Nt1330 Lab 3

422 Words2 Pages

Information Assurance Lab5: Introduction to Metasploit on Kali Linux
Anti-Black Hats
1) Booting Kali Linux and starting Metasploit:
1d.) Why is it usually a bad idea to operate in the Linux environment as root? If you are unfamiliar with the concept of the root user, do a quick google search
Answer:
Root User:
In Unix-like computer OSes, root is the conventional name of the user who has all rights or permissions (to all files and programs) in all modes (single- or multi-user. The root user can do many things an ordinary user cannot, such as changing the ownership of files and binding to network ports numbered below 1024.
The name root may have originated because root is the only user account with permission to modify the root directory of a Unix system. Only a process running as root is allowed to change its user ID to that of another user; once it 's done so, there is no way back. …show more content…

Instead, a normal user account should be used, and then either the su (set user) or sudo (substitute user do) command is used [1]
And it is bad idea to operate in the Linux environment as root because you can influence the whole machine and it gives access to every component. Sometimes, an inexperienced user, can cause harm to the system with the usage of bad code or commands through the root unintentionally.
1f.) What would happen if you just started the metasploit service without the postgresql service? Even if you can start the metasploit service without it, is it needed (Why/ Why not)? What does the service do for Metasploit? (Hint: you can do this in a new terminal window)

More about Nt1330 Lab 3