Linux Fundamentals II

Learn how to use SSH, advanced commands, and file system interaction...

SSH (Deploy)

is a protocol between devices in an encrypted form. Using cryptography, any input we send in a human-readable format is encrypted for travelling over a network - where it is then unencrypted once it reaches the remote machine.

SSH allows us to remotely execute commands on another device remotely. Any data sent between the devices is encrypted when it is sent over a network such as the Internet.


Flags & Switches

A majority of commands allow for arguments to be provided. These arguments are identified by a hyphen and a certain keyword known as flags or switches.


Commands


Common Directories


Answers

Task 3

What directional arrow key would we use to navigate down the manual page? down

What flag would we use to display the output in a “human-readable” way? -h

Task 4

How would you create the file named “newnote”? touch newnote

On the deployable machine, what is the file type of “unknown1” in “tryhackme’s” home directory? ASCII text

How would we move the file “myfile” to the directory “myfolder” mv myfile myfolder

What are the contents of this file? THM{FILESYSTEM}

Task 5

On the deployable machine, who is the owner of “important”? user2

What would the command be to switch to the user “user2”? su user2

Output the contents of “important”, what is the flag? THM{SU_USER2

Task 6

What is the directory path that would we expect logs to be stored in? /var/log

What root directory is similar to how RAM on a computer works? /tmp

Name the home directory of the root user /root


Last updated