AcademyTerminal Tactics: Survival in the ShellPhase 1: Shadow Navigation

The Shadow World: Seeing the Unseen

Listen up, Recruit. In the world of Cyber Ops, the most valuable intel is never left out in the open. It’s hidden in plain sight.

Tactical Intel: Hidden Files

In Linux, any file that starts with a . (dot) is invisible to standard scans. These are called Dotfiles. Think of them as hidden compartments in a spy's briefcase. They store your tools' secrets and configurations.

Examples of hidden cargo:

  • .bashrc — The DNA of your terminal.
  • .ssh/ — The vault where your master keys are kept.

Directive: The All-Seeing Eye (ls -a)

A standard ls scan will miss these files. To see the full reality of the directory, you must use the -a flag (short for All).

ls -a

Directive: Tactical Search (find)

When a server has millions of files, you don't guess. You hunt. The find command is your thermal vision.

find . -name ".secret_config"
booting...

Mission Objective

A double agent left a hidden configuration file in this sector. Your job:

  1. Reveal the Shadows: Run ls -a to see everything.
  2. Locate the Target: Use find . -name ".secret_config" to pinpoint it.
  3. Extract the Intel: Use cat .secret_config to read the message inside.

Tactical Tip

Combine your powers! ls -la gives you a Long-form scan of All files, including shadows. It’s the standard for any professional operative.

Mission Control

Reveal hidden files

Expected Command

ls -a

Find a specific config file

Read the contents of the hidden file