17 Copyright Joe Security LLC 2020 Page 3 of 17 Analysis Report cron Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 202041 Start date: 20.01.2020 Start time: 02:54:41 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 6m 7s Hypervisor based Inspection enabled: false Report type: light Sample file name: cron Cookbook file name: defaultlinuxfilecookbook.jbs Analysis system description: Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171) Detection: MAL Classification: mal76.troj.mine.lin@0/2@4/0 Warnings: Show All Detection Strategy Score Range Reporting Whitelisted Threat Detection Xmrig Threshold 76 0 - 100 false Classification Copyright Joe Security LLC 2020 Page 4 of 17 Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Mitre Att&ck Matrix Remote Initial Privilege Defense Credential Lateral Command Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Valid Command-Line Hidden Files Port Hidden Files Credential Security Application Data from Data Standard Non- Eavesdrop on Remotely Accounts Interface 1 and Monitors and Dumping Software Deployment Local Compressed Application Insecure Track Device Directories 1 Directories 1 Discovery 1 Software System Layer Network Without Protocol 1 Communication Authorization Replication Scripting 1 Port Monitors Accessibility File and Network File and Remote Data from Exfiltration Standard Exploit SS7 to Remotely Through Features Directory Sniffing Directory Services Removable Over Other Application Redirect Phone Wipe Data Removable Permissions Discovery 1 Media Network Layer Calls/SMS Without Media Modification 1 Medium Protocol 1 Authorization External Windows Accessibility Path Scripting 1 Input System Windows Data from Automated Custom Exploit SS7 to Obtain Remote Management Features Interception Capture Information Remote Network Exfiltration Cryptographic Track Device Device Services Instrumentation Discovery 3 Management Shared Protocol Location Cloud Drive Backups Drive-by Scheduled System DLL Search File Credentials System Logon Input Data Multiband SIM Card Compromise Task Firmware Order Deletion 1 in Files Network Scripts Capture Encrypted Communication Swap Hijacking Configuration Discovery Copyright Joe Security LLC 2020 Page 5 of 17 Signature Overview • AV Detection • Bitcoin Miner • Networking • System Summary • Persistence and Installation Behavior • Malware Analysis System Evasion Click to jump to signature section AV Detection: Antivirus detection for sample Multi AV Scanner detection for submitted file Bitcoin Miner: Yara detected Xmrig cryptocurrency miner Detected Stratum mining protocol Found strings related to Crypto-Mining Reads CPU information from /proc indicative of miner or evasive malware Reads CPU information from /sys indicative of miner or evasive malware Networking: Performs DNS lookups Urls found in memory or binary data System Summary: Sample contains strings that are potentially command strings Sample has stripped symbol table Classification label Persistence and Installation Behavior: Sample reads /proc/mounts (often used for finding a writable filesystem) Counts the number of processes currently running Creates hidden files and/or directories Executes commands using a shell command-line interpreter Executes the "chmod" command used to modify permissions Executes the "mkdir" command used to create folders Executes the "rm" command used to delete files or directories Reads system information from the proc file system Sample tries to set the executable flag Malware Analysis System Evasion: Reads CPU information from /proc indicative of miner or evasive malware Copyright Joe Security LLC 2020 Page 6 of 17 Reads CPU information from /sys indicative of miner or evasive malware Uses the "uname" system call to query kernel version information (possible evasion) Malware Configuration No configs have been found Runtime Messages Command: /tmp/cron Exit Code: 0 Exit Code Info: Killed: False Standard Output: [2020-01-20 03:55:23.995] unable to open '/tmp/config.json'. Standard Error: Behavior Graph Hide Legend Behavior Graph Legend: ID: 202041 Sample: cron Process Startdate: 20/01/2020 Signature Architecture: LINUX Score: 76 Created File DNS/IP Info Is Dropped 45.9.148.125, 45164, 80 Number of created Files unknown debian-package.center Netherlands Is malicious started Internet Antivirus detection Multi AV Scanner detection Yara detected Xmrig 2 other signatures for sample for submitted file cryptocurrency miner cron Sample reads /proc/mounts (often used for finding started started a writable filesystem) cron cron sh started started started sh sh sh rm mkdir chmod Yara Overview Initial Sample Source Rule Description Author Strings Copyright Joe Security LLC 2020 Page 7 of 17 Source Rule Description Author Strings cron JoeSecurity_Xmrig Yara detected Joe Security Xmrig cryptocurrency miner PCAP (Network Traffic) No yara matches Dropped Files No yara matches Sigma Overview No Sigma rule has matched Joe Sandbox View / Context IPs Match Associated Sample Name / URL SHA 256 Detection Link Context 45.9.148.125 anacron Get hash malicious Browse cron Get hash malicious Browse cQLmNrun Get hash malicious Browse Domains Match Associated Sample Name / URL SHA 256 Detection Link Context debian-package.center anacron Get hash malicious Browse 45.9.148.117 cron Get hash malicious Browse 45.9.148.129 cron Get hash malicious Browse 45.9.148.129 ASN Match Associated Sample Name / URL SHA 256 Detection Link Context unknown anacron Get hash malicious Browse 45.9.148.125 testfile Get hash malicious Browse 91.189.92.20 Launcher.apk Get hash malicious Browse 216.58.201.99 5.45.79.15/input/?mark=20200116- Get hash malicious Browse 185.211.246.22 wentontravel.com/cuz&tpl=XXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&engke y=delonghi%20portafilter%20size 5.45.79.15/input/?mark=20200116- Get hash malicious Browse 185.211.246.22 wentontravel.com/cuz&tpl=XXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&engke y=delonghi portafilter size Project2.doc Get hash malicious Browse 51.15.6.128 https://top4top.io/downloadf-11687unj01-rar.html Get hash malicious Browse 54.38.152.27 www.ltyuye.com/wp-admin/rrktd1y-1v-75/ Get hash malicious Browse 23.235.217.105 txfc58.com/wordpress/m2utbn-3ft4c-07947/ Get hash malicious Browse 185.216.11 3.122 instructions 01 18 2020.doc Get hash malicious Browse 23.235.217.105 instructions 01 18 2020.doc Get hash malicious Browse 217.160.5.123 PO987889-JAN-20-20-Order_Quote,pdf.exe Get hash malicious Browse 172.217.23.193 koadic_test_online_9997_rundll.vbs Get hash malicious Browse 79.137.36.9 www.searchnewtabs.com/download Get hash malicious Browse 52.206.61.22 91.92.66.124/..j/ Get hash malicious Browse 91.92.66.124 Copyright Joe Security LLC 2020 Page 8 of 17 Match Associated Sample Name / URL SHA 256 Detection Link Context https://gcc01.safelinks.protection.outlook.com/? Get hash malicious Browse 209.197.3.24 url=https%3A%2F%2Fsway.office.com%2FUN0jHy70XUb7BI Xa%3Fref%3DLink&data=02%7C01%7Cjh.jackson%40trade.g ov%7Cc3e4a0c456a7407e91f408d79a641704%7Ca1d183f26c
Recommended publications
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • Geek Guide > Beyond Cron
    GEEK GUIDE BEYOND CRON Table of Contents Ease of Use ..................................................................... 8 Multi-Server-Friendly .................................................... 10 Dependency Management ............................................ 13 Easy to Visualize ........................................................... 16 Delegation of Authority ................................................. 18 Management by Exception ........................................... 21 Flexible Scheduling ....................................................... 23 Revision Control ........................................................... 24 Conclusion .................................................................... 24 MIKE DIEHL has been using Linux since the days when Slackware came on 14 5.25” floppy disks and installed kernel version 0.83. He has built and managed several servers configured with either hardware or software RAID storage under Linux, and he has hands-on experience with both the VMware and KVM virtual machine architectures. Mike has written numerous articles for Linux Journal on a broad range of subjects, and he has a Bachelor’s degree in Mathematics with a minor in Computer Science. He lives in Blythewood, South Carolina, with his wife and four sons. 2 GEEK GUIDE BEYOND CRON GEEK GUIDES: Mission-critical information for the most technical people on the planet. Copyright Statement © 2015 Linux Journal. All rights reserved. This site/publication contains materials that have been created, developed or
    [Show full text]
  • Introduction to Cron - Goals
    Introduction to cron - Goals • Goals: – Understand how cron works – Understand crontab files – Understand our conventions 1 What is cron? • cron is a Unix daemon program • cron automatically runs programs at given times • cron is different from at, which is a queued batch job facility • We are moving to use cron for batch jobs, as opposed to at 2 Crontab files (Part 1) • Each user on each machine has a crontab file. • So, ecogdev has its own file on each of sid & soltrane, as does ecogdba. • This file consists of lines that look like this: 15 03 * * * /ecog/ecogdev/src/reports/timezone/timezoneauto 15 03 * * 0 /ecog/ecogdev/src/reports/swog_prots/swog_protsauto 30 0 * * * /ecog/ecogdev/bin/ftpschema 3 Crontab Files (Part 2) • Here is one line from a crontab file: 30 0 * * * /ecog/ecogdev/bin/ftpschema • Six fields on this line (* is a wildcard): – 1. Minute of the hour (0-59) – 2. Hour of the day (0-23) – 3. Day of the month (0-31) – 4. Month of the year (1-12) – 5. Day of the week (0-6 with 0=Sunday) – 6. Command line • Quiz: When does this job run? 4 Crontab Files (Part 3) • Here is that crontab line again: 30 0 * * * /ecog/ecogdev/bin/ftpschema • The rightmost field is the command line • Best to use absolute paths, as in this entry • Commands can be executable programs or shell scripts • Put #!/bin/csh at top of C Shell scripts 5 The crontab command • The crontab command allows you to install and edit per-user crontab files. • These are the installed crontab files.
    [Show full text]
  • Unix (And Linux)
    AWK....................................................................................................................................4 BC .....................................................................................................................................11 CHGRP .............................................................................................................................16 CHMOD.............................................................................................................................19 CHOWN ............................................................................................................................26 CP .....................................................................................................................................29 CRON................................................................................................................................34 CSH...................................................................................................................................36 CUT...................................................................................................................................71 DATE ................................................................................................................................75 DF .....................................................................................................................................79 DIFF ..................................................................................................................................84
    [Show full text]
  • Solaris Crontab - NCCCS Systems Office Wiki
    Solaris crontab - NCCCS Systems Office Wiki http://localhost:8000/NCCCS/solaris-crontab#preview Solaris crontab crontab Access Control Here is a quick cheat sheet on how to add a crontab for a non-root user on Solaris 8. The datatel user will require permissions to be added so it can add entries in the crontab. Users: Access to crontab is allowed: if the user's name appears in /etc/cron.d/cron.allow. if /etc/cron.d/cron.allow does not exist and the user's name is not in /etc/cron.d/cron.deny. Users: Access to crontab is denied: if /etc/cron.d/cron.allow exists and the user's name is not in it. if /etc/cron.d/cron.allow does not exist and user's name is in /etc/cron.d/cron.deny. if neither file exists, only a user with the solaris.jobs.user authorization is allowed to submit a job. Note that the rules for allow and deny apply to root only if the allow/deny files exist. The allow/deny files consist of one user name per line. A prompt of # means you are logged in as the root user. A prompt of $ means you are logged in as the datatel user. Quick one-liner to add entry # echo "datatel" >> /etc/cron.d/cron.allow How to verify # cd /etc/cron.d # pwd /etc/cron.d # cat cron.allow adm lp root datatel 1 of 2 9/27/2005 1:14 PM Solaris crontab - NCCCS Systems Office Wiki http://localhost:8000/NCCCS/solaris-crontab#preview # cat cron.deny daemon bin smtp nuucp listen nobody noaccess Copyright 2005 - J.
    [Show full text]
  • Running a PHP Script on a Regular Schedule Using Curl and Cron
    Running a PHP script on a regular schedule using curl and cron. Under normal circumstances a PHP script is only executed when someone requests it via the web by clicking on a link or typing the URL into the location bar. However, on occasion, you may want a script to do something at a regular interval instead – perhaps to rebuild a “daily graphic” or send nightly email. In these circumstances, you need to trigger the script using a different mechanism than random web access. That’s what this note is about. The following discussion assumes you have created a PHP script that performs the necessary actions when accessed via the web. In this case, that script is called “cron-demo.php” and is stored in a folder called “cron” off of the user’s root web folder (aka “public_html” on a UW server). [Note: real uw netids need to replace “uwnetid” in each of the three places it occurs below!] [public_html/cron/cron-demo.php] <?php // ---- EMAIL test script for PHP ------ $to = [email protected]'; $subject = 'Cron Test'; $message = 'Greetings from planet krypton where it is currently ' .date("l dS \of F Y h:i:s A"); $headers = 'From: [email protected]' . "\r\n" . 'Reply-To: [email protected]' . "\r\n" . 'X-Mailer: PHP/' . phpversion(); mail($to, $subject, $message, $headers); print" Script complete.\n"; ?> The next step is to create an operating system script (called a “shell script”) that uses an operating system utility called “curl” to access your PHP script via the web. This file is also stored in a folder called “cron” but located just off the user’s “normal” home or root folder (i.e.
    [Show full text]
  • Automating Admin Tasks Using Shell Scripts and Cron Vijay Kumar Adhikari
    AutomatingAutomating adminadmin taskstasks usingusing shellshell scriptsscripts andand croncron VijayVijay KumarKumar AdhikariAdhikari vijayvijay@@kcmkcm..eduedu..npnp HowHow dodo wewe go?go? IntroductionIntroduction toto shellshell scriptsscripts ExampleExample scriptsscripts IntroduceIntroduce conceptsconcepts atat wewe encounterencounter themthem inin examplesexamples IntroductionIntroduction toto croncron tooltool ExamplesExamples ShellShell The “Shell” is a program which provides a basic human-OS interface. Two main ‘flavors’ of Shells: – sh, or bourne shell. It’s derivatives include ksh (korn shell) and now, the most widely used, bash (bourne again shell). – csh or C-shell. Widely used form is the very popular tcsh. – We will be talking about bash today. shsh scriptscript syntaxsyntax The first line of a sh script must (should?) start as follows: #!/bin/sh (shebang, http://en.wikipedia.org/wiki/Shebang ) Simple unix commands and other structures follow. Any unquoted # is treated as the beginning of a comment until end-of-line Environment variables are $EXPANDED “Back-tick” subshells are executed and `expanded` HelloHello WorldWorld scriptscript #!/bin/bash #Prints “Hello World” and exists echo “Hello World” echo “$USER, your current directory is $PWD” echo `ls` exit #Clean way to exit a shell script ---------------------------------------- To run i. sh hello.sh ii. chmod +x hello.sh ./hello.sh VariablesVariables MESSAGE="Hello World“ #no $ SHORT_MESSAGE=hi NUMBER=1 PI=3.142 OTHER_PI="3.142“ MIXED=123abc new_var=$PI echo $OTHER_PI # $ precedes when using the var Notice that there is no space before and after the ‘=‘. VariablesVariables contcont…… #!/bin/bash echo "What is your name?" read USER_NAME # Input from user echo "Hello $USER_NAME" echo "I will create you a file called ${USER_NAME}_file" touch "${USER_NAME}_file" -------------------------------------- Exercise: Write a script that upon invocation shows the time and date and lists all logged-in users.
    [Show full text]
  • Linux Crontab: 15 Awesome Cron Job Examples
    Linux Crontab: 15 Awesome Cron Job Examples < An experienced Linux sysadmin knows the importance of running the routine maintenance jobs in the background automatically. Linux Cron utility is an effective way to schedule a routine background job at a specific time and/or day on an on- going basis. In this article, let us review 15 awesome examples of crontab job scheduling. Linux Crontab Format PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com MIN HOUR DOM MON DOW CMD Table: Crontab Fields and Allowed Ranges (Linux Crontab Syntax) Field Description Allowed Value MIN Minute field 0 to 59 HOURHour field 0 to 23 DOM Day of Month 1-31 MON Month field 1-12 DOW Day Of Week0-6 CMD Command Any command to be executed. 1. Scheduling a Job For a Specific Time The basic usage of cron is to execute a job in a specific time as shown below. This will execute the Full backup shell script (full-backup) on 10th June 08:30 AM. Please note that the time field uses 24 hours format. So, for 8 AM use 8, and for 8 PM use 20. 30 08 10 06 * /home/ramesh/full-backup 30 – 30th Minute 08 – 08 AM 10 – 10th Day 06 – 6th Month (June) * – Every day of the week 2. Schedule a Job For More Than One Instance (e.g. Twice a Day) PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com The following script take a incremental backup twice a day every day.
    [Show full text]
  • BASH Programming − Introduction HOW−TO BASH Programming − Introduction HOW−TO
    BASH Programming − Introduction HOW−TO BASH Programming − Introduction HOW−TO Table of Contents BASH Programming − Introduction HOW−TO.............................................................................................1 by Mike G mikkey at dynamo.com.ar.....................................................................................................1 1.Introduction...........................................................................................................................................1 2.Very simple Scripts...............................................................................................................................1 3.All about redirection.............................................................................................................................1 4.Pipes......................................................................................................................................................1 5.Variables...............................................................................................................................................2 6.Conditionals..........................................................................................................................................2 7.Loops for, while and until.....................................................................................................................2 8.Functions...............................................................................................................................................2
    [Show full text]
  • Linux Shell Scripting Cookbook Second Edition
    Linux Shell Scripting Cookbook Second Edition Over 110 practical recipes to solve real-world shell problems, guaranteed to make you wonder how you ever lived without them Shantanu Tushar Sarath Lakshman BIRMINGHAM - MUMBAI Linux Shell Scripting Cookbook Second Edition Copyright © 2013 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: January 2011 Second edition: May 2013 Production Reference: 1140513 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78216-274-2 www.packtpub.com Cover Image by Parag Kadam ([email protected]) Credits Authors Project Coordinator Shantanu Tushar Shiksha Chaturvedi Sarath Lakshman Proofreader Reviewers Linda Morris Rajeshwari K. John C. Kennedy Indexer Hemangini Bari Anil Kumar Sudhendu Kumar Production Coordinator Aravind SV Shantanu Zagade Acquisition Editor Cover Work Kartikey Pandey Shantanu Zagade Lead Technical Editor Ankita Shashi Technical Editors Jalasha D'costa Amit Ramadas Lubna Shaikh About the Authors Shantanu Tushar is an advanced GNU/Linux user since his college days.
    [Show full text]
  • LFCS Exam Name: Linux Foundation Certified System Administrator
    Vendor: Linux Foundation Exam Code: LFCS Exam Name: Linux Foundation Certified System Administrator Version: DEMO QUESTION 1 What is the output of the following command? echo "Hello World" | tr -d aieou A. Hello World B. eoo C. Hll Wrld D. eoo Hll Wrld Answer: C QUESTION 2 Given a file called birthdays containing lines like: YYYY-MM-DD Name 1983-06-02 Tim 1995-12-17 Sue Which command would you use to output the lines belonging to all people listed whose birthday is in May or June? A. grep '[56]' birthdays B. grep 05?6? birthdays C. grep '[0-9]*-0[56]-' birthdays D. grep 06 birthdays | grep 05 Answer: C QUESTION 3 Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file? Answer: files QUESTION 4 Which command can be used to delete a group from a Linux system? A. groupdel B. groupmod C. groups D. groupedit Answer: A QUESTION 5 How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.) Answer: 14 QUESTION 6 What is the purpose of the command mailq? A. It fetches new emails from a remote server using POP3 or IMAP. B. It is a multi-user mailing list manager. C. It is a proprietary tool contained only in the qmail MTA. D. It queries the mail queue of the local MTA. E. It is a command-line based tool for reading and writing emails.
    [Show full text]
  • Unix Scripts and Job Scheduling
    UnixUnix ScriptsScripts andand JobJob SchedulingScheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring OverviewOverview Ü Shell Scripts Shell script basics Variables in shell scripts Korn shell arithmetic Commands for scripts Flow control, tests, and expressions Making Scripts Friendlier Functions Pipes and Shell Scripts Scripts with awk and/or sed Ü Job Scheduling bg and at cron RunningRunning aa ShellShell ScriptScript Ü First three forms spawn a new process, so new variable values are not left when you return sh < filename – where sh is the name of a shell – does not allow arguments sh filename filename – Assumes directory in path – Assumes chmod +x filename . filename – Does not spawn a new shell. – Changes to system variables impact the current shell Ü you may exit a shell script by Getting to the last line Encountering an exit command Executing a command that results in an error condition that causes an exit. StructureStructure ofof aa ShellShell ScriptScript Ü Basic structure #! Program to execute script # comment Commands and structures Ü Line continuation | at the end of the line is an assumed continuation \ at the end of a line is an explicit continuation Ü # in a shell script indicates a comment to \n Ü Back quotes in command cause immediate execution and substitution DebuggingDebugging aa scriptscript Ü Use the command set –x within a script Ü You can also activate the following set options -n read commands before executing them – for testing scripts -u make it an error to reference a non existing file -v print input as it is read - disable the –x and –v commands Ü Set the variable PS4 to some value that will help – e.g.
    [Show full text]