{"id":183,"date":"2021-02-01T08:15:14","date_gmt":"2021-02-01T08:15:14","guid":{"rendered":"https:\/\/www.cybersecuritynotepad.com\/?p=183"},"modified":"2021-02-01T09:48:34","modified_gmt":"2021-02-01T09:48:34","slug":"localectl-keyboard-related-settings","status":"publish","type":"post","link":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/","title":{"rendered":"localectl &#8211; Keyboard related settings"},"content":{"rendered":"\n<p>&#8220;localectl&#8221; is a command allowing you to quickly verify the keyboard mappings settings on a Linux system and also modify the current configuration. There are times when password or known keyboard combinations do not work as expected. The first step for troubleshooting is to check what keyboard mappings and layout settings are in use on the local system. <\/p>\n\n\n\n<p>The sample command usage is shown below:<\/p>\n\n\n\n<p class=\"has-gray-color has-text-color has-extra-small-font-size\">test@kali:~$ localectl status<br>System Locale: LANG=en_GB.UTF-8<br>LANGUAGE=en_GB:en<br>VC Keymap: n\/a<br>X11 Layout: gb<br>X11 Model: pc105<\/p>\n\n\n\n<p>The output above shows that the UK (en-GB) keyboard mapping is in use. In addition, it says that the standard universal keyboard is connected and in use. <\/p>\n\n\n\n<p>Sometimes you may wonder why certain passwords or commands do not work as intended, even though you are convinced that they are correctly entered and executed. In that case, check the keyboard mappings first to understand whether it could be the root cause of the problem. <\/p>\n\n\n\n<p>How is that related to the cyber security?<\/p>\n\n\n\n<p>You may log into or gain access to remote system to perform a routine security focused review or perform post exploitation reconnaissance. As you may not be immediately aware of what settings are being enforced, you should check them to avoid having to spend time on unnecessary troubleshooting.  Even though, the language in use may be English it does not mean that the same passwords will work for both the UK and US keyboard layouts. That is because each keyboard mapping or layout has subtle differences. If you forget about them, you may end up going around the circles and wondering why passwords do not work.  <\/p>\n\n\n\n<p>To learn more about the command, please read the man page. <\/p>\n\n\n\n<p>More information about other interesting commands can be found <a href=\"https:\/\/www.cybersecuritynotepad.com\/index.php\/references\/\">here<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;localectl&#8221; is a command allowing you to quickly verify the keyboard mappings settings on a Linux system and also modify the current configuration. There are times when password or known keyboard combinations do not work as expected. The first step for troubleshooting is to check what keyboard mappings and layout settings are in use on&hellip; <a class=\"more-link\" href=\"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/\">Continue reading <span class=\"screen-reader-text\">localectl &#8211; Keyboard related settings<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9],"tags":[14,15,6,11,13,12],"class_list":["post-183","post","type-post","status-publish","format-standard","hentry","category-references_command_line","tag-keyboard-layout","tag-keyboard-mapping","tag-linux","tag-localectl","tag-passwords","tag-troubleshooting","entry"],"yoast_head":"<title>localectl - Keyboard related settings - Cyber Security Notepad<\/title>\n<meta name=\"description\" content=\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, localectl\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"localectl - Keyboard related settings - Cyber Security Notepad\" \/>\n<meta property=\"og:description\" content=\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, localectl\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Notepad\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-01T08:15:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-01T09:48:34+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/\"},\"author\":\"cybersecuritynotepad\",\"headline\":\"localectl &#8211; Keyboard related settings\",\"datePublished\":\"2021-02-01T08:15:14+00:00\",\"dateModified\":\"2021-02-01T09:48:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/\"},\"wordCount\":298,\"commentCount\":0,\"keywords\":[\"keyboard layout\",\"keyboard mapping\",\"Linux\",\"localectl\",\"passwords\",\"troubleshooting\"],\"articleSection\":[\"References\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/\",\"url\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/\",\"name\":\"localectl - Keyboard related settings - Cyber Security Notepad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/#website\"},\"datePublished\":\"2021-02-01T08:15:14+00:00\",\"dateModified\":\"2021-02-01T09:48:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/#\\\/schema\\\/person\\\/7fd460a876c44ee288cb37cb33e1ed5e\"},\"description\":\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, localectl\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2021\\\/02\\\/01\\\/localectl-keyboard-related-settings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"localectl &#8211; Keyboard related settings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/#website\",\"url\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/\",\"name\":\"Cyber Security Notepad\",\"description\":\"Cyber and Information Security News, Trends, Guides and Tools\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>","yoast_head_json":{"title":"localectl - Keyboard related settings - Cyber Security Notepad","description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, localectl","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"localectl - Keyboard related settings - Cyber Security Notepad","og_description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, localectl","og_url":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/","og_site_name":"Cyber Security Notepad","article_published_time":"2021-02-01T08:15:14+00:00","article_modified_time":"2021-02-01T09:48:34+00:00","author":"admin","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/#article","isPartOf":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/"},"author":"cybersecuritynotepad","headline":"localectl &#8211; Keyboard related settings","datePublished":"2021-02-01T08:15:14+00:00","dateModified":"2021-02-01T09:48:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/"},"wordCount":298,"commentCount":0,"keywords":["keyboard layout","keyboard mapping","Linux","localectl","passwords","troubleshooting"],"articleSection":["References"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/","url":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/","name":"localectl - Keyboard related settings - Cyber Security Notepad","isPartOf":{"@id":"https:\/\/www.cybersecuritynotepad.com\/#website"},"datePublished":"2021-02-01T08:15:14+00:00","dateModified":"2021-02-01T09:48:34+00:00","author":{"@id":"https:\/\/www.cybersecuritynotepad.com\/#\/schema\/person\/7fd460a876c44ee288cb37cb33e1ed5e"},"description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, localectl","breadcrumb":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2021\/02\/01\/localectl-keyboard-related-settings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cybersecuritynotepad.com\/"},{"@type":"ListItem","position":2,"name":"localectl &#8211; Keyboard related settings"}]},{"@type":"WebSite","@id":"https:\/\/www.cybersecuritynotepad.com\/#website","url":"https:\/\/www.cybersecuritynotepad.com\/","name":"Cyber Security Notepad","description":"Cyber and Information Security News, Trends, Guides and Tools","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybersecuritynotepad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/posts\/183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/comments?post=183"}],"version-history":[{"count":10,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/posts\/183\/revisions"}],"predecessor-version":[{"id":197,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/posts\/183\/revisions\/197"}],"wp:attachment":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/media?parent=183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/categories?post=183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/tags?post=183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}