Commands for exploring systems after gaining access.
• Purpose: Shows user and group IDs.
• Example: id → Output: uid=1000(kali) gid=1000(kali).
• Purpose: Searches for files with specific attributes.
• Example: find / -perm -4000 → Lists SUID binaries (potential privilege escalation).
• Purpose: Changes user passwords (if permitted).
• Example: passwd → Prompts for new password.
• Purpose: Views or edits scheduled tasks.
• Example: crontab -l → Lists cron jobs for the current user.
• Only use these commands on systems you own or have explicit permission to test (e.g., lab VMs like Metasploitable).
• Most commands have flags (e.g., nmap -A for aggressive scan). Use man <command> to explore.
• Combine commands in scripts (e.g., #!/bin/bash) to automate tasks.
• Run destructive commands (e.g., rm, kill) carefully to avoid breaking your system.