Linux Investigating File Contents
🔍 Investigating File Contents in Linux
Section titled “🔍 Investigating File Contents in Linux”1. file — Identify File Type
Section titled “1. file — Identify File Type”The file command inspects a file and tells you what type it is, without relying solely on the file extension.
Usage:
Section titled “Usage:”file filenameExample:
Section titled “Example:”$ file notes.txtnotes.txt: ASCII text$ file /bin/ls/bin/ls: ELF 64-bit LSB executable, x86-64✅ What you learn:
- Whether a file is text, binary, executable, archive, image, etc.
- Helpful for understanding what tools to use to inspect the file further.
2. head — View the Beginning of a File
Section titled “2. head — View the Beginning of a File”The head command shows the first lines of a file. Default is 10 lines, but you can adjust it.
Usage:
Section titled “Usage:”head filenamehead -n 20 filename # show first 20 linesExample:
Section titled “Example:”$ head notes.txtThis is the first line of the file.This is the second line....✅ What you learn:
- Quickly inspect the start of a text file or log file.
- Useful to check headers or file metadata in plain-text files.
3. tail — View the End of a File
Section titled “3. tail — View the End of a File”The tail command shows the last lines of a file. Very useful for log files.
Usage:
Section titled “Usage:”tail filenametail -n 50 filename # last 50 linestail -f filename # follow live updatesExample:
Section titled “Example:”$ tail /var/log/syslogSep 7 12:34:45 kernel: ...✅ What you learn:
- Monitor logs in real-time (
-f). - Quickly see recent activity in large files.
4. objdump — Inspect Binary Executables
Section titled “4. objdump — Inspect Binary Executables”objdump is a tool for examining binary files and executables. You can look at headers, disassembly, or raw content.
Usage:
Section titled “Usage:”objdump -d filename # disassemble executableobjdump -x filename # show all headersExample:
Section titled “Example:”$ objdump -d /bin/ls | head -n 10✅ What you learn:
- CPU instructions in binaries (
-d). - Section headers, symbols, and other metadata (
-x). - Useful for reverse engineering or debugging compiled programs.
5. od — Dump File in Octal/Hex/Binary
Section titled “5. od — Dump File in Octal/Hex/Binary”od stands for octal dump. It can display file contents in various number formats.
Usage:
Section titled “Usage:”od -c filename # show ASCII charactersod -x filename # show hexadecimalod -b filename # show octal bytesExample:
Section titled “Example:”$ od -c notes.txt0000000 T h i s i s t e x t \n✅ What you learn:
- Low-level view of file contents.
- See hidden characters, binary data, or encoding issues.
6. Other Useful Tools
Section titled “6. Other Useful Tools”strings→ extracts readable ASCII strings from binaries:
strings /bin/lsxxd→ creates a hex dump and reverse:
xxd filenamexxd -r filename.hex # convert hex back to fileless→ interactively scroll through files:
less filenamecat→ concatenate and print the full file:
cat filename🔑 Summary
Section titled “🔑 Summary”| Command | Purpose |
|---|---|
file | Identify file type |
head | View first lines |
tail | View last lines or follow logs |
objdump | Inspect executables/binaries |
od | View raw data in octal/hex/binary |
strings | Extract printable strings from binary |
xxd | Hex dump and reverse |
less | Browse large files interactively |
cat | Print entire file |
| These commands together allow you to explore any file type, from plain text to compiled binaries, giving both high-level and low-level views. |