Self-paced

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Search from all Lessons


LoginGet Started

Register to 4Geeks

← Back to Projects

Find The Malicius User Ubuntu Linux

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • linux

  • cybersecurity

  • ubuntu

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

💡 HELP

Download the following virtual machine with Ubuntu Server and run the computer in Virtual Box on your computer.

You have just joined the cybersecurity team at 4Geeks Academy. The team is currently setting up a web server with Ubuntu for the E-Learning platform. This team consists of:

  1. Alejandro
  2. Daniela
  3. Vanessa
  4. Chema
  5. Analista (You)

Your username and password are:

1username: analista 2password: analista

Each user has their own directories and files, as well as some shared ones, with different permissions on the shared files. One of these users has permissions they shouldn't have and seems to be up to something. Can you discover who it is?

  1. Identify the malicious user
  2. Analyze their actions and explain what they were attempting to do
  3. Determine what permissions they had and on which directories that allowed them to execute this action
  4. Propose a solution to this problem

⚠️ The Sticky bit permission (rwx-t) is often used to grant selective access to files and directories.

💡 HELP

  • The Ubuntu machine we've designed for you doesn't have a graphical interface because, in addition to testing your hacking skills, we also want to test your command-line skills.
  • The main directory system where you'll be actively investigating is as follows:
1|- home 2 |-alejandro 3 |-analista 4 |-chema 5 |-daniela 6 |-vanessa 7 |-vboxuser

⚠️ Upon logging in, you will be positioned in the ./analista directory.

  • The first instructions can be found in the ./home directory.

Sign up and get access to solution files and videos

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Sign up and get access to solution files and videos

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies