<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Ricardo Santos</title>
    <description>The latest articles on Forem by Ricardo Santos (@rscybertech).</description>
    <link>https://forem.com/rscybertech</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F996682%2F5c2f6fd4-a7dd-4952-9224-37294685f7e2.jpg</url>
      <title>Forem: Ricardo Santos</title>
      <link>https://forem.com/rscybertech</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/rscybertech"/>
    <language>en</language>
    <item>
      <title>TryHackMe | Windows PowerShell | RSCyberTech</title>
      <dc:creator>Ricardo Santos</dc:creator>
      <pubDate>Fri, 03 Jan 2025 18:32:37 +0000</pubDate>
      <link>https://forem.com/rscybertech/tryhackme-windows-powershell-rscybertech-4l3o</link>
      <guid>https://forem.com/rscybertech/tryhackme-windows-powershell-rscybertech-4l3o</guid>
      <description>&lt;p&gt;➡️ &lt;strong&gt;&lt;em&gt;By &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;@RSCyberTech&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Website: &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;RSCyberTech.com&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;LinkedIn: &lt;a href="https://www.linkedin.com/in/ricardoams/" rel="noopener noreferrer"&gt;linkedin.com/in/ricardoams&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Platform: &lt;a href="https://tryhackme.com/" rel="noopener noreferrer"&gt;TryHackMe&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Learning Path: &lt;a href="https://tryhackme.com/r/path/outline/cybersecurity101" rel="noopener noreferrer"&gt;Cyber Security 101&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Room: &lt;a href="https://tryhackme.com/r/room/windowspowershell" rel="noopener noreferrer"&gt;Windows PowerShell&lt;/a&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  1️⃣ Task 1 - Introduction
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;no answer needed&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  2️⃣ Task 2 - What Is PowerShell
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What do we call the advanced approach used to develop PowerShell?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;object-oriented&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“… Snover’s solution was to develop an object-oriented approach…”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  3️⃣ Task 3 - PowerShell Basics
&lt;/h1&gt;

&lt;h2&gt;
  
  
  How would you retrieve a list of commands that &lt;strong&gt;start with&lt;/strong&gt; the verb &lt;code&gt;Remove&lt;/code&gt;? [for the sake of this question, avoid the use of quotes (" or ') in your answer]
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Get-Command -Name Remove*&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“To list all available cmdlets, functions, aliases, and scripts that can be executed in the current PowerShell session, we can use &lt;code&gt;Get-Command&lt;/code&gt;. It’s an essential tool for discovering what commands one can use.
…
or each &lt;code&gt;CommandInfo&lt;/code&gt; object retrieved by the cmdlet, some essential information (properties) is displayed on the console. It’s possible to filter the list of commands based on displayed property values. For example, if we want to display only the available commands of type “function”, we can use &lt;code&gt;-CommandType "Function"&lt;/code&gt;"&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;li&gt;check help page of the &lt;code&gt;Get-Command&lt;/code&gt; for more info, like the &lt;code&gt;-name&lt;/code&gt; parameter&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What cmdlet has its traditional counterpart &lt;code&gt;echo&lt;/code&gt; as an alias?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Write-Output&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PS C:\Users\captain&amp;gt; get-help *alias*              
Name                              Category  Module                    Synopsis
----                              --------  ------                    --------
Export-Alias                      Cmdlet    Microsoft.PowerShell.U... Exports information about currently defined aliases to a file.
Get-Alias                         Cmdlet    Microsoft.PowerShell.U... Gets the aliases for the current session.
Import-Alias                      Cmdlet    Microsoft.PowerShell.U... Imports an alias list from a file.
New-Alias                         Cmdlet    Microsoft.PowerShell.U... Creates a new alias.
Set-Alias                         Cmdlet    Microsoft.PowerShell.U... Creates or changes an alias for a cmdlet or other command in the current PowerShell session.
about_Aliases                     HelpFile
about_Alias_Provider              HelpFile
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PS C:\Users\captain&amp;gt; get-alias -Name echo
CommandType     Name                                               Version    Source
-----------     ----                                               -------    ------
Alias           echo -&amp;gt; Write-Output
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  What is the command to retrieve some example usage for the cmdlet &lt;code&gt;New-LocalUser&lt;/code&gt;?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Get-Help New-LocalUser -examples&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“Another essential cmdlet to keep in our tool belt is &lt;code&gt;Get-Help&lt;/code&gt;: it provides detailed information about cmdlets, including usage, parameters, and examples. It’s the go-to cmdlet for learning how to use PowerShell commands.”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  4️⃣ Task 4 - Navigating the File System and Working with Files
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What cmdlet can you use instead of the traditional Windows command &lt;code&gt;type&lt;/code&gt;?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Get-Content&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“Finally, to read and display the contents of a file, we can use the &lt;code&gt;Get-Content&lt;/code&gt; cmdlet, which works similarly to the &lt;code&gt;type&lt;/code&gt; command in Command Prompt (or &lt;code&gt;cat&lt;/code&gt; in Unix-like systems).”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Present in the text&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What PowerShell command would you use to display the content of the "C:\Users" directory? [for the sake of this question, avoid the use of quotes (" or ') in your answer]
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Get-ChildItem&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;”…&lt;code&gt;Get-ChildItem&lt;/code&gt; lists the files and directories in a location specified with the &lt;code&gt;-Path&lt;/code&gt; parameter. It can be used to explore directories and view their contents…”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Present in the text&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How many items are displayed by the command described in the previous question?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;4&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PS C:\Users\captain&amp;gt; ( Get-ChildItem -Path C:\Users).count
4
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  5️⃣ Task 5 - Piping, Filtering, and Sorting Data
&lt;/h1&gt;

&lt;h2&gt;
  
  
  How would you retrieve the items in the current directory with size greater than 100? [for the sake of this question, avoid the use of quotes (" or ') in your answer]
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Get-ChildItem | Where-Object -Property Length -gt 100&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Crafted from the examples in the text&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  6️⃣ Task 6 - System and Network Information
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Other than your current user and the default "Administrator" account, what other user is enabled on the target machine?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;p1r4t3&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;```
PS C:\Users\captain&amp;gt; Get-LocalUser
Name               Enabled Description
----               ------- -----------
Administrator      True    Built-in account for administering the computer/domain
captain            True    The beloved captain of this pirate ship.
DefaultAccount     False   A user account managed by the system.
Guest              False   Built-in account for guest access to the computer/domain
p1r4t3             True    A merry life and a short one.
WDAGUtilityAccount False   A user account managed and used by the system for Windows Defender Application Guard scenarios.
```
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  This lad has hidden his account among the others with no regard for our beloved captain! What is the motto he has so bluntly put as his account's description?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;A merry life and a short one.&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PS C:\Users\captain&amp;gt; Get-LocalUser
Name               Enabled Description
----               ------- -----------
Administrator      True    Built-in account for administering the computer/domain
captain            True    The beloved captain of this pirate ship.
DefaultAccount     False   A user account managed by the system.
Guest              False   Built-in account for guest access to the computer/domain
p1r4t3             True    A merry life and a short one.
WDAGUtilityAccount False   A user account managed and used by the system for Windows Defender Application Guard scenarios.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Now a small challenge to put it all together. This shady lad that we just found hidden among the local users has his own home folder in the "C:\Users" directory. Can you navigate the filesystem and find the hidden treasure inside this pirate's home?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;THM{p34rlInAsh3ll}&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PS C:\Users\captain&amp;gt; cat ..\p1r4t3\hidden-treasure-chest\big-treasure.txt
            ___
        .-"; ! ;"-.
      .'!  : | :  !`.
     /\  ! : ! : !  /\
    /\ |  ! :|: !  | /\
   (  \ \ ; :!: ; / /  )
  ( `. \ | !:|:! | / .' )
  (`. \ \ \!:|:!/ / / .')
   \ `.`.\ |!|! |/,'.' /
    `._`.\\\!!!// .'_.'
       `.`.\\|//.'.'
        |`._`n'_.'|  hjw
        "----^----"
FLAG: THM{p34rlInAsh3ll}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  7️⃣ Task 7 - Real-Time System Analysis
&lt;/h1&gt;

&lt;h2&gt;
  
  
  In the previous task, you found a marvellous treasure carefully hidden in the target machine. What is the hash of the file that contains it?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;71FC5EC11C2497A32F8F08E61399687D90ABE6E204D2964DF589543A613F3E08&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PS C:\Users\captain&amp;gt; get-filehash ..\p1r4t3\hidden-treasure-chest\big-treasure.txt   
Algorithm       Hash                                                                   Path
---------       ----                                                                   ----
SHA256          71FC5EC11C2497A32F8F08E61399687D90ABE6E204D2964DF589543A613F3E08       C:\Users\p1r4t3\hidden-treasure-chest\big-treasure.txt

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  What property retrieved by default by &lt;code&gt;Get-NetTCPConnection&lt;/code&gt; contains information about the process that has started the connection?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;OwningProcess&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PS C:\Users\captain&amp;gt; Get-NetTCPConnection | get-member | sort name | where {$_.name -imatch "process"}   
   TypeName: Microsoft.Management.Infrastructure.CimInstance#ROOT/StandardCimv2/MSFT_NetTCPConnection
Name          MemberType Definition
----          ---------- ----------
OwningProcess Property   uint32 OwningProcess {get;}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  It's time for another small challenge. Some vital service has been installed on this pirate ship to guarantee that the captain can always navigate safely. But something isn't working as expected, and the captain wonders why. Investigating, they find out the truth, at last: the service has been tampered with! The shady lad from before has modified the service &lt;code&gt;DisplayName&lt;/code&gt; to reflect his very own motto, the same that he put in his user description. With this information and the PowerShell knowledge you have built so far, can you find the service name?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;p1r4t3-s-compass&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PS C:\Users\captain&amp;gt; Get-Service | sort name | where {$_.DisplayName -imatch "A merry life and a short one"}
Status   Name               DisplayName
------   ----               -----------
Running  p1r4t3-s-compass   A merry life and a short one.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  8️⃣ Task 8 - Scripting
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What is the syntax to execute the command &lt;code&gt;Get-Service&lt;/code&gt; on a remote computer named "RoyalFortune"? Assume you don't need to provide credentials to establish the connection. [for the sake of this question, avoid the use of quotes (" or ') in your answer]
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Invoke-Command -ComputerName RoyalFortune -ScriptBlock { Get-Service }&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Workflow / Justification / Source / Steps / Reasoning
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;crafted from the text examples&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  9️⃣ Task 9 - Conclusion
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;no answer needed&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;➡️ &lt;strong&gt;&lt;em&gt;By &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;@RSCyberTech&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Website: &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;RSCyberTech.com&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;LinkedIn: &lt;a href="https://www.linkedin.com/in/ricardoams/" rel="noopener noreferrer"&gt;linkedin.com/in/ricardoams&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>tryhackme</category>
      <category>cybersecurity</category>
      <category>windows</category>
      <category>powershell</category>
    </item>
    <item>
      <title>TryHackMe | Windows Command Line | RSCyberTech</title>
      <dc:creator>Ricardo Santos</dc:creator>
      <pubDate>Tue, 24 Dec 2024 12:36:11 +0000</pubDate>
      <link>https://forem.com/rscybertech/tryhackme-windows-command-line-rscybertech-52go</link>
      <guid>https://forem.com/rscybertech/tryhackme-windows-command-line-rscybertech-52go</guid>
      <description>&lt;p&gt;➡️ &lt;strong&gt;&lt;em&gt;By &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;@RSCyberTech&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Website: &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;RSCyberTech.com&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;LinkedIn: &lt;a href="https://www.linkedin.com/in/ricardoams/" rel="noopener noreferrer"&gt;linkedin.com/in/ricardoams&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Platform: &lt;a href="https://tryhackme.com/" rel="noopener noreferrer"&gt;TryHackMe&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Learning Path: &lt;a href="https://tryhackme.com/r/path/outline/cybersecurity101" rel="noopener noreferrer"&gt;Cyber Security 101&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Room: &lt;a href="https://tryhackme.com/r/room/windowscommandline" rel="noopener noreferrer"&gt;Windows Command Line&lt;/a&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  1️⃣ Task 1 - Introduction
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What is the default command line interpreter in the Windows environment?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;cmd.exe&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;“The purpose of this room is to teach you how to use MS Windows Command Prompt &lt;/em&gt;&lt;em&gt;&lt;code&gt;cmd.exe&lt;/code&gt;&lt;/em&gt;&lt;em&gt;, the default command-line interpreter in the Windows environment.”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  2️⃣ Task 2 - Basic System Information
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What is the OS version of the Windows VM?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;10.0.20348.2655&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“Let’s use the &lt;code&gt;ver&lt;/code&gt; command to determine the operating system (OS) version.”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;```
user@WINSRV2022-CORE C:\Users\user&amp;gt;ver

Microsoft Windows [Version 10.0.20348.2655]
```
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  What is the hostname of the Windows VM?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;WINSRV2022-CORE&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“We can run the &lt;code&gt;systeminfo&lt;/code&gt; command to list various information about the system such as OS information, system details, processor and memory.”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;user@WINSRV2022-CORE C:\Users\user&amp;gt;systeminfo

Host Name:                 WINSRV2022-CORE
OS Name:                   Microsoft Windows Server 2022 Datacenter
OS Version:                10.0.20348 N/A Build 20348
OS Manufacturer:           Microsoft Corporation
OS Configuration:          Standalone Server
OS Build Type:             Multiprocessor Free
Registered Owner:          Windows User
Registered Organization:   
Product ID:                00454-60000-00001-AA763
Original Install Date:     4/23/2024, 7:36:29 PM
System Boot Time:          12/24/2024, 11:11:47 AM
System Manufacturer:       Amazon EC2
System Model:              t3a.micro
System Type:               x64-based PC
Processor(s):              1 Processor(s) Installed.
                           [01]: AMD64 Family 23 Model 1 Stepping 2 AuthenticAMD ~2200 Mhz
BIOS Version:              Amazon EC2 1.0, 10/16/2017
Windows Directory:         C:\Windows
System Directory:          C:\Windows\system32
Boot Device:               \Device\HarddiskVolume1
System Locale:             en-us;English (United States)
Input Locale:              en-us;English (United States)
Time Zone:                 (UTC+00:00) Dublin, Edinburgh, Lisbon, London
Total Physical Memory:     980 MB
Available Physical Memory: 127 MB
Virtual Memory: Max Size:  1,300 MB
Virtual Memory: Available: 357 MB
Virtual Memory: In Use:    943 MB
Page File Location(s):     C:\pagefile.sys
Domain:                    WORKGROUP
Logon Server:              N/A
Hotfix(s):                 3 Hotfix(s) Installed.
                           [01]: KB5041948
                           [02]: KB5041160
                           [03]: KB5041590
Network Card(s):           1 NIC(s) Installed.
                           [01]: Amazon Elastic Network Adapter
                                 Connection Name: Ethernet
                                 DHCP Enabled:    Yes
                                 DHCP Server:     10.10.0.1
                                 IP address(es)
                                 [01]: 10.10.151.7
                                 [02]: fe80::8d9b:8b8f:6409:e143
Hyper-V Requirements:      A hypervisor has been detected. Features required for Hyper-V will not be displayed.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  3️⃣ Task 3 - Network Troubleshooting
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Which command can we use to look up the server’s physical address (MAC address)?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;ipconfig /all&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“You can also use &lt;code&gt;ipconfig /all&lt;/code&gt; for more information about your network configuration.”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;user@WINSRV2022-CORE C:\Users\user&amp;gt;ipconfig /all

Windows IP Configuration

   Host Name . . . . . . . . . . . . : WINSRV2022-CORE
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : eu-west-1.compute.internal
                                       eu-west-1.ec2-utilities.amazonaws.com

Ethernet adapter Ethernet:

   Connection-specific DNS Suffix  . : eu-west-1.compute.internal
   Description . . . . . . . . . . . : Amazon Elastic Network Adapter
   Physical Address. . . . . . . . . : 02-75-36-8B-3C-DF
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::8d9b:8b8f:6409:e143%5(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.10.151.7(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : Tuesday, December 24, 2024 11:12:18 AM
   Lease Expires . . . . . . . . . . : Tuesday, December 24, 2024 12:42:18 PM
   Default Gateway . . . . . . . . . : 10.10.0.1
   DHCP Server . . . . . . . . . . . : 10.10.0.1
   DHCPv6 IAID . . . . . . . . . . . : 84601211
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2D-B9-B7-EF-00-0C-29-FF-E5-C8
   DNS Servers . . . . . . . . . . . : 10.0.0.2
   NetBIOS over Tcpip. . . . . . . . : Enabled
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  What is the name of the process listening on port 3389?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;TermService&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“The final networking command we will cover in this room is &lt;code&gt;netstat&lt;/code&gt;. This command displays current network connections and listening ports.
…
&lt;code&gt;-a&lt;/code&gt; displays all established connections and listening ports
&lt;code&gt;-b&lt;/code&gt; shows the program associated with each listening port and established connection”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;user@WINSRV2022-CORE C:\Users\user&amp;gt;netstat -ab   

Active Connections

  Proto  Local Address          Foreign Address        State
  TCP    0.0.0.0:22             WINSRV2022-CORE:0      LISTENING
 [sshd.exe]
  TCP    0.0.0.0:135            WINSRV2022-CORE:0      LISTENING
  RpcSs
 [svchost.exe]
  TCP    0.0.0.0:445            WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    0.0.0.0:3389           WINSRV2022-CORE:0      LISTENING
  TermService
 [svchost.exe]
  TCP    0.0.0.0:5985           WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    0.0.0.0:47001          WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    0.0.0.0:49664          WINSRV2022-CORE:0      LISTENING
 [lsass.exe]
  TCP    0.0.0.0:49665          WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    0.0.0.0:49666          WINSRV2022-CORE:0      LISTENING
  EventLog
 [svchost.exe]
  TCP    0.0.0.0:49667          WINSRV2022-CORE:0      LISTENING
  Schedule
 [svchost.exe]
  TCP    0.0.0.0:49668          WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    10.10.151.7:22         ip-10-11-34-174:46794  ESTABLISHED
 [sshd.exe]
  TCP    10.10.151.7:139        WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    [::]:22                WINSRV2022-CORE:0      LISTENING
 [sshd.exe]
  TCP    [::]:135               WINSRV2022-CORE:0      LISTENING
  RpcSs
 [svchost.exe]
  TCP    [::]:445               WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    [::]:3389              WINSRV2022-CORE:0      LISTENING
  TermService
 [svchost.exe]
  TCP    [::]:5985              WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    [::]:47001             WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    [::]:49664             WINSRV2022-CORE:0      LISTENING
 [lsass.exe]
  TCP    [::]:49665             WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  TCP    [::]:49666             WINSRV2022-CORE:0      LISTENING
  EventLog
 [svchost.exe]
  TCP    [::]:49667             WINSRV2022-CORE:0      LISTENING
  Schedule
 [svchost.exe]
  TCP    [::]:49668             WINSRV2022-CORE:0      LISTENING
 Can not obtain ownership information
  UDP    0.0.0.0:123            *:*
  W32Time
 [svchost.exe]
  UDP    0.0.0.0:500            *:*
  IKEEXT
 [svchost.exe]
  UDP    0.0.0.0:3389           *:*
  TermService
 [svchost.exe]
  UDP    0.0.0.0:4500           *:*
  IKEEXT
 [svchost.exe]
  UDP    0.0.0.0:5353           *:*
  Dnscache
 [svchost.exe]
  UDP    0.0.0.0:5355           *:*
  Dnscache
 [svchost.exe]
  UDP    0.0.0.0:50180          *:*
  Dnscache
 [svchost.exe]
  UDP    0.0.0.0:50377          *:*
  Dnscache
 [svchost.exe]
  UDP    10.10.151.7:137        *:*
 Can not obtain ownership information
  UDP    10.10.151.7:138        *:*
 Can not obtain ownership information
  UDP    127.0.0.1:61602        127.0.0.1:61602
  iphlpsvc
 [svchost.exe]
  UDP    [::]:123               *:*
  W32Time
 [svchost.exe]
  UDP    [::]:500               *:*
  IKEEXT
 [svchost.exe]
  UDP    [::]:3389              *:*
  TermService
 [svchost.exe]
  UDP    [::]:4500              *:*
  IKEEXT
 [svchost.exe]
  UDP    [::]:5353              *:*
  Dnscache
 [svchost.exe]
  UDP    [::]:5355              *:*
  Dnscache
 [svchost.exe]
  UDP    [::]:50180             *:*
  Dnscache
 [svchost.exe]
  UDP    [::]:50377             *:*
  Dnscache
 [svchost.exe]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  What is the subnet mask?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;255.255.0.0&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“You can also use &lt;code&gt;ipconfig /all&lt;/code&gt; for more information about your network configuration.”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;user@WINSRV2022-CORE C:\Users\user&amp;gt;ipconfig /all

Windows IP Configuration

   Host Name . . . . . . . . . . . . : WINSRV2022-CORE
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : eu-west-1.compute.internal
                                       eu-west-1.ec2-utilities.amazonaws.com

Ethernet adapter Ethernet:

   Connection-specific DNS Suffix  . : eu-west-1.compute.internal
   Description . . . . . . . . . . . : Amazon Elastic Network Adapter
   Physical Address. . . . . . . . . : 02-75-36-8B-3C-DF
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::8d9b:8b8f:6409:e143%5(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.10.151.7(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : Tuesday, December 24, 2024 11:12:18 AM
   Lease Expires . . . . . . . . . . : Tuesday, December 24, 2024 12:42:18 PM
   Default Gateway . . . . . . . . . : 10.10.0.1
   DHCP Server . . . . . . . . . . . : 10.10.0.1
   DHCPv6 IAID . . . . . . . . . . . : 84601211
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2D-B9-B7-EF-00-0C-29-FF-E5-C8
   DNS Servers . . . . . . . . . . . : 10.0.0.2
   NetBIOS over Tcpip. . . . . . . . : Enabled
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  4️⃣ Task 4 - File and Disk Management
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What are the file’s contents in C:\Treasure\Hunt?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;THM{CLI_POWER}&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“You can easily view text files with the command &lt;code&gt;type&lt;/code&gt;.”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;SRV2022-CORE C:\Users\user&amp;gt;type C:\Treasure\Hunt\flag.txt 

THM{CLI_POWER}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  5️⃣ Task 5 - Task and Process Management
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What command would you use to find the running processes related to notepad.exe?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;tasklist /FI "imagename eq notepad.exe”&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“Let’s say that we want to search for tasks related to &lt;code&gt;sshd.exe&lt;/code&gt;, we can do that with the command &lt;code&gt;tasklist /FI "imagename eq sshd.exe"&lt;/code&gt;. Note that &lt;code&gt;/FI&lt;/code&gt; is used to set the filter image name equals &lt;code&gt;sshd.exe&lt;/code&gt;.”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What command can you use to kill the process with PID 1516?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;taskkill /PID 1516&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;“With the process ID (PID) known, we can terminate any task using &lt;code&gt;taskkill /PID target_pid&lt;/code&gt;. For example, if we want to kill the process with PID &lt;code&gt;4567&lt;/code&gt;, we would issue the command &lt;code&gt;taskkill /PID 4567&lt;/code&gt;.”&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Mentioned in the section’s text.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  6️⃣ Task 6 - Conclusion
&lt;/h1&gt;

&lt;h2&gt;
  
  
  The command &lt;code&gt;shutdown /s&lt;/code&gt; can shut down a system. What is the command you can use to restart a system?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;shutdown /r&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;user@WINSRV2022-CORE C:\Users\user&amp;gt;shutdown /?
Usage: shutdown [/i | /l | /s | /sg | /r | /g | /a | /p | /h | /e | /o] [/hybrid] [/soft] [/fw] [/f]
    [/m \\computer][/t xxx][/d [p|u:]xx:yy [/c "comment"]]

    No args    Display help. This is the same as typing /?.
    /?         Display help. This is the same as not typing any options.
    /i         Display the graphical user interface (GUI).
               This must be the first option.
    /l         Log off. This cannot be used with /m or /d options.
    /s         Shutdown the computer.
    /sg        Shutdown the computer. On the next boot, if Automatic Restart Sign-On
               is enabled, automatically sign in and lock last interactive user.
               After sign in, restart any registered applications.
    /r         Full shutdown and restart the computer.
    /g         Full shutdown and restart the computer. After the system is rebooted,
               if Automatic Restart Sign-On is enabled, automatically sign in and
               lock last interactive user.
               After sign in, restart any registered applications.
    /a         Abort a system shutdown.
               This can only be used during the time-out period.
               Combine with /fw to clear any pending boots to firmware.
    /p         Turn off the local computer with no time-out or warning.
               Can be used with /d and /f options.
    /h         Hibernate the local computer.
               Can be used with the /f option.
    /hybrid    Performs a shutdown of the computer and prepares it for fast startup.
               Must be used with /s option.
    /fw        Combine with a shutdown option to cause the next boot to go to the
               firmware user interface.
    /e         Document the reason for an unexpected shutdown of a computer.
    /o         Go to the advanced boot options menu and restart the computer.
               Must be used with /r option.
    /m \\computer Specify the target computer.
    /t xxx     Set the time-out period before shutdown to xxx seconds.
               The valid range is 0-315360000 (10 years), with a default of 30.
               If the timeout period is greater than 0, the /f parameter is
               implied.
    /c "comment" Comment on the reason for the restart or shutdown.
               Maximum of 512 characters allowed.
    /f         Force running applications to close without forewarning users.
               The /f parameter is implied when a value greater than 0 is
               specified for the /t parameter.
    /d [p|u:]xx:yy  Provide the reason for the restart or shutdown.
               p indicates that the restart or shutdown is planned.
               u indicates that the reason is user defined.
               If neither p nor u is specified the restart or shutdown is
               unplanned.
               xx is the major reason number (positive integer less than 256).
               yy is the minor reason number (positive integer less than 65536).
Failed to get retrieve reasons.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  What command can you use to abort a scheduled system shutdown?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;shutdown /a&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;p&gt;-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;user@WINSRV2022-CORE C:\Users\user&amp;gt;shutdown /?
Usage: shutdown [/i | /l | /s | /sg | /r | /g | /a | /p | /h | /e | /o] [/hybrid] [/soft] [/fw] [/f]
    [/m \\computer][/t xxx][/d [p|u:]xx:yy [/c "comment"]]

    No args    Display help. This is the same as typing /?.
    /?         Display help. This is the same as not typing any options.
    /i         Display the graphical user interface (GUI).
               This must be the first option.
    /l         Log off. This cannot be used with /m or /d options.
    /s         Shutdown the computer.
    /sg        Shutdown the computer. On the next boot, if Automatic Restart Sign-On
               is enabled, automatically sign in and lock last interactive user.
               After sign in, restart any registered applications.
    /r         Full shutdown and restart the computer.
    /g         Full shutdown and restart the computer. After the system is rebooted,
               if Automatic Restart Sign-On is enabled, automatically sign in and
               lock last interactive user.
               After sign in, restart any registered applications.
    /a         Abort a system shutdown.
               This can only be used during the time-out period.
               Combine with /fw to clear any pending boots to firmware.
    /p         Turn off the local computer with no time-out or warning.
               Can be used with /d and /f options.
    /h         Hibernate the local computer.
               Can be used with the /f option.
    /hybrid    Performs a shutdown of the computer and prepares it for fast startup.
               Must be used with /s option.
    /fw        Combine with a shutdown option to cause the next boot to go to the
               firmware user interface.
    /e         Document the reason for an unexpected shutdown of a computer.
    /o         Go to the advanced boot options menu and restart the computer.
               Must be used with /r option.
    /m \\computer Specify the target computer.
    /t xxx     Set the time-out period before shutdown to xxx seconds.
               The valid range is 0-315360000 (10 years), with a default of 30.
               If the timeout period is greater than 0, the /f parameter is
               implied.
    /c "comment" Comment on the reason for the restart or shutdown.
               Maximum of 512 characters allowed.
    /f         Force running applications to close without forewarning users.
               The /f parameter is implied when a value greater than 0 is
               specified for the /t parameter.
    /d [p|u:]xx:yy  Provide the reason for the restart or shutdown.
               p indicates that the restart or shutdown is planned.
               u indicates that the reason is user defined.
               If neither p nor u is specified the restart or shutdown is
               unplanned.
               xx is the major reason number (positive integer less than 256).
               yy is the minor reason number (positive integer less than 65536).
Failed to get retrieve reasons.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;p&gt;➡️ &lt;strong&gt;&lt;em&gt;By &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;@RSCyberTech&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Website: &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;RSCyberTech.com&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;LinkedIn: &lt;a href="https://www.linkedin.com/in/ricardoams/" rel="noopener noreferrer"&gt;linkedin.com/in/ricardoams&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>tryhackme</category>
      <category>cybersecurity</category>
      <category>windows</category>
      <category>cmd</category>
    </item>
    <item>
      <title>TryHackMe | Search Skills | RSCyberTech</title>
      <dc:creator>Ricardo Santos</dc:creator>
      <pubDate>Sat, 02 Nov 2024 22:03:40 +0000</pubDate>
      <link>https://forem.com/rscybertech/rscybertech-tryhackme-search-skills-30o</link>
      <guid>https://forem.com/rscybertech/rscybertech-tryhackme-search-skills-30o</guid>
      <description>&lt;p&gt;➡️ &lt;strong&gt;&lt;em&gt;By &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;@RSCyberTech&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Website: &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;RSCyberTech.com&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;LinkedIn: &lt;a href="https://www.linkedin.com/in/ricardoams/" rel="noopener noreferrer"&gt;linkedin.com/in/ricardoams&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Platform: &lt;a href="https://tryhackme.com/" rel="noopener noreferrer"&gt;TryHackMe&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Learning Path: &lt;a href="https://tryhackme.com/r/path/outline/cybersecurity101" rel="noopener noreferrer"&gt;Cyber Security 101&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Room: &lt;a href="https://tryhackme.com/r/room/searchskills" rel="noopener noreferrer"&gt;Search Skills&lt;/a&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  1️⃣ Task 1 - Introduction
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;no answer needed&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  2️⃣ Task 2 - Evaluation of Search Results
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What do you call a cryptographic method or product considered bogus or fraudulent?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Snake oil&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;“In &lt;a href="https://en.wikipedia.org/wiki/Cryptography" rel="noopener noreferrer"&gt;cryptography&lt;/a&gt;, &lt;/em&gt;&lt;em&gt;snake oil&lt;/em&gt;&lt;em&gt; is any cryptographic method or product considered to be bogus or fraudulent.”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/Snake_oil_(cryptography)#:~:text=In%20cryptography%2C%20snake%20oil%20is,in%2019th%20century%20United%20States" rel="noopener noreferrer"&gt;https://en.wikipedia.org/wiki/Snake_oil_(cryptography)#:~:text=In cryptography%2C snake oil is,in 19th century United States&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Google search for “cryptographic method or product considered to be bogus or fraudulent”&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What is the name of the command replacing &lt;strong&gt;&lt;code&gt;netstat&lt;/code&gt;&lt;/strong&gt; in Linux systems?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;ss&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;“Formally, &lt;/em&gt;&lt;em&gt;&lt;code&gt;ss&lt;/code&gt;&lt;/em&gt;&lt;em&gt; is the **socket statistics&lt;/em&gt;* command that replaces &lt;code&gt;netstat&lt;/code&gt; .”*&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.redhat.com/en/blog/ss-command#:~:text=Formally%2C%20ss%20is%20the%20socket,commands%20and%20their%20ss%20replacements" rel="noopener noreferrer"&gt;https://www.redhat.com/en/blog/ss-command#:~:text=Formally%2C ss is the socket,commands and their ss replacements&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Google search for “name of the command replacing netstat in Linux systems”&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  3️⃣ Task 3 - Search Engines
&lt;/h1&gt;

&lt;h2&gt;
  
  
  How would you limit your Google search to PDF files containing the terms &lt;strong&gt;cyber warfare report?&lt;/strong&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;filetype:pdf cyber warfare report&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Information present in the section’s text&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What phrase does the Linux command &lt;strong&gt;&lt;code&gt;ss&lt;/code&gt;&lt;/strong&gt; stand for?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;socket statistics&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;“The ss (&lt;/em&gt;&lt;em&gt;socket statistics&lt;/em&gt;&lt;em&gt;) command is a powerful tool in Linux used for examining sockets.”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.sans.org/blog/linux-incident-response-using-ss-for-network-analysis/" rel="noopener noreferrer"&gt;https://www.sans.org/blog/linux-incident-response-using-ss-for-network-analysis/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Google search for “ss command meaning”&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  4️⃣ Task 4 - Specialized Search Engines
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What is the top country with &lt;strong&gt;lighttpd&lt;/strong&gt; servers?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;United States&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.shodan.io/search?query=httpd" rel="noopener noreferrer"&gt;https://www.shodan.io/search?query=httpd&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Searching for &lt;code&gt;httpd&lt;/code&gt; on &lt;a href="http://shodan.io" rel="noopener noreferrer"&gt;shodan.io&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Looking at the &lt;code&gt;top countries&lt;/code&gt; section on the left side menu&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What does BitDefenderFalx detect the file with the hash &lt;strong&gt;&lt;code&gt;2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4&lt;/code&gt;&lt;/strong&gt; as?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Android.Riskware.Agent.LHH&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;“BitDefenderFalx **Android.Riskware.Agent.LHH&lt;/em&gt;&lt;em&gt;”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.virustotal.com/gui/file/2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4" rel="noopener noreferrer"&gt;https://www.virustotal.com/gui/file/2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Searching the provided hash in &lt;a href="http://VirusTotal.com" rel="noopener noreferrer"&gt;VirusTotal.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Looking at the &lt;code&gt;BitDefender&lt;/code&gt; result&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  5️⃣ Task 5 - Vulnerabilities and Exploits
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What utility does CVE-2024-3094 refer to?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;xz&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;“Malicious code was discovered in the upstream tarballs of **xz&lt;/em&gt;&lt;em&gt;”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094?ref=thestack.technology" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-3094?ref=thestack.technology&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Google search for “CVE-2024-3094”&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  6️⃣ Task 6 - Technical Documentation
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What does the Linux command &lt;strong&gt;&lt;code&gt;cat&lt;/code&gt;&lt;/strong&gt; stand for?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;concatenate&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;“cat - **concatenate&lt;/em&gt;* files and print on the standard output”*&lt;/li&gt;
&lt;li&gt;&lt;a href="https://linux.die.net/man/1/cat" rel="noopener noreferrer"&gt;https://linux.die.net/man/1/cat&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Google search for “man cat”&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What is the &lt;strong&gt;&lt;code&gt;netstat&lt;/code&gt;&lt;/strong&gt; parameter in MS Windows that displays the executable associated with each active connection and listening port?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;-b&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;- “&lt;strong&gt;-b&lt;/strong&gt; - Displays the executable involved in creating each connection or listening port. In some cases well-known executables host multiple independent components, and in these cases the sequence of components involved in creating the connection or listening port is displayed. In this case the executable name is in [] at the bottom, on top is the component it called, and so forth until TCP/IP was reached. Note that this option can be time-consuming and will fail unless you have sufficient permissions.”&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/netstat" rel="noopener noreferrer"&gt;https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/netstat&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Google search for “netstat windows”&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  7️⃣ Task 7 - Social Media
&lt;/h1&gt;

&lt;h2&gt;
  
  
  You are hired to evaluate the security of a particular company. What is a popular social media website you would use to learn about the technical background of one of their employees?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;LinkedIn&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Continuing with the previous scenario, you are trying to find the answer to the secret question, “Which school did you go to as a child?”. What social media website would you consider checking to find the answer to such secret questions?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Answer ✅
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Facebook&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Justification / Source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Steps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n/a&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  8️⃣ Task 8 - Conclusion
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;No answer needed&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;➡️ &lt;strong&gt;&lt;em&gt;By &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;@RSCyberTech&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Website: &lt;a href="http://RSCyberTech.com" rel="noopener noreferrer"&gt;RSCyberTech.com&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;LinkedIn: &lt;a href="https://www.linkedin.com/in/ricardoams/" rel="noopener noreferrer"&gt;linkedin.com/in/ricardoams&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>tryhackme</category>
      <category>writeup</category>
      <category>walkthrough</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
