Hardening Basics Part 1 TryHackme
By Shamsher khna This is a Writeup of Tryhackme room “Hardening Basics Part 1”
Machine Credential spooky:tryhackme
Task 11. Chapter 1 Quiz
Question 1. What group are users automatically added to in Ubuntu?
Question 2. What would be the command to add an existing user, nick, to the sudo group? You’re running as root
Answer: usermode -aG sudo nick
Question 3.What command as a user can we enter to see what we are allowed to execute with sudo?
Answer: sudo -l
Question 4. Where is the sudo policy file stored?
Question 5. When in visudo and you see %____, what does the % sign indicate that you are dealing with?
Question 6. This Alias lets the user assign a name, like “ADMINS” to a group of people
Question 7. Which Alias allows you to create a set of commands that you can then assign to a User Alias?
Question 8. Yey/Ney — emacs has a shell escape
Question 9. What is the minimum recommended password length set by NIST?
Question 10. When using the pwhistory module, which file will contain the previous passwords for the user?
Question 11. What principle states that every user only has enough access to do their daily duties and tasks
Answer: principle of least privilege
Task 15. Basic Uncomplicated Firewall for Ubuntu & Chapter 2 Quiz
Question 1. This type of Firewall typically has two NIC cards
Question 2. This type of Firewall is typically installed on a host computer and rules apply to that specific host only
Question 3. Web Application Firewalls help add an extra layer of security to your web servers. Where should these be installed?
Answer: demilitarized zone
Question 4. iptables is not the name of the Linux Firewall. What is the framework that iptables allows us to interact with?
Question 5. This 3 letter acronym is a set of rules that defines what the Firewall should allow and what it should deny
Question 6. Which iptables option allows us to keep track of the connection state?
Answer: — ctstate
Question 7. Which iptable Chain is responsible for packets on the local network that are being carried onwards?
Question 8. Which table mashes up the packets as they go through the Firewall?
Question 9. What is the last rule that should be added to an access control list?
Answer: implicity deny
Please Follow on LinkedIn Instagram Twitter
Written by Shamsher khan
For more walkthroughs stay tuned…
Before you go…
Visit my other walkthrough’s:-
and thank you for taking the time to read my walkthrough.
If you found it helpful, please hit the 👏 button 👏 (up to 40x) and share
it to help others with similar interests! + Feedback is always welcome!