Cryptnotes is a repository of cybersecurity write-ups covering challenges from Cryptonite Task Phase: pwn.college's Linux Luminarium dojo, OverTheWire's Bandit game, and selected PicoCTF gym tasks.
- The Root
- Program and Absolute Paths
- Position Thy Self
- Position Elsewhere
- Position Yet Elsewhere
- Implicit Relative Paths, From
- Explicit Relative Paths, From
- Implicit Relative Path
- Home Sweet Home
- Cat, Not the Pet but the Command
- Catting Absolute Paths
- More Catting Practice
- Grepping for a Needle in a Haystack
- Listing Files
- Touching Files
- Removing Files
- Hidden Files
- An Epic Filesystem Quest
- Making Directories
- Finding Files
- Linking Files
- Learning from Documentation
- Learning Complex Usage
- Reading Manuals
- Searching Manuals
- Searching for Manuals
- Helpful Programs
- Help for Builtins
- Matching with *
- Matching with ?
- Matching with Ranges
- Matching Paths
- Mixing Globs
- Exclusionary Globbing
- Redirecting Output
- Redirecting More Output
- Appending Output
- Redirecting Errors
- Redirecting Input
- Grepping Stored Results
- Grepping Live Output
- Grepping Errors
- Duplicating Piped Data with Tee
- Writing to Multiple Programs
- Split-piping stderr and stdout
- Printing Variables
- Setting Variables
- Multi-word Variables
- Exporting Variables
- Printing Exported Variables
- Storing Command Output
- Reading Input
- Reading Files
- Listing Processes
- Killing Processes
- Interrupting Processes
- Suspending Processes
- Resuming Processes
- Backgrounding Processes
- Foregrounding Processes
- Starting Backgrounded Processes
- Process Exit Codes