Skip to main content

Linux Fundamentals Part 3 | TryHackMe: Walkthrough | INFOCODX

 

Linux Fundamentals Part 3

Discover a simplified and beginner-friendly documentation of the Linux Fundamentals Part 3 Room on TryHackMe, which includes a detailed step-by-step guide and answer key.


Room URL: Linux Fundamentals Part 3


Task 1 (Introduction)


Ready to begin? This area will guide you through flags, arguments, advanced filesystem information, and permissions!

Nothing more to do here but proceed to part 2!

Task 2 (Accessing Your Linux Machine Using SSH)


To proceed to task 3, it is crucial that you closely follow TryHackMe 's guide, as this task is highly specific to their platform.

TASK 3-: Terminal Text Editors

Create a file using Nano by using the command “nano new_file_name”.

# Create a file using Nano

Answer:  No answer needed

# Edit “task3” located in “tryhackme”’s home directory using Nano. What is the flag?

Answer: THM{TEXT_EDITORS}

Task 4 : General/Useful Utilities    

Type in the following command to start a python webserver on the default port     
  
command : python3 -m http.server 

now open a second terminal so we can copy the file over.

Type in the following command
  
command : wget HTTP://<MACHIEN_IP>:8000/.flag.txt

Once the file is copied over you can cat the output to the screen

command : cat .flag.txt

What are the contents?

Answer :  THM{WGET_WEBSERVER}

Task 5 Processes 101   

Read all that is in this task and learn about the differences

#If we were to launch a process where the previous ID was "300", what would the ID of this new process be?

Answer :  301

#If we wanted to cleanly kill a process, what signal would we send it?

Answer : SIGTERM

# Locate the process that is running on the deployed instance (MACHINE_IP). What flag is given?

Answer :  THM{PROCESSES}

# What command would we use to stop the service "myservice"?

Answer :  systemctl stop myservice

# What command would we use to start the same service on the boot-up of the system?    

Answer : systemctl enable myservice

What command would we use to bring a previously backgrounded process back to the foreground?

Answer : fg

Task 6: Maintaining Your System: Automation    

To find the answer we need to take a look inside the crontab by typing the following command         

command :  crontab -a          

#When will the crontab on the deployed instance (MACHINE_IP) run?

Answer :   @reboot


Task 7 : Maintaining Your System: Package Management

Read all that is in this task and press complete

Task 8 : Maintaining Your System: Logs

Navigate to the login of apache by typing gin the following command
command : cd /var/log/apache2
# What is the IP address of the user who visited the site?
type in the following command to cat out the correct logging
command :cat access.log.1
What file did they access?
Answer :  catsanddogs.jpg


TASK 9-: Conclusions & Summaries

The mission has been fulfilled! I trust that you have learned as much as I have while writing this summary. Thank you for being a dedicated reader.

"I welcome any comments or feedback you may have. Feel free to share your thoughts below. Thank you again for your time and consideration!"

Comments

Popular posts from this blog

Storm-Breaker, enables the utilization of social engineering techniques to access webcams, microphones, and location finders

  Phishing represents a cyber attack method in which attackers aim to deceive individuals into revealing their personal information, such as login credentials or credit card numbers, by posing as a reputable entity, such as a bank or a social media platform. This fraudulent activity typically occurs through emails, text messages, or social media posts that contain a link to a counterfeit website or request personal information. Phishing attacks can be highly sophisticated and challenging to detect, often resulting in serious consequences like financial loss, identity theft, or unauthorized access to sensitive data. It is crucial to be vigilant about the signs of a phishing attack and take measures to protect both yourself and your personal information. Storm-Breaker  a command-line tool written in python, has garnered a strong following within the social engineering community. Its primary purpose is to provide access to webcams , microphones , and location finders . Setting ...

Linux Fundamentals Part 2 | TryHackMe: Walkthrough | INFOCODX

  Simplified and beginner-friendly documentation of the Linux Fundamentals Part 2 Room on TryHackMe, featuring a step-by-step guide and answer key. Room URL:  Linux Fundamentals Part 2 Task 1 (Introduction) Ready to begin? This area will guide you through flags, arguments, advanced filesystem information, and permissions! Nothing more to do here but proceed to part 2! Task 2 (Accessing Your Linux Machine Using SSH) To proceed to task 3, it is crucial that you closely follow TryHackMe 's guide, as this task is highly specific to their platform. Task 3 (Introduction to flags and switches) T erminal commands often accept arguments, which can be provided by using a hyphen ('-') followed by a keyword, commonly referred to as flags or switches. By default, commands perform their usual behavior. For example, the "ls" comma nd displays the contents of the current directory without showing hidden files. To modify command behavior  By using the -a option (--all), our output...