Start Your Cybersecurity Journey: Search Skills (TryHackMe)

In this article, I will write a write-up for Search Skills that covers the Evaluation of Search Results, Search Engines, Specialized Search Engines, Vulnerabilities and Exploits, Technical Documentation, and Social Media.
What do you call a cryptographic method or product considered bogus or fraudulent?
snake oilWhat is the name of the command replacing
netstatin Linux systems?ssHow would you limit your Google search to PDF files containing the terms cyber warfare report?
filetype:pdf cyber warfare reportWhat phrase does the Linux command
ssstand for?socket statisticsWhat is the top country with lighttpd servers?
United StatesWhat does BitDefenderFalx detect the file with the hash
2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4as?Android.Riskware.Agent.LHH
visit VirusTotal to search for the file with this given hash then you’ll see the detection for BitDefenderFalx

What does the Linux command
catstand for?concatenateWhat is the
netstatparameter in MS Windows that displays the executable associated with each active connection and listening port?-bYou are hired to evaluate the security of a particular company. What is a popular social media website you would use to learn about the technical background of one of their employees?
LinkedInContinuing with the previous scenario, you are trying to find the answer to the secret question, “Which school did you go to as a child?”. What social media website would you consider checking to find the answer to such secret questions?
Facebook
Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the THM challenges. We can also connect more on LinkedIn or X.




