Sophie Chen
ResumeLinkedInGitHubBluesky
Work
Work
  • Work
  • Digital Forensics Lab
    • 1 Setting Up
    • 2 Basic Computer Skills for Digital Forensics
      • 2.1 Number Systems
      • 2.2 PC Introduction
      • 2.3 Windows Command Line Tutorial
      • 2.4 Linux Command Line Tutorial
      • 2.5 Advanced Linux Command Line Tutorial
    • 3 Basic Networking Skills for Digital Forensics
      • 3.1 HTTP Analysis using Wireshark 1
      • 3.2 HTTP Analysis using Wireshark 2
      • 3.3 SYN Flood Attack Investigation using tshark
      • 3.4 SMTP Forensics
      • 3.5 ARP Poisoning Forensics
      • 3.6 Firewall
      • 3.7 DNS Introduction
      • 3.8 DNS Spoofing Forensics
      • 3.9 WEP40 Wireless Aircrack
    • 4 Computer and Digital Forensics
      • 4.1 Introduction to Digital Forensics
      • 4.2 Sleuth Kit Tutorial
      • 4.3 USB Image Acquisition
      • 4.4 Evidence Search - A Pattern Match Game
      • 4.5 Evidence Search - File Metadata
      • 4.6 Data Carving
      • 4.7 Steganography
      • 4.8 Forensic Report Template
    • 5 Computer Forensics Case Studies
      • 5.1 Investigating NIST Data Leakage
        • 5.1.1 Environment Setting Up
        • 5.1.2 Windows Registry
        • 5.1.3 Windows Event and XML
        • 5.1.4 Web History and SQL
        • 5.1.5 Email Investigation
        • 5.1.6 File Change History and USN Journal
        • 5.1.7 Network Evidence and shellbag
        • 5.1.8 Network Drive and Cloud
        • 5.1.9 Master File Table ($MFT) and Log File ($logFile) Analysis
        • 5.1.10 Windows Search History
        • 5.1.11 Windows Volume Shadow Copy Analysis/SQL database carving
        • 5.1.12 Recycle Bin and Anti-Forensics
        • 5.1.13 Data Carving
        • 5.1.14 Crack Windows Passwords
      • 5.2 Investigating P2P Data Leakage
        • 5.2.1 Lab Environment Setting Up
        • 5.2.2 Disk Image and Partitions
        • 5.2.3 Windows Registry and File Directory
        • 5.2.4 MFT Timeline
        • 5.2.5 USN Journal Timeline
        • 5.2.6 uTorrent Log File
        • 5.2.7 File Signature
        • 5.2.8 Emails
        • 5.2.9 Web History
        • 5.2.10 Website Analysis
        • 5.2.11 Timeline (Summary)
      • 5.3 Investigating Illegal Possession of Images
        • 5.3.1 Review HTTP Analysis using Wireshark (text)
        • 5.3.2 Rhion Possession Investigation 1: File recovering
        • 5.3.3 Rhion Possession Investigation 2: Steganography
        • 5.3.4 Rhion Possession Investigation 3: Extract Evidence from FTP Traffic
        • 5.3.5 Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic
      • 5.4 Investigating Email Harassment
        • 5.4.1 Investigating Harassment Email using Wireshark
        • 5.4.2 t-shark Forensic Introduction
        • 5.4.3 Investigating Harassment Email using t-shark
      • 5.5 Investigating Illegal File Transferring
      • 5.6 Investigating Hacking Case
      • 5.7 Investigating Morris Worm Attack
        • 5.7.1 Morris Worm Attack
        • 5.7.2 Investigating Morris Worm Attack
    • 6 Mobile/IoT Forensics Case Studies
      • 6.1 Investigating Echo Show 8
        • 6.1.1 Echo Show Introduction
        • 6.1.2 Echo Show Evidence Planting
        • 6.1.3 Device Teardown and eMMC Chip-off
        • 6.1.4 Image Acquisition and Mounting
        • 6.1.5 Specifications: Device and OS Info
        • 6.1.6 Specifications: User Info
        • 6.1.7 Specifications: Network Connectivity Info
        • 6.1.8 Web Activity
        • 6.1.9 Phone Communication
        • 6.1.10 Multimedia: Photos and related Data
        • 6.1.11 Multimedia: Videos and related Data
        • 6.1.12 Multimedia: Audio and related Data
      • 6.2 Investigating Android 10
        • 6.2.1 Intro Pixel 3
        • 6.2.2 Pixel 3 Image
        • 6.2.3 Pixel 3 Device
        • 6.2.4 Pixel 3 System Setting
        • 6.2.5 Overview: App Life Cycle
        • 6.2.6 AOSP App Investigations: Messaging
        • 6.2.7 AOSP App Investigations: Contacts
        • 6.2.8 AOSP App Investigations: Calendar
        • 6.2.9 GMS App Investigations: Messaging
        • 6.2.10 GMS App Investigations: Dialer
        • 6.2.11 GMS App Investigations: Maps
        • 6.2.12 GMS App Investigations: Photos
        • 6.2.13 Third-Party App Investigations: Kik
        • 6.2.14 Third-Party App Investigations: textnow
        • 6.2.15 Third-Party App Investigations: whatapp
        • 6.2.16 Pixel 3 Rooting
      • 6.3 Investigating iPhone iOS 13.4.1
        • 6.3.1 Intro Intro iPhone iOS 13
        • 6.3.2 iOS 13.4.1 Image
        • 6.3.3 iPhone Device Investigation
        • 6.3.4 iOS System Settings
        • 6.3.5 Overview of App Life Cycle
        • 6.3.6 Messages Investigations
        • 6.3.7 Contacts Investigations
        • 6.3.8 Calendar Investigations
        • 6.3.9 Safari Investigations
        • 6.3.10 Photo Investigations
        • 6.3.11 KnowledgeC Investigations
        • 6.3.12 Health Investigations
        • 6.3.13 Location Investigations
        • 6.3.14 Cellebrite Investigations
        • 6.3.15 Magnet Axiom Investigations
        • 6.3.16 Jailbreak Investigations
      • 6.4 Investigating Drone DJI
        • 6.4.1 DJI Mavic Air Mobile
        • 6.4.2 DJI Mavic Air MicroSD Raw
        • 6.4.3 DJI Mavic Air MicroSD Encase Format
  • CTF Walkthroughs
    • Hack The Box
      • Linux Fundamentals
      • Windows Fundamentals
    • TryHackMe
      • Linux Fundamentals Part 1
      • Linux Fundamentals Part 2
      • Linux Fundamentals Part 3
      • Introductory Networking
      • HTTP in Detail
      • DNS in Detail
      • Intro to Cyber Threat Intel
      • Threat Intelligence Tools
      • MAL: Malware Introductory
      • Intro to Digital Forensics
      • Digital Forensics Case B4DM755
  • Multithreaded Network File Server
  • Thread Library
  • Virtual Memory Pager
Powered by GitBook
On this page
  • Task 1: Introduction
  • Task 2: A Bit of Background on Linux
  • Task 3: Interacting With Your First Linux Machine (In-Browser)
  • Task 4: Running Your First few Commands
  • Task 5: Interacting With the Filesystem!
  • Task 6: Searching for Files
  • Task 7: An Introduction to Shell Operators
  • Task 8: Conclusions & Summaries
  • Task 9: Linux Fundamentals Part 2
  1. CTF Walkthroughs
  2. TryHackMe

Linux Fundamentals Part 1


Task 1: Introduction

This room is the first in a three-part series on Linux fundamentals. This room will have us:

  • Running our very first commands in an interactive Linux machine

  • Learning some essential commands used to interact with the file system

  • Learning how users and groups work on Linux (and why this is important for penetration testing)

Task 2: A Bit of Background on Linux

Linux is an umbrella term for a group of operating systems all based on Unix. We refer to these operating systems as "flavors" of Linux since they have many similarities. Linux operating systems are commonly used for websites, control panels, critical infrastructure, and more.

Research: What year was the first release of a Linux operating system?

1991

This information can be found with a quick Google search. The original Linux kernel was released on September 17, 1991.

Task 3: Interacting With Your First Linux Machine (In-Browser)

We can interact with a Linux machine in TryHackMe by pressing the "Start Machine" button on the top-right of each task.

Task 4: Running Your First few Commands

Two basic commands that can be run in the Linux command line are echo and whoami. echo <text> outputs the text we provide to it. whoami outputs the username we are logged in as.

If we wanted to output the text "TryHackMe", what would our command be?

echo TryHackMe

The echo <text> command outputs the provided text. No quotation marks are needed.

What is the username of who you're logged in as on your deployed Linux machine?

tryhackme

Use the command whoami to see our username.

Task 5: Interacting With the Filesystem!

The Linux command line allows us to interact with the filesystem. cd <directory> allows us to change directories and pwd prints which directory we are currently in.

ls lists the files in the current directory. cat <file1> <file2> stands for concatenate. The number of files provided to this command can vary since cat outputs the given files concatenated together. Despite its name, this command is most commonly used to print the contents of a single file.

On the Linux machine that you deploy, how many folders are there?

4

Use the ls command to list files and folders.

Which directory contains a file?

folder4

Use the cd <directory> to enter each folder. Use cd ../ to go "back" one folder.

What is the contents of this file?

Hello World

Use cat <file> to view file contents.

Use the cd command to navigate to this file and find out the new current working directory. What is the path?

/home/tryhackme/folder4

Use pwd to print the directory we are currently in.

Task 6: Searching for Files

We can search the filesystem for files by name or other attributes with find. grep <pattern> <file> can be used to search the contents of files for specific values.

Use grep on "access.log" to find the flag that has a prefix of "THM". What is the flag?

THM{ACCESS}

Use grep THM* access.log to search for prefixes of "THM". The * in the pattern is a wildcard that matches any character.

Task 7: An Introduction to Shell Operators

Various operators in the Linux command line allow us to use commands with more flexibility. & allows us to run commands in the background of our terminal. && looks similar but is unrelated to &. Rather, && allows us to combine multiple commands together in one line of your terminal.

The> operator is a redirector, meaning that we can take the output from a command (such as using cat to output a file) and direct it elsewhere. >> has the same functionality as the > operator but appends the output rather than replacing (meaning nothing is overwritten).

If we wanted to run a command in the background, what operator would we want to use?

&

Running a command in the background is done with <command> &.

If I wanted to replace the contents of a file named "passwords" with the word "password123", what would my command be?

echo password123 > passwords

> is used to write a command's output to a file.

Now if I wanted to add "tryhackme" to this file named "passwords" but also keep "passwords123", what would my command be

echo tryhackme >> passwords

>> is used to append a command's output to a file.

Task 8: Conclusions & Summaries

In conclusion, this room has allowed us to:

  • Understand why Linux is so commonplace today

  • Interact with our first-ever Linux machine

  • Run some of the most fundamental commands

  • Get an introduction to navigating around the filesystem and using commands like find and grep to make finding data even more efficient

  • Power up our commands by learning about some of the important shell operators

Task 9: Linux Fundamentals Part 2


Last updated 4 months ago

My walkthrough for the next room in this Linux introductory series can be found .

⋅ ⋅

here
Work
Home
Thoughts