White hat*** and network security engineers teach you: the similarities and differences between Kali Linux and Windows user password management

1. Statement before class:
1. This sharing is only for learning exchanges, please consciously abide by laws and regulations!
2. Search: Kali and programming, learn more online*** dry goods!
3. Kali and programming are updated on time every day, please learn and pay attention!
Body part
1. Background introduction
The computer operating system most of us usually use the most is the Windows operating system, such as Windows XP, Windows 7, Windows 8, Windows 10, but if we want to be an excellent IT practitioner, we must Familiar with the operating system (OS) that network security practitioners and IT leaders often use and like to use. This operating system is the Linux operating system we are familiar with. You may feel that you have just heard of this system. , But I haven't used the system before, but what I want to say is that the mobile phone system (Android) we use every day is an operating system based on the Linux kernel. Does it feel amazing? Before we start to learn network security related knowledge systematically, let us first understand the difference between the use of Windows system and Linux system, so that we can learn related knowledge better, master Linux knowledge better, and become an early An excellent cyber security practitioner, so what are you waiting for? Let us study together next!
2. Resource equipment
1. A virtual machine with WIn7 installed
2. A Xiaobai ready to go.
3. One installed kali linux virtual machine.
3. Strategic Arrangement
3.1 The user-related attributes are managed accordingly in the Windows system, as shown in the figure below.
Step 1: Use the Windows+S key combination to retrieve the control panel.
Insert picture description here

Step 2: Open the user account in the opened user panel, as shown in the figure below.
Insert picture description here

Step 3: The existing user list in the Windows system is shown in the figure below.
Insert picture description here

Step 4: Select the user whose attributes need to be changed and double-click to enter the corresponding attribute editing page, as shown in the figure below, select Create Password to create a password for this user.
Insert picture description here

Step 5: As shown in the figure below, enter the user's password setting page.
Insert picture description here

Step 6: Click Manage other users to perform other operations on other users, as shown in the figure below.
Insert picture description here

Step 7: Select different attributes as shown in the figure below to make corresponding changes.
Insert picture description here

Step 8: Choose to change the user type, and change the corresponding attributes (normal user, administrator user)
Insert picture description here

3.2 Switch to the command line terminal of the Kali Linux system and perform operations on Kali Linux users, as shown in the figure below.
Step 1: Add a new user
command in Kali Linux system : useradd Username
example: useradd test
Insert picture description here

Step 2: Set a password for the newly created user in Kali Linux.
Command: passwd username
example: passwd test
command: input password
command: confirm password
Insert picture description here

Step 3: View the user's configuration file
command: cat /etc/passwd
command: cat /etc/shadow
Insert picture description here
Insert picture description here

Step 4: The content of the shadow file is shown in the figure below.
Insert picture description here
The editor typed each word and created it, but it was hard work. Could you please pay attention to me? You can also search for: Kali and programming to learn more *** skills! No piracy, please declare the source: Kali and programming
point I learn more Kali Linux*** testing and network*** practical skills! Please add link description

Guess you like

Origin blog.51cto.com/14308022/2544010