Set 5

Ubuntu L2-Corporal Industry Assignments

(Set 5 | Index 41–50) Root Working Directory: ~/kactii27


41. Process Memory Leak Observation (Controlled)

Scenario: A service is suspected of gradually consuming memory.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named memory_observation

  • Start a long-running test process

  • Capture memory usage at intervals

  • Terminate the process safely

  • Save observations to memory_trend.txt

Commands Expected: top, ps, watch, kill, redirection


42. Recursive Permission Correction Drill

Scenario: A directory tree has inconsistent permissions.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named permission_fix

  • Populate nested directories and files

  • Apply incorrect permissions intentionally

  • Correct permissions recursively

  • Capture before/after states in perm_fix.txt

Commands Expected: chmod -R, ls -lR, redirection


43. Network Reachability Degradation Test

Scenario: Connectivity drops intermittently.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named reachability_test

  • Ping a host with different intervals and counts

  • Capture packet loss and latency

  • Save results to reachability.txt

Commands Expected: ping -c, ping -i, redirection


44. File System Consistency Awareness Drill

Scenario: Ops wants junior staff to understand fs integrity tools.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named fs_consistency

  • Inspect mounted file systems

  • Identify file system types

  • Document appropriate consistency tools (no execution)

  • Save findings to fs_report.txt

Commands Expected: df -T, lsblk -f, redirection


45. Selective Log Extraction by Time Window

Scenario: Errors occurred within a specific time range.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named log_time_filter

  • Create a timestamped log file

  • Extract entries from a specific window

  • Save results to time_filtered.txt

Commands Expected: grep, sed, awk (read-only use), redirection


46. User Group Membership Validation

Scenario: A user reports missing permissions.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named group_validation

  • Inspect current user’s group memberships

  • Validate access logic against permissions

  • Save output to groups.txt

Commands Expected: groups, id, ls -l, redirection


47. File Lock Awareness & Detection

Scenario: A file cannot be modified due to an active lock.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named file_locking

  • Open a file with a process

  • Detect file locks

  • Save findings to locks.txt

Commands Expected: lsof, fuser, redirection


48. Controlled Disk Fill & Alert Observation

Scenario: Disk alerts must be understood before production.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named disk_fill

  • Gradually create large files

  • Monitor disk usage growth

  • Stop before critical thresholds

  • Save observations to disk_fill.txt

Commands Expected: dd, df -h, watch, redirection


49. PATH Shadowing & Resolution Risk Analysis

Scenario: Wrong binaries are executed due to PATH ordering.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named path_shadowing

  • Create a dummy executable

  • Adjust PATH locally

  • Observe command resolution behavior

  • Document findings in path_shadow.txt

Commands Expected: export, which, type, chmod +x


50. Controlled Privilege Boundary Awareness Drill

Scenario: Understand where privilege boundaries exist.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named privilege_boundaries

  • Attempt privileged operations without sudo

  • Capture error messages

  • Identify which operations require elevation

  • Save output to privilege.txt

Commands Expected: mount, chown, permission errors, redirection


Last updated