Skip to main content

Command Palette

Search for a command to run...

Linux Fundamentals: Linux Fundamentals Part 3 (TryHackMe)

Updated
2 min read
Linux Fundamentals: Linux Fundamentals Part 3 (TryHackMe)
J

Software Developer | Learning Cybersecurity | Open for roles *

If you're in the early stages of your career in software development (student or still looking for an entry-level role) and in need of mentorship, you can reach out to me.

In this article, I will write a write-up for the Linux Fundamentals Part 3 that covers the Deploy Your Linux Machines, Terminal Text Editors, General/Useful Utilities, and Processes 101, Maintaining Your System: Automation, Maintaining Your System: Package Management, and Maintaining Your System: Logs.

  1. Edit "task3" located in "tryhackme"'s home directory using Nano. What is the flag? THM{TEXT_EDITORS}

  2. Ensure you are connected to the deployed instance (MACHINE_IP)

Now, use Python 3's "HTTPServer" module to start a web server in the home directory of the "tryhackme" user on the deployed instance.

Download the file http://MACHINE_IP:8000/.flag.txt onto the TryHackMe AttackBox. Remember, you will need to do this in a new terminal. What are the contents? THM{WGET_WEBSERVER}

  1. If we were to launch a process where the previous ID was "300", what would the ID of this new process be? 301

  2. If we wanted to cleanly kill a process, what signal would we send it? SIGTERM

  3. Locate the process that is running on the deployed instance (MACHINE_IP). What flag is given? THM{PROCESSES}

  4. What command would we use to stop the service "myservice"? systemctl stop myservice

  5. What command would we use to start the same service on the boot-up of the system? systemctl enable myservice

  6. What command would we use to bring a previously backgrounded process back to the foreground? fg

  7. When will the crontab on the deployed instance (MACHINE_IP) run? @reboot

using the crontab -e crontab -edit it opens this which shows that there’s an ongoing on @reboot process

  1. What is the IP address of the user who visited the site? 10.9.232.111

  2. What file did they access? catsanddogs.jpg

Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the THM challenges.